Well, the basic idea is to co-encrypt some "fake" data that looks like the real data, so that when they find it (using the key to the fake data of course) they'll figure you gave them the real key, because they won't know that there ever was a fake key leading to fake data. (And I suppose there's no reason not to allow for mutliple batches of fake data that get encrypted along with the real data.)

And depending on the situation, the key-holder will decide whether to give them a key that destroys the real data, or that doesn't (and hides it).

In some situations, the fake data could be something completely innocuous and unrelated to what "they" were looking for, or in other cases it could look like what they were looking for albeit with doctored information.








From: dmolnar <[EMAIL PROTECTED]>
To: Tyler Durden <[EMAIL PROTECTED]>
CC: [EMAIL PROTECTED], <[EMAIL PROTECTED]>
Subject: Re: Psuedo-Private Key (eJazeera)
Date: Wed, 20 Nov 2002 15:49:55 -0500 (EST)



On Wed, 20 Nov 2002, Tyler Durden wrote:

> to have a big jpg of a hand with middle finger extended...) More than this,
> they will have unknowingly destroyed the real data. (Perhaps a 3rd key is
> needed that DOESN'T destroy the original data, just 'hides' it a la
> Rubberhose.)

The question I've seen asked about this is then -- how do you get them to
stop beating you? If they know you might have some number of duress keys,
one of which might undetectably hide the data, what stops them from
beating you until

1) you give them a key that shows them what they want to see
2) you die

Maybe this isn't that different from the ordinary unencrypted case, where
if they don't find it on your HD they can accuse you of burying disks in
the backyard or something. Or is the goal protecting the data and not
protecting your life?

-David

_________________________________________________________________
Tired of spam? Get advanced junk mail protection with MSN 8. http://join.msn.com/?page=features/junkmail

Reply via email to