> - The user is a wealthy and/or powerful individual, or one with valuable
> knowledge, who is subject to a sophisticated, targeted robbery. The
> criminals enter his home and force him to decrypt his system, including any
> encrypted volumes they find on it. They have the technical
> ability/expertise to check the filesystem and disks for traces of the data
> they're looking for (account numbers, corporate secrets, passphrases,
> etc.). It's likely that he will be seriously injured or killed if he does
> not comply with the command to decrypt, but it is not as likely that he
> will be as seriously injured, or at least killed, for claiming that no
> hidden volumes exist ("Are you crazy? I don't store any of that stuff here!
> It's all on company servers, so that I'm not a target for people like
> you!"), since the criminals cannot know whether he is telling the truth (if
> deniable encryption is being properly implemented). For various economic
> and legal reasons, they have less to gain and more to lose by killing him
> over data which potentially does not exist on the system. (Side note: What
> about rubber hose cryptanalysis? Think about it as a prisoner's dilemma,
> and you'll see that the dominant strategy is to use the deniable encryption
> because your adversary, who can't be sure, will torture you anyway.)
> - The user is an individual engaged in morally justified activity who is
> being surveilled by a corrupt government. (Any resemblance to real persons,
> living or dead, is purely coincidental! :P) One day, agents show up at her
> door with a warrant for all 'electronic storage devices'. [One or more of
> the following is the case: (1) She powered down her system last night
> before going to sleep and was just now woken up by the doorbell. (2) She is
> in the habit of powering down her system before answering unexpected knocks
> at the door. (3) The system is powered on, but all hidden encrypted
> containers are dismounted, all DispVMs in which data from those volumes
> have been processed have been closed, and no data from hidden volumes
> remains in RAM.] The agents seize her systems and disks. At some later
> point, she is legally compelled by the courts to provide passwords and/or
> decrypt her data. The techies are then free to comb through her
> installation of Qubes and every bit of the disk(s), but she can plausibly
> deny that there are any hidden containers to decrypt. (Side note: What if
> your government is so corrupt that suspicion is sufficient for conviction?
> Then you're screwed. But even a government which spies on its own citizens,
> say, by listening to their phone calls, collecting their emails, and
> analyzing their social networks, wouldn't convict a person over data that
> they can't even prove is there... right?)
> - You're stopped at the border of a country which requires you to
> decrypt the contents of your laptop before being allowed to enter. You
> neglected to set up a dummy OS (standard unencrypted Windows installation
> with the real real encrypted OS behind it; boot partition of the real OS on
> a microSD card sewn into the lining of your carry-on luggage), or you have
> reason to believe that the customs officials are smart enough to detect a
> dummy OS, or the consequences for being caught lying to the authorities in
> this country are so severe that you'd rather not risk it. (The rest is
> self-explanatory by now, I think. Deniable encryption saves your secrets,
> etc.)
>
> (NB: As a fiction author, I have an overactive imagination, and I only
> discuss this because I need fodder for my novels. Also, no one should ever
> do anything illegal, ever! Anyone who gets the impression that I have
> suggested otherwise has misinterpreted my words.)
>
Ok, I agree you might have a point here.
joanna.