JY vs Sea Sea vs Actual Discussion

Steve Kinney admin at pilobilus.net
Fri Sep 23 21:23:21 PDT 2016


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1



On 09/23/2016 10:45 PM, xorcist at sigaint.org wrote:
>> 
>> Being able to hand off keys harmlessly when some border control 
>> officer wants to turn your electronics inside out:  Priceless.
> 
> Yup. This can be achieved quite simply without anything exotic,
> though.
> 
> Tar your truly secret plaintext all up, and encrypt it with a
> header-less symmetric algorithm, to create a ciphertext. Store that
> ciphertext on a USB key. Create a decoy tarball, and XOR it with
> the ciphertext, essentially using the ciphertext as a one-time pad,
> and store the result on your laptop. When asked what these random
> encrypted files are, you XOR them together to produce the decoy.
> Simply deny that there is a passphrase involved at all.

That is /very/ clever indeed.

> For clueless border control, this would be sufficient. Even for 
> crypto-savvy interrogators, it may be nice: you're using no
> special software or algorithms, so its perhaps easier to plausibly
> deny any other secrets.
> 
> Dedicated deniable encryption systems are really only worthwhile
> when, upon capture, you're going to try to game your interrogators,
> and feed them disinformation, and keep them guessing.

Or just make them believe you gave up something "personally
embarrassing" but not actionable under duress.  Got to give them a win
to report.

:o)


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.22 (GNU/Linux)

iQEcBAEBAgAGBQJX5f+5AAoJEECU6c5XzmuqqGQH/13Yv6o4laGKDNS8t46Tx0oa
3rk2uWBUY+qJfPWgs9jaVz9mTa//5Nu5mPFAwuvwPkZDlZfczqWQUFpkvsl2jDj1
ccfkJq9d2vBYZeGmMyAVX6McPh20jdYc/73OSGEL4FX9joAAs/Ypk5Ki1ZcZvbKv
M0LN8Dmo01C6eyIIFwz59eSfOW0S1S8+HVEgITyVJfvNb2UgVG6hVYsK6Rqld2cY
Ek13dWOyQXjxD8jHtXRX/LKmliagxxw9zjW+ui6bfBqrQyPQhAUEphkijXdzkip4
B2vMUWCi7bPrwTXZqZ181dvx6gcgjyLGn4rMJ3zHdzIcWUU1kvHovIZCh3zyZBM=
=yTXf
-----END PGP SIGNATURE-----



More information about the cypherpunks mailing list