What is the name of this security model?

sm625

Diamond Member
May 6, 2011
8,172
137
106
Let's say you have a safe that has two compartments, one combination opens the front compartment, and a second combination opens the rear compartment. That way when someone robs you and forces you to give them the combination, you give them the combination to the front compartment and you keep all the really valuable stuff in the rear compartment. What is the name of this type of security model?

The same goes for phones and computers. Two different passwords unlock two completely different user accounts. One is a front with no valuable data, and the other is your real account. Is there android software for rooted devices that can enable this type of security model?
 

PrincessFrosty

Platinum Member
Feb 13, 2008
2,300
68
91
www.frostyhacks.blogspot.com
This occurs in cryptography.

Stenography is the art of hiding information, to have some kind of secret compartment you need to have some ability to either hide that compartment or provide some kind of plausible deniability of your knowledge of its existence. Typically stenography takes some large amount of dummy data and hides real (important) data inside of it.

There's several encryption schemes, most notably that of TrueCrypt which allows you to create either partitions or container files which are encrypted, and then inside that encrytped partition creating another "hidden" partition. One password unlocks he outer (dummy) partition and another password unlocks the inner (real) partition.

You get plausible deniability because the inner partition is stored inside the blank space of the outer partition and both blank space and real data is encrypted equally as randomly with TrueCrypt, So you can't say for certain if any span of diskspace is truly empty of contains legit files.

Typically you wouldn't hide a user account with this model, you'd hide an entire operating system and Truecrypt supports this, the main reason behind this is because you risk leaking data from hidden areas to non-hidden ones, so you don't want to unlock a hidden user account for example and there be some kind of log in the OS that it was used, because it would no longer be hidden (deniable)

As for phones, I have no idea, I've never heard of deniable encryption for phones before, if you're after security with your phone then maybe take a look at that blackphone, that's the only real commercial attempt at a secure smartphone that I'm aware of.