If adversary has all versions, is deniability of hidden data still posiible?

Discussion in 'privacy technology' started by Ulysses_, Dec 20, 2013.

Thread Status:
Not open for further replies.
  1. Ulysses_

    Ulysses_ Registered Member

    Joined:
    Jun 27, 2010
    Posts:
    275
    If adversary has repeated access to a truecrypt container in cloud storage, ie several versions where the hidden data change, they can prove the existence of the hidden data.

    Is this because of the design of truecrypt, or an inevitable fact of all deniable encryption?

    What if the keys change from version to version? Automatically based on random movements of the mouse? While the password stays the same? Is hidden data deniable then?
     
    Last edited: Dec 20, 2013
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.