-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
On 09/23/2016 10:45 PM, xorc...@sigaint.org wrote: >> >> Being able to hand off keys harmlessly when some border control >> officer wants to turn your electronics inside out: Priceless. > > Yup. This can be achieved quite simply without anything exotic, > though. > > Tar your truly secret plaintext all up, and encrypt it with a > header-less symmetric algorithm, to create a ciphertext. Store that > ciphertext on a USB key. Create a decoy tarball, and XOR it with > the ciphertext, essentially using the ciphertext as a one-time pad, > and store the result on your laptop. When asked what these random > encrypted files are, you XOR them together to produce the decoy. > Simply deny that there is a passphrase involved at all. That is /very/ clever indeed. > For clueless border control, this would be sufficient. Even for > crypto-savvy interrogators, it may be nice: you're using no > special software or algorithms, so its perhaps easier to plausibly > deny any other secrets. > > Dedicated deniable encryption systems are really only worthwhile > when, upon capture, you're going to try to game your interrogators, > and feed them disinformation, and keep them guessing. Or just make them believe you gave up something "personally embarrassing" but not actionable under duress. Got to give them a win to report. :o) -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.22 (GNU/Linux) iQEcBAEBAgAGBQJX5f+5AAoJEECU6c5XzmuqqGQH/13Yv6o4laGKDNS8t46Tx0oa 3rk2uWBUY+qJfPWgs9jaVz9mTa//5Nu5mPFAwuvwPkZDlZfczqWQUFpkvsl2jDj1 ccfkJq9d2vBYZeGmMyAVX6McPh20jdYc/73OSGEL4FX9joAAs/Ypk5Ki1ZcZvbKv M0LN8Dmo01C6eyIIFwz59eSfOW0S1S8+HVEgITyVJfvNb2UgVG6hVYsK6Rqld2cY Ek13dWOyQXjxD8jHtXRX/LKmliagxxw9zjW+ui6bfBqrQyPQhAUEphkijXdzkip4 B2vMUWCi7bPrwTXZqZ181dvx6gcgjyLGn4rMJ3zHdzIcWUU1kvHovIZCh3zyZBM= =yTXf -----END PGP SIGNATURE-----