Corrupting files
Johan Wevers
johanw at vulcan.xs4all.nl
Wed Jun 14 01:30:52 CEST 2006
Atom Smasher wrote:
>btw, what's the threat model where this is advantageous?
I can imagine it might be used for plausible deniability: if some law
enforcement agency would force you to decrypt the messsage, you could
claim you can't and you didn't read it anyway because it's corrupted.
Of course, this might be automated in a hacked copy of gpg instead of
hand-editing a file. Also safer since it leaves no intermediate evidence
around on your harddisk. Of course it would be better to store the changed
source code somewhere safe.
Might work against police drones, employers, etc. The NSA is unlikely
to be fooled by such a scheme.
--
ir. J.C.A. Wevers // Physics and science fiction site:
johanw at vulcan.xs4all.nl // http://www.xs4all.nl/~johanw/index.html
PGP/GPG public keys at http://www.xs4all.nl/~johanw/pgpkeys.html
More information about the Gnupg-users
mailing list