• 018118055@sopuli.xyz
    link
    fedilink
    arrow-up
    6
    ·
    3 months ago

    As referred in other comment, the counter counter is to just keep beating to get further keys/hidden data.

    • Ookami38@sh.itjust.works
      link
      fedilink
      arrow-up
      2
      ·
      3 months ago

      Game theory would lead you, as the tortured, to realize that they’re just going to beat you until death to extract any keys you may or may not have, so the proper answer is to give them 1 and no more. You’re dead anyway, may as well actually protect what you thought was worth protecting. Giving 1 key that opens a dummy vault may get the torturers to stop at you, thinking this lead is a dead one.

      • 018118055@sopuli.xyz
        link
        fedilink
        arrow-up
        1
        ·
        3 months ago

        Probably best to avoid systems with known deniable encryption methods, and keep your dummy data there. Then hide your secrets e.g. in deleted space on a drive, in the cloud, or a well-hidden micro-sd card. All have risks, maybe it’s best of all to not keep your secrets with you, and make sure they can’t be associated with you.