Psuedo-Private Key (eJazeera)

Tyler Durden camera_lumina at
Wed Nov 20 13:12:26 PST 2002

Well, the basic idea is to co-encrypt some "fake" data that looks like the 
real data, so that when they find it (using the key to the fake data of 
course) they'll figure you gave them the real key, because they won't know 
that there ever was a fake key leading to fake data. (And I suppose there's 
no reason not to allow for mutliple batches of fake data that get encrypted 
along with the real data.)

And depending on the situation, the key-holder will decide whether to give 
them a key that destroys the real data, or that doesn't (and hides it).

In some situations, the fake data could be something completely innocuous 
and unrelated to what "they" were looking for, or in other cases it could 
look like what they were looking for albeit with doctored information.

>From: dmolnar <dmolnar at>
>To: Tyler Durden <camera_lumina at>
>CC: keith at, <cypherpunks at>
>Subject: Re: Psuedo-Private Key (eJazeera)
>Date: Wed, 20 Nov 2002 15:49:55 -0500 (EST)
>On Wed, 20 Nov 2002, Tyler Durden wrote:
> > to have a big jpg of a hand with middle finger extended...) More than 
> > they will have unknowingly destroyed the real data. (Perhaps a 3rd key 
> > needed that DOESN'T destroy the original data, just 'hides' it a la
> > Rubberhose.)
>The question I've seen asked about this is then -- how do you get them to
>stop beating you? If they know you might have some number of duress keys,
>one of which might undetectably hide the data, what stops them from
>beating you until
>	1) you give them a key that shows them what they want to see
>	2) you die
>Maybe this isn't that different from the ordinary unencrypted case, where
>if they don't find it on your HD they can accuse you of burying disks in
>the backyard or something. Or is the goal protecting the data and not
>protecting your life?

Tired of spam? Get advanced junk mail protection with MSN 8.

More information about the cypherpunks-legacy mailing list