My boyfriend and I intend to record a private video of ourselves. I am trying to take every reasonable precaution against the possibility of the video getting leaked. Open systems are more secure so this leads me to post my method here for others to audit.
- Inspect the room for signs of hidden cameras and lock the door.
- Buy a new SD card and record the video using a digital camera without any wifi support.
- Inspect the keyboard for signs of a hardware keylogger.
- Boot a custom copy of Arch Linux from a USB stick which contains Veracrypt and VLC player and no network drivers.
- Use Veracrypt to create an encrypted USB stick containing a hidden volume. The passwords must contain at least 20 unique characters.
- The outer volume should contain some embarrassing fetish porn.
- The inner volume should contain the video of my boyfriend and I.
- Use Veracrypt to create an encrypted SD card with no files on it. This should securely delete the video.
- Only use the copy of Arch Linux to watch the video and only watch the video using the copy of Arch Linux. lock the door and check for hidden cameras and hardware keyloggers before watching the video.
There are a few flaws in this method but I think it's good enough except for the last one.
- Using specialized equipment it is possible for others to view the screen from a short distance away even in another room. To work around this we would have to watch the video in a Faraday cage. I'm not worried about this because there will be a drop in visual quality and when you're dealing with a video visual quality is extremely important.
- The bigger flaw I can see is the possibility of someone using a microphone to analyze the sounds released by the keyboard while typing the password or the sound of the CPU decrypting the video. I assume that to work around this we would have to play keyboard sounds and CPU sounds while typing the password and decrypting the video.
- We might forget the passwords.
- Veracrypt doesn't support nuke passwords.
- Maybe in a few decades it will be feasible to decrypt the USB using a quantum computer. This is a very serious concern.
- Inspect the room for signs of hidden cameras and lock the door.
- Buy a new SD card and record the video using a digital camera without any wifi support.
- Inspect the keyboard for signs of a hardware keylogger.
- Boot a custom copy of Arch Linux from a USB stick which contains Veracrypt and VLC player and no network drivers.
- Use Veracrypt to create an encrypted USB stick containing a hidden volume. The passwords must contain at least 20 unique characters.
- The outer volume should contain some embarrassing fetish porn.
- The inner volume should contain the video of my boyfriend and I.
- Use Veracrypt to create an encrypted SD card with no files on it. This should securely delete the video.
- Only use the copy of Arch Linux to watch the video and only watch the video using the copy of Arch Linux. lock the door and check for hidden cameras and hardware keyloggers before watching the video.
There are a few flaws in this method but I think it's good enough except for the last one.
- Using specialized equipment it is possible for others to view the screen from a short distance away even in another room. To work around this we would have to watch the video in a Faraday cage. I'm not worried about this because there will be a drop in visual quality and when you're dealing with a video visual quality is extremely important.
- The bigger flaw I can see is the possibility of someone using a microphone to analyze the sounds released by the keyboard while typing the password or the sound of the CPU decrypting the video. I assume that to work around this we would have to play keyboard sounds and CPU sounds while typing the password and decrypting the video.
- We might forget the passwords.
- Veracrypt doesn't support nuke passwords.
- Maybe in a few decades it will be feasible to decrypt the USB using a quantum computer. This is a very serious concern.
Last edited by thewannacryguy,