What is Plausible Encryption?
Encryption that produces ciphertext indistinguishable from random data, preventing adversaries from proving that encryption was used at all.
Plausible encryption hides not just the content of data, but the very existence of encryption.
Why It Matters
- In some jurisdictions, possessing encrypted data is suspicious or illegal
- Border agents may demand you decrypt devices if they detect encryption
- Plausible encryption lets you deny that encrypted data exists at all
Techniques
- VeraCrypt hidden volumes: A container within a container
- Steganography: Hide encrypted data inside innocent-looking files
- Disk encryption with hidden OS: Boot into a decoy OS or the real one depending on password
The Random Data Defense
Good encryption produces output indistinguishable from random data. If your disk is filled with "random" data (as from a secure erase), encrypted partitions blend in. Without the key, it's impossible to prove encrypted data exists.
Related Terms
Deniable Encryption
An encryption scheme where the existence of encrypted data cannot be proven, or where decryption can produce different plausible plaintexts.
Plausible Deniability
The ability to credibly deny knowledge of or responsibility for something, especially when encrypted data could be explained as random noise or when hidden volumes within encrypted containers cannot be proven to exist.
Steganography
The practice of hiding secret data within ordinary files like images, audio, or text, so that the existence of the hidden data is not apparent.
Have more questions?
Use our guided flow to get the right next privacy step for Plausible Encryption.
Open Guided Flow