See also: Security | Cryptography
A system allowing your data to be decrypted with more than one password, each resulting in a different output, giving the impression that you have cooperated. A method of protecting yourself against the Rubber Hose Attack.
For example:
- One includes several letters, all encrypted but only one secret. If discovered, a password can be given to make the message exchange seem innocuous.
Given the rise of the police state worldwide, it becomes more and more necessary to resist legal and physical coersion in revealing one’s key.
Software
- TrueCrypt – Provides two-level plausible deniability (including hidden volumes). Free, open-source, based on E4M. Encrypts partitions, devices (USB memory sticks, etc.) or creates encrypted file-hosted containers. Supports Windows XP/2000/2003 and Linux. AES-256, Triple DES, Twofish, Serpent, Blowfish-448, CAST5, and cascades of multiple algorithms (e.g. AES + Twofish). Fast, reliable, and stable.
- Phonebook – for Linux (in alpha testing)
TakeDown.NET -> “Deniable-Encryption”