Deleted member 60479
There's a lot of snooping going on these days. How does one create plausible deniability?
Reaction score: 1,354
Reaction score: 886
Thank you. Pretty cool.For start search for "deniable encryption" and its applications, e.g. in messaging systems. For example: security/libotr, XMPP/OTR and security/veracrypt.
Deniable Encryption | UCLA
Fully Deniable Interactive Encryption | IACR
Deniable Encryption | Springer
A Plausibly Deniable Encryption Scheme for Personal Data Storage | claremont.edu
An implementation of deniable encryption | Blackhat