Follow this guide to use the plausible deniability feature of OnlyKey
Edit me

About Plausible Deniability

General information on OnlyKey plausible deniability mode is available here.

General information on the International Travel Edition OnlyKey firmware is available here.

Steps to Setup Plausible Deniability

Step 1. Select the Advanced checkbox and then select [Next] to get started.

Step 2. Enter a PIN code, check the disclaimer box, and select [Next].

Step 3. Re-enter PIN code, and select [Next].
Step 4. Enter a PIN code for second profile, check the disclaimer box, check the Plausible Deniability Profile radio button, and select [Next].

Step 5. If you wish to set a self-destruct PIN enter a PIN code, check the disclaimer box, and select [Next].

Step 6. Re-enter PIN code, and select [Next].
Step 7. Follow the instructions to enter a Backup Passphrase and select [Next].

Step 8. If you have an OnlyKey backup to restore, select [Choose File] and select your OnlyKey backup file and then select [Next] to load it onto your OnlyKey. If you do not have a backup just select [Next] to complete the setup.

Step 9. Your device will now automatically reboot. Enter the PIN for you first profile to unlock OnlyKey.
Step 10. Select [Preferences] from the top menu and then click [Set Wipe Mode]. Full wipe will completely erase both the OnlyKey data and firmware in the event of a factory default.

Plausible Deniability FAQ

Q - Is it believable that my OnlyKey only has one profile (only 12 slots used)? A - We actually sell quite a few international travel edition Onlykeys so yes it is believable that you are using one of these. Even if you did not purchase an International Travel Edition Onlykey it is plausible that you have one because you can download and load the international travel edition firmware here. People buy these when they live in or want to travel places where strong encryption may be banned.

Q - Why not just give an adversary your self-destruct PIN? A - If you are not concerned with plausible deniability then yes the self-destruct pin would be fine. The adversary would obviously know that this was intentional.

Q - Wouldn’t it be possible for an adversary to brute force the primary profile PIN by trying 9 pins and then entering the secondary profile pin? A - When using a plausible deniability profile there is a counter that counts how many failed login attempts since the last primary profile login. You have a maximum of 20 failed attempts since the last successful login to the primary profile. Once that is reached the primary profile hash is deleted, essentially the primary profile is gone forever.