A system allowing your data to be decrypted with more than one password, each resulting in a different output, giving the impression that you have cooperated. A method of protecting yourself against the Rubber Hose Attack.
- One includes several letters, all encrypted but only one secret. If discovered, a password can be given to make the message exchange seem innocuous.
- TrueCrypt – Provides two-level plausible deniability (including hidden volumes). Free, open-source, based on E4M. Encrypts partitions, devices (USB memory sticks, etc.) or creates encrypted file-hosted containers. Supports Windows XP/2000/2003 and Linux. AES-256, Triple DES, Twofish, Serpent, Blowfish-448, CAST5, and cascades of multiple algorithms (e.g. AES + Twofish). Fast, reliable, and stable.
- Phonebook – for Linux (in alpha testing)
TakeDown.NET -> “Deniable-Encryption”