Feb. 10, 2022, 12:13 p.m. | Bruce Schneier

Security Boulevard securityboulevard.com

Bunnie Huang has created a Plausibly Deniable Database.



Most security schemes facilitate the coercive processes of an attacker because they disclose metadata about the secret data, such as the name and size of encrypted files. This allows specific and enforceable demands to be made: “Give us the passwords for these three encrypted files with names A, B and C, or else…”. In other words, security often focuses on protecting the confidentiality of data, but lacks deniability.


A scheme with deniability …

academic papers cryptanalysis database databases deniability metadata threat models

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Werkstudent (w/m/d) - Cyber Security

@ IONOS | Karlsruhe, Germany

Security Operations Manager

@ BambooHR | Utah | Hybrid

Senior Risk and Compliance Analyst

@ Cricket.com | Hyderabad

Cyber Security Architect

@ Lilium | Munich

Senior Security Analyst

@ BETSOL | Bengaluru, India