Two passwords. Two truths.
Only you know the real one.
Create two independently encrypted secrets: a real one and a convincing decoy. Under pressure, hand over the decoy link. Cryptographically impossible to prove which is real. Inspired by VeraCrypt hidden volumes โ applied to secrets.
Both secrets are independently encrypted ยท Neither can be proven to be "the real one" ยท Zero-knowledge
Who uses plausible deniability
Journalists & activists
In hostile environments, carrying a device with sensitive contacts and documents is dangerous. With plausible deniability, the device contains the decoy version. The real version is accessed from a safe location.
Legal depositions
Under subpoena or deposition, reveal the decoy link. The opposing counsel receives the decoy โ which contains information accurate enough to satisfy scrutiny but not the full picture.
M&A negotiations
Two competing term sheets for different scenarios. Share the less aggressive terms with the first party. Maintain the real negotiating floor for a different audience.
High-value credential backup
Your actual crypto seed phrase is in the real version. A different (empty) wallet's phrase is in the decoy. If forced to reveal, hand over the decoy โ it shows you cooperated but nothing of value can be taken.
The cryptographic guarantee
Two secrets are created completely independently. Each has its own encryption key. Each is stored as a separate, unlinked record. The server has zero information about which is real โ because there is no metadata linking them.
The decryption key lives in the URL fragment. You choose which URL to share. The link you share determines what the recipient sees. There is no cryptographic signature, timestamp order, or server-side metadata that can reveal which was created to be the "real" version.
This is structurally identical to VeraCrypt's hidden volume feature โ two valid explanations for the same apparent data. Both links are real CipherEdge links. Both produce valid decryption results. Only you know the mapping.