What is Plausible Deniability?
The ability to credibly deny knowledge of or responsibility for something, especially when encrypted data could be explained as random noise or when hidden volumes within encrypted containers cannot be proven to exist.
Also known as: Deniable Encryption
In adversarial situations, it may not be enough that your data is encrypted—you might need to deny that sensitive data exists at all. Plausible deniability provides this crucial protection.
Why Plausible Deniability Matters
Rubber Hose Cryptanalysis
- Coercion to reveal passwords
- Legal compulsion in some jurisdictions
- Physical threats
- "Wrench attack"
If they know encrypted data exists, they can force you to decrypt it. If they can't prove it exists, you can deny it.
Hidden Volume Technique
How It Works
- Create encrypted outer volume
- Fill with decoy sensitive data
- Create hidden volume inside
- Fill with truly sensitive data
- Two different passwords
Under Coercion
- Give outer volume password
- Decoy data appears
- Hidden volume is indistinguishable from random data
- Cannot prove hidden volume exists
Tools Supporting This
- VeraCrypt: Hidden volumes and OS
- Tomb: Linux encrypted directories
- LUKS: Detached headers
Types of Deniable Encryption
Hidden Volumes
- Secret partition within encrypted space
- Outer volume has decoy data
- Random data could be empty space or hidden volume
Deniable File Systems
- Multiple "views" of same data
- Different passwords show different content
- Rubberhose (historical)
Steganography
- Data hidden in innocent files
- Images, audio, video
- Existence of message hidden
Limitations
Forensic Analysis
- Usage patterns might betray hidden volume
- Timestamps, access logs
- Anti-forensic measures needed
Legal Jurisdiction
- Some countries: can compel all passwords
- UK: failure to decrypt is criminal
- Contempt of court for non-compliance
Practical Issues
- Accidentally overwriting hidden volume
- Remembering multiple passwords
- Maintaining decoy content
Best Practices
If Using Hidden Volumes
- Keep outer volume realistic
- Update decoy data regularly
- Don't leak hidden volume's existence
- Consider jurisdiction laws
Related Terms
Encryption
The process of converting information into a code to prevent unauthorized access. Encryption transforms readable data (plaintext) into an unreadable format (ciphertext) using a cryptographic algorithm and key. Only those with the correct key can decrypt and read the original data.
Steganography
The practice of hiding secret data within ordinary files like images, audio, or text, so that the existence of the hidden data is not apparent.
Have more questions?
Use our guided flow to get the right next privacy step for Plausible Deniability.
Open Guided Flow