Muh encryption

How can I encrypt my files in such a way that no one will ever be able to access them?

Attached: orange.jpg (1080x1062, 342K)

Other urls found in this thread:

arstechnica.com/tech-policy/2017/03/man-jailed-indefinitely-for-refusing-to-decrypt-hard-drives-loses-appeal/
twitter.com/SFWRedditVideos

encrypt with 7zip, hex edit header bytes

one time pad (actually the only correct answer, for real)

this works well

Attached: hdd_hammer.jpg (750x450, 42K)

best kind of encryption

Literally only one-time pad. Even with quantum computing so advanced that you can trivially break regular cryptography, one-time padding will never be broken.

try overwriting them with random data and then no one will ever be able to access them

yes, but that's simply because it theoretically and practically cannot be broken

What's your point?

A one-time pad still allows you to access the file if you have the pad. OP wants *no one* to be able to access it.

Attached: 1312643390315.jpg (184x184, 31K)

Destroy the pad.

Just use the original file as the OTP.

oh fuck I forgot it's winter.

Attached: file.png (640x480, 335K)

just secure erase
oh well you can't do it on SSD anyway

A hammer.

luks with sha256, and set the password to dev/random

Seeing as "no one" means not only you should be able to access them, just overwrite the files with zeroes and then put the hard drive they're stored on in an incinerator. Then no one will ever be able to access them.

ask the right questions, op.

Attached: 494291e38813cd78c3fc1076085e046c9028af419a0d0c7a1bc43d6c6ac8b3ff.png (1688x2000, 1.47M)

No point.
arstechnica.com/tech-policy/2017/03/man-jailed-indefinitely-for-refusing-to-decrypt-hard-drives-loses-appeal/

Attached: 1534616132462.jpg (3858x2581, 1.41M)

I think child porn is bad, but I think this guy's rights are getting trampled just because the case is about cheese pizza. If it's a "foregone conclusion" and they're that sure, they should have no problem nailing him on charges based on the evidence he has.

Although his opsec was bad. His words should have been "I have forgotten my password"

dd if=/dev/zero of=/dev/sda

now nobody will be able to access your data ever again

Attached: 1543089050558.jpg (652x680, 55K)

That cat is about to explode.

Attached: cat scared of cucumber animation-G1eNGM9k7Bg.webm (360x360, 399K)

>encrypting a windows

L M F A O
How's the weather outside? Owait - nowadays you can actually check the weather with windows botnetâ„¢, just press the (((win))) key

Attached: based moot.jpg (450x338, 33K)

Attached: o-NUCLEAR-MUSHROOM-CLOUD-facebook.jpg (1536x1206, 438K)

>You've been arrested for destruction of evidence & obstruction of justice.

>All I wanted to do was play video games, why did you force me to do this

Put them in the Rubbish Bin and press Empty

encrypt with 7zip, close eyes and bash keyboard for password.

not necessarily, there is a reason dban exists
despite the "state" of the disk being all zeros, physically it is possible to reverse the last write operation, especially if the write operation was fairly simple like a zeroing
/dev/urandom and zeroing a few times is better, but if you are worried the seed will be exposed, then do /dev/random and wait forever

try to find that win10 update which destroyed all files in user's folder

AND them all with 0's, works great for me

winrar

SHA-1?