-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 09/23/2016 10:45 PM, xorcist@sigaint.org wrote:
Being able to hand off keys harmlessly when some border control officer wants to turn your electronics inside out: Priceless.
Yup. This can be achieved quite simply without anything exotic, though.
Tar your truly secret plaintext all up, and encrypt it with a header-less symmetric algorithm, to create a ciphertext. Store that ciphertext on a USB key. Create a decoy tarball, and XOR it with the ciphertext, essentially using the ciphertext as a one-time pad, and store the result on your laptop. When asked what these random encrypted files are, you XOR them together to produce the decoy. Simply deny that there is a passphrase involved at all.
That is /very/ clever indeed.
For clueless border control, this would be sufficient. Even for crypto-savvy interrogators, it may be nice: you're using no special software or algorithms, so its perhaps easier to plausibly deny any other secrets.
Dedicated deniable encryption systems are really only worthwhile when, upon capture, you're going to try to game your interrogators, and feed them disinformation, and keep them guessing.
Or just make them believe you gave up something "personally embarrassing" but not actionable under duress. Got to give them a win to report. :o) -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.22 (GNU/Linux) iQEcBAEBAgAGBQJX5f+5AAoJEECU6c5XzmuqqGQH/13Yv6o4laGKDNS8t46Tx0oa 3rk2uWBUY+qJfPWgs9jaVz9mTa//5Nu5mPFAwuvwPkZDlZfczqWQUFpkvsl2jDj1 ccfkJq9d2vBYZeGmMyAVX6McPh20jdYc/73OSGEL4FX9joAAs/Ypk5Ki1ZcZvbKv M0LN8Dmo01C6eyIIFwz59eSfOW0S1S8+HVEgITyVJfvNb2UgVG6hVYsK6Rqld2cY Ek13dWOyQXjxD8jHtXRX/LKmliagxxw9zjW+ui6bfBqrQyPQhAUEphkijXdzkip4 B2vMUWCi7bPrwTXZqZ181dvx6gcgjyLGn4rMJ3zHdzIcWUU1kvHovIZCh3zyZBM= =yTXf -----END PGP SIGNATURE-----