HiR Information Report: Rubber-hose cryptanalysis and how to not get a wrench to the head
HRDAG – Human Rights Data Analysis Group | Strong Crypto Safeguards Human Rights Data
Dan Boneh - SaTC Cyber Cafe
Anonymous Ghostwriters - Rubber Hose Cryptography works by filling the entire hard drive with random characters that are indistinguishable from encrypted data. The file system then takes each archive of real data
The Internet of Things, Curve25519, Rubber-Hose Cryptanalysis - YouTube
Rubber-Hose Cryptanalysis | Surhone, Lambert M., Timpledon, Miriam T., Marseken, Susan F. |本 | 通販 | Amazon
טוויטר \ Peter Leimbigler בטוויטר: "@austwitnerd @ZachWeiner Conventionally known as rubber-hose cryptanalysis, which is very computationally inexpensive: https://t.co/ZpxKVWWQBh"
Rubberhose cryptography and the idea behind Wikileaks: Julian Assange as a physics student | by Niraj Lal | Medium
Computer game secures crypto systems from rubber hose attacks | Ars Technica
Peter Gutmann at AusCERT 2014 - Crypto Won't Save You - Speaker Deck