And depending on the situation, the key-holder will decide whether to give them a key that destroys the real data, or that doesn't (and hides it).
In some situations, the fake data could be something completely innocuous and unrelated to what "they" were looking for, or in other cases it could look like what they were looking for albeit with doctored information.
From: dmolnar <[EMAIL PROTECTED]>
To: Tyler Durden <[EMAIL PROTECTED]>
CC: [EMAIL PROTECTED], <[EMAIL PROTECTED]>
Subject: Re: Psuedo-Private Key (eJazeera)
Date: Wed, 20 Nov 2002 15:49:55 -0500 (EST)
On Wed, 20 Nov 2002, Tyler Durden wrote:
> to have a big jpg of a hand with middle finger extended...) More than this,
> they will have unknowingly destroyed the real data. (Perhaps a 3rd key is
> needed that DOESN'T destroy the original data, just 'hides' it a la
> Rubberhose.)
The question I've seen asked about this is then -- how do you get them to
stop beating you? If they know you might have some number of duress keys,
one of which might undetectably hide the data, what stops them from
beating you until
1) you give them a key that shows them what they want to see
2) you die
Maybe this isn't that different from the ordinary unencrypted case, where
if they don't find it on your HD they can accuse you of burying disks in
the backyard or something. Or is the goal protecting the data and not
protecting your life?
-David
_________________________________________________________________
Tired of spam? Get advanced junk mail protection with MSN 8. http://join.msn.com/?page=features/junkmail