[Discuss] Most common (or Most important) privacy leaks
Gordon Marx
gcmarx at gmail.com
Thu Feb 19 11:07:45 EST 2015
On Thu, Feb 19, 2015 at 10:52 AM, Doug <sweetser at alum.mit.edu> wrote:
> 2. I would like to hear more about " tools for plausible-deniability of the
> existence of secondary access codes". I don't quite know what that means.
I think the idea is to give the ability to communicate to the system
"Yes, I'm logging in, but I'm being coerced -- but don't let on that
you know, because I'm in danger if this doesn't appear to work".
More information about the Discuss
mailing list