This project has moved. For the latest updates, please go here.

plausible deniability using passwords

Topics: Feature Requests
Jan 28, 2016 at 4:00 AM
Edited Jan 28, 2016 at 4:24 AM
I would like to propose the following change for your consideration a password that appears to allow access but simply shows innocent-looking data files.

Here are some webpages of court cases where people have been told to reveal passwords
Jan 28, 2016 at 4:22 AM
TrueCrypt and VeraCrypt already have the ability to create a hidden volume within the existing volume.
Jan 28, 2016 at 4:37 AM
Edited Jan 28, 2016 at 4:38 AM
I know that. There are two problems here.

The first is its messy to setup

The other is that I very much doubt a decent computer engineer that has been told to look would miss the hidden volume. If he knows that VeraCrypt is installed, he could immediately know that there is a hidden volume. If he does not know VeraCrypt is installed, he would be wondering what is there?

What it needs to look like is that there is something plausible there.
Jan 28, 2016 at 1:05 PM

Your suggestions / comments fail on at least two counts.

1) Creating a hidden volume is NOT to messy to setup.
2) A decent computer engineer would also know how to find the "innocent looking data files" that you speak of.
Jan 28, 2016 at 1:21 PM
1) From what I read it requires three passwords and some mucking around to do it. Not something a novice would do
a) That decent computer engineer may not be called because you have supplied the information required
b) If he is called out, how would he find that the "innocent looking data files" are fake?

Another idea would be if making "innocent looking data files" too hard what about if that false password, goes though the motions of unencrypting the drive and it then reports an error and states that the drive is corrupted.

Here is some more information on the new laws.
Jan 28, 2016 at 1:54 PM
What is your idea? automatically generate "innocent looking data files" ?
Whatever algorithm VC would use for that, Adversaries would know that and could detect it.
Jan 28, 2016 at 3:07 PM
BernardZ wrote:
1) From what I read it requires three passwords and some mucking around to do it. Not something a novice would do
To clarify, for hidden OS requires three passwords. One for the decoy OS, one for the hidden OS and one for the outer volume that contains the hidden OS.
For all other non-OS hidden volumes requires two passwords. One for the outer volume that contains the hidden volume and one for the hidden volume.
Jan 29, 2016 at 1:38 AM
Edited Jan 29, 2016 at 3:08 AM
What Enigma2Illusion states will work if you add one more step, you need to fill much of the disk with random data continuously because who ever is snooping can detect which part of the hard disk have been written recently.

So what you would need to do is to put some large files on your drive much larger than your hidden OS on your drive and subsequently winrar them with a different password every time eg todays date using the option to split by size. This has to be done outside the hidden OS. Afterwards delete the winrar copies after every time you access the hidden OS.

This will not take long but like I said its messy.

I think something better should be done
Jan 29, 2016 at 5:18 PM
"can detect which part of the hard disk have been written recently" - how?
Jan 29, 2016 at 11:01 PM
This is what I heard that with the proper equipment they can do this. Actually I was thinking a better solution is a hard drive scrubber which writes random characters over the free space in the hard drive.
Feb 1, 2016 at 2:44 PM
Which source?