๐ŸŽญ Plausible Deniability

Two passwords. Two truths.
Only you know the real one.

Create two independently encrypted secrets: a real one and a convincing decoy. Under pressure, hand over the decoy link. Cryptographically impossible to prove which is real. Inspired by VeraCrypt hidden volumes โ€” applied to secrets.

Journalists in hostile territories ๐Ÿ“ฐLegal depositions โš–๏ธM&A negotiations ๐Ÿ’ผHigh-value credentials ๐Ÿ”‘

Both secrets are independently encrypted ยท Neither can be proven to be "the real one" ยท Zero-knowledge

Who uses plausible deniability

๐Ÿ“ฐ

Journalists & activists

In hostile environments, carrying a device with sensitive contacts and documents is dangerous. With plausible deniability, the device contains the decoy version. The real version is accessed from a safe location.

โš–๏ธ

Legal depositions

Under subpoena or deposition, reveal the decoy link. The opposing counsel receives the decoy โ€” which contains information accurate enough to satisfy scrutiny but not the full picture.

๐Ÿ’ผ

M&A negotiations

Two competing term sheets for different scenarios. Share the less aggressive terms with the first party. Maintain the real negotiating floor for a different audience.

๐Ÿ”’

High-value credential backup

Your actual crypto seed phrase is in the real version. A different (empty) wallet's phrase is in the decoy. If forced to reveal, hand over the decoy โ€” it shows you cooperated but nothing of value can be taken.

The cryptographic guarantee

Two secrets are created completely independently. Each has its own encryption key. Each is stored as a separate, unlinked record. The server has zero information about which is real โ€” because there is no metadata linking them.

The decryption key lives in the URL fragment. You choose which URL to share. The link you share determines what the recipient sees. There is no cryptographic signature, timestamp order, or server-side metadata that can reveal which was created to be the "real" version.

This is structurally identical to VeraCrypt's hidden volume feature โ€” two valid explanations for the same apparent data. Both links are real CipherEdge links. Both produce valid decryption results. Only you know the mapping.