• @myplacedk
    link
    93 months ago

    The point is they don’t have to proof if a piece of random data is indeed an encrypted blob.

    But they do need to suspect it.

    If they find an encrypted blob, ask for the decryption key, they decrypt the data and analyse the decrypted data, then they may not suspect that a different decryption key will reveal a different set of data.