If adversary has all versions, is deniability of hidden data still posiible?

Discussion in 'privacy technology' started by Ulysses_, Dec 20, 2013.

Thread Status:
Not open for further replies.
  1. Ulysses_

    Ulysses_ Registered Member

    Joined:
    Jun 27, 2010
    Posts:
    207
    If adversary has repeated access to a truecrypt container in cloud storage, ie several versions where the hidden data change, they can prove the existence of the hidden data.

    Is this because of the design of truecrypt, or an inevitable fact of all deniable encryption?

    What if the keys change from version to version? Automatically based on random movements of the mouse? While the password stays the same? Is hidden data deniable then?
     
    Last edited: Dec 20, 2013
Loading...
Thread Status:
Not open for further replies.