| ▲ | palmotea 4 hours ago | |||||||||||||
> Still go to prison for not showing. So until devices have multiple pins for plausible deniability we are still screwed. > What’s so hard to make 2-3 pins and each to access different logged in apps and files. Besides the technical challenges, I think there's a pretty killer human challenge: it's going to be really hard for the user to create an alternate account that looks real to someone who's paying attention. Sure, you can probably fool some bored agent in customs line who knows nothing about you, but not a trained investigator who's focused on you and knows a lot about you. | ||||||||||||||
| ▲ | fluoridation 3 hours ago | parent | next [-] | |||||||||||||
But at that point it turns from "the person refused to unlock the device" to "we think the person has unlocked the device into a fake account". | ||||||||||||||
| ||||||||||||||
| ▲ | ashdksnndck 3 hours ago | parent | prev | next [-] | |||||||||||||
Doesn’t matter if the agent believes you. Only matters if the court jails you on a contempt charge. | ||||||||||||||
| ▲ | davidwritesbugs 3 hours ago | parent | prev | next [-] | |||||||||||||
Background agent in the decoy identity that periodically browses the web, retrieves email from a banal account etc.? | ||||||||||||||
| ||||||||||||||
| ▲ | skeptic_ai 2 hours ago | parent | prev [-] | |||||||||||||
Just use an account for “regular” stuff. And only use the “secret” account as needed. | ||||||||||||||