-
### Idea
Publish the expired signing keys.
### Reasoning
https://blog.cryptographyengineering.com/2020/11/16/ok-google-please-publish-your-dkim-secret-keys/
but TL;DR: publishing expired/rotated…
-
I've just learned about [Deniability](http://www.truthcoin.info/blog/deniability/) via Eric Wall's post. It seems relatively simple to implement but I'm far from a crypto expert.
> “Deniability” is…
-
### Reforged Eden 2 Build Number
2474
### Game mode
Dedicated Server
### Tested in vanilla
Not tested in vanilla or not applicable
### Description of issue
Your friend Emp1 here :)
Repeatabl…
-
We need a SHTF backup plan. Use cases are many: robbery at gun point, police raid, stealing node from home etc.
What about having an option like in BlueWallet to setup a fake account, with a fake wal…
-
I found an article that describes VeraCrypt volume detection. Maybe some attention should be paid to the possibility of plausible deniability?
https://www.raedts.biz/forensics/detecting-truecrypt-v…
-
This is a pretty interesting project and while I am no researcher, after stumbling on your video about it was I curious and had a look!
I think there's currently two main issues that may break your…
-
[On 2016-10-26 16:19, tonyinfinity@tutanota.com wrote:](https://groups.google.com/d/msgid/qubes-devel/KV2ClaW--3-0%40tutanota.com)
> Usecase: If you are unexpectedly legally or extra-legally coerced …
-
I got together in meatspace to talk about these ideas with an acquaintance of mine, @tjgillies, and one of the questions that came up was how to help protect against "tire iron" attacks. If we succeed…
ghost updated
9 years ago
-
Currently, whether we want the messages to be signed/authenticated or instead repudiable is not well specified or understood.
In the specification, we define the message `m` to be encrypted using s…
-
We could use t-c-p to address Tails feature request 5929 [https://labs.riseup.net/code/issues/5929] if we had:
a) a "deniable" option to tcp-helper to fully zero the encrypted partition before creati…