Comment by rocqua

4 years ago

The technical solution is having very available, very believable lies. Something where you can "reveal" false secrets that decrypt to believable data by your attacker.

This is generally hard. Because you gotta know, at the time of being tortured, which fake secret will give believable results.