Coercion Resistance

Users can maintain confidentiality and integrity under threat. Systems resist forced disclosure, extraction, and tampering.

Definition Summary

What it is: Coercion Resistance means the system is designed so that neither users nor administrators can be forced (under threat, legal compulsion, or torture) to disclose, modify, or destroy user data.

Why it matters: Vulnerable populations face hostile actors: authoritarian states, abusive partners, criminals, institutional oppressors. A system that can be forced to surrender data is not safe for them. Conversely, if the system is architected so that surrender is impossible or provably unhelpful, coercion loses its power.

When to use: Any system serving users under threat must incorporate coercion resistance. This includes dissident communication, abuse-survivor support, refugee networks, and privacy-critical services in hostile contexts.

Why Coercion Resistance Matters

Adversaries use coercion when compromise fails. An attacker who cannot hack your system might instead:

Against these threats, traditional security is useless. You cannot encrypt away coercion. You must architect so that:

Implementation Patterns

Zero-Knowledge Architecture

Design so the system (and administrators) never possess plaintext user data. Users hold encryption keys; the system stores only ciphertext.

Example: Signal stores messages encrypted until recipient downloads them. Server holds ciphertext only. If compromised, attackers get bytes they cannot use.

Passphrase-Based Encryption (Not Passwords)

Passwords are weak under coercion (users can be forced to reveal them). Passphrases are stronger: long, memorable, and secret even from the user who created them.

Plausible Deniability

Architecture where data's existence or authenticity is ambiguous:

Dead Man's Switch

Automatic data destruction if preconditions fail:

Decentralized Authority

Require threshold-of-N key reconstruction: no single person or entity can grant access.

Anti-Patterns (What to Avoid)

❌ "Security Through Obscurity"

Hiding vulnerability rather than eliminating it. System appears secure but surrenders instantly under coercion.

Consequence: False sense of safety. Real victims are harmed when system fails.

❌ Master Keys / Backdoors for Administrators

System designed so administrators can decrypt any user data. Under coercion, administrators become single points of failure.

Consequence: Coercers target administrators instead; identical breach surface.

❌ Weak Key Derivation

Passphrases encrypted with fast KDF (MD5, SHA-1). Coercers brute-force passphrases trivially.

Consequence: Passphrase protection is illusory.

❌ Mandatory Biometric Authentication

Fingerprint, face, or iris unlock. Under coercion, biometric can be used against user (forced unlock).

Consequence: User cannot deny access or plausibly claim they don't know the credential.

❌ No Destruction Mechanism

Data persists indefinitely. If system is compromised or coercer gains access, all history is available.

Consequence: Zero mechanism to protect past communications.

Real-World Examples

Signal — End-to-End Encryption with Forward Secrecy

What it is: Messaging system where messages are encrypted end-to-end; neither Signal servers nor any third party can read them.

How it works:

Coercion resistance: Authorities can compel Signal to insert backdoors, but they cannot compel decryption of past messages (keys no longer exist).

Briar — Offline Messaging Over Tor/Bluetooth

What it is: Messaging app for activists that works over Tor and Bluetooth mesh; works entirely offline.

How it works:

Coercion resistance: Extremely high. Attacker must physically seize devices to access encrypted data. Even then, passphrase protection resists decryption.

VeraCrypt — Hidden Volumes (Plausible Deniability)

What it is: Disk encryption tool that supports hidden encrypted volumes within larger encrypted volumes.

How it works:

Coercion resistance: User can plausibly claim there is no hidden volume. Coercers cannot prove otherwise.

Anti-Example: WhatsApp Server Records

The problem: WhatsApp (despite end-to-end encryption) stores metadata: who contacted whom and when. This metadata is decryptable and can be subpoenaed.

Consequence: Government can determine who is communicating but not what they say. For many purposes, this is sufficient to identify dissidents or targets.

Lesson: Coercion resistance requires defending metadata, not just message content.

Scope and Applicability

When to prioritize Coercion Resistance:

When you might defer Coercion Resistance:

Never defer for systems serving vulnerable users. If your users face threat, their physical safety depends on it.

Synthesis Lineage: Disciplinary Roots

Coercion Resistance formalizes patterns established across cryptography, security, and activism:

Cryptanalysis & Forward Secrecy

Modern cryptography (Diffie-Hellman, 2006+) emphasizes ephemeral keys and forward secrecy (Lor, Jager et al.). The insight: even if long-term keys are compromise, past sessions remain secure if session keys are deleted after use.

Protective Computing applies: Users need assurance that past communications cannot be decrypted, even if system is later compromised or coerced.

Plausible Deniability & Steganography

Security research (Anderson, Petitcolas) and cryptography (Rivest's "Chaffing and Winnowing") show that data can be hidden such that its existence is deniable. This protects against coercion: victim can truthfully claim "I don't have what you're asking for."

Protective Computing applies: Victims should be able to deny access to sensitive data without lying, making coercion strategically useless.

Zero-Knowledge Proofs

Mathematical cryptography (Goldwasser, Micali) enables systems where authority is proven without disclosure. User can prove they know a secret without revealing it.

Protective Computing applies: Systems should never require users to disclose secrets; proof of knowledge is sufficient.

Activist & Dissident Security Practices

Security research emerging from journalists, human rights organizations, and surveillance researchers documents coercion methods and countermeasures (EFF, Freedom of the Press Foundation, Guardian Project).

Protective Computing formalizes: Patterns observed in practice by activists and dissidents facing real coercion.

Relationship to Other Principles

Coercion Resistance depends on:

Coercion Resistance enables:

Next Steps

For system designers:

  1. Identify your users: Are they under threat? From whom?
  2. Map coercion vectors: How might attackers pressure users or administrators?
  3. Eliminate master keys: If system administrators have decryption access, coercers will target them.
  4. Implement zero-knowledge: Users encrypt locally; system stores only ciphertext.
  5. Add key derivation: Passphrases → keys via Argon2 or Scrypt (not fast hashes).
  6. Consider deniability: Can users plausibly claim sensitive data does not exist?
  7. Plan destruction: How are keys and data destroyed if system is compromised or user is threatened?

Related Principles

Next principle to explore: