An excellent point Frank,Plausible deniability needs to be seen as a final "layer" of your security.Obviously your first defence lies in your discretion and anonymity. You're not ostentatious and don't visibly break the law.Your online activities are (hopefully) Torified and I would hope you all encrypt any personally identifying information with GPG.The Police would obviously need to arrest you for a chargeable offence or obtain a search warrant from a J.P in order to discover you had a machine containing encrypted data before they can require you to hand over your keys.If you do employ Plausible denial encryption, I would suggest you refuse to comment during interview and ask to see your Solicitor privately. Give them the "safe" password and have them prepare a written statement saying that you wish to surrender it to the Police and that you refuse to answer any further questions. Your Legal Adviser can read this out for you.If they start trying to press you about a second password, your Solicitor will then remind them that you have already entered a statement into the record. If the case comes to trial it will be much more difficult for adverse inferences to be drawn from your silence as you'll be able to present a defence entirely consistent with your original statement.I saw comments earlier saying it was easy to tell the difference between a Truecrypt container with a hidden volume and one without. While it is possible that a hidden Operating System can leak information, the same is not true of a Truecrypt container. As far as I know, short of bruteforcing a container on the offchance there's a hidden volume there is no way to prove its existence.News articles of people who have been found guilty of breaching RIPA by refusing to hand a password to the Police:http://www.bbc.co.uk/news/uk-england-11479831https://blog.ironkey.com/?p=842http://www.indymedia.org.uk/en/2007/11/385589.htmlV.Quote from: frank-butcher24 on May 16, 2012, 07:51 pmI believe Vladimir said in another thread recently that he knows of 3 cases where people have been convicted for a year. This is in the UK, where our last government made it a crime not to reveal your passwords when asked to do so.People shouldn't forget that plausible deniability is pretty much your last tool in the toolbox. Think about it. If you're in a situation where you have to use it, you're already pretty fucked. I mean, you've been arrested. You may have been under surveillance for some time. They've seized your hardware and located an encrypted file, and are threatening to convict you of a crime unless you reveal the password. It's a dire situation to be in for sure... being able to provide a key which "unlocks" the encrypted file may, just may, save your skin though.Plausible deniability is something I'd hate to be without, but damn, you want to be sure you're never in a situation to have to use it.