What is Plausible Deniability in Cybersecurity? (Explained)
Traditional encryption assumes your adversary is a hacker trying to break your code remotely. But what happens if the adversary is standing right in front of you, demanding you unlock your phone? This is where standard encryption fails and plausible deniability encryption begins.
The "Rubber Hose" Cryptanalysis Problem
In cybersecurity, being forced to decrypt your data under physical threat or border crossing detentions is known as the "rubber hose" problem. If your phone contains a single, massive vault filled with everything from your financial records to your deepest secrets, handing over your master password means total compromise.
The Decoy Vault
Plausible deniability encryption solves this by creating two distinct cryptographic realities derived from different passwords. When using Krypt, you might have your primary master password, and a secondary "decoy password." If forced to unlock your phone, you simply enter the decoy password. The app successfully decrypts a completely separate, innocent-looking vault (filled with travel itineraries or public data), proving absolutely nothing about the existence of the hidden, real vault.
If you are looking for a zero-knowledge password manager that actually protects you in the physical world, Krypt's Decoy Vault is exactly what you need.