The People's Signal By Transpara Labs

Anamorphic Encryption Messaging

Normal-looking messages. Hidden meaning when it matters.

The People's Signal explores a coercion-resistant messaging model where one ciphertext can carry both an innocuous message and a hidden real message, enabling plausible deniability under surveillance pressure.

  • Plausible deniability
  • Coercion resistance
  • Dual-message ciphertexts

Anamorphic Message Flow

Two plaintext intentions are encoded into one transmitted ciphertext and diverge at reception.

Journalist
Source
Overt message Covert message Observer view

Message Model

Message Model

  • 1 Sender encrypts a benign overt message and a hidden real message into one ciphertext.
  • 2 Standard key reveals only overt content under inspection.
  • 3 Shared double key reveals hidden content to trusted peers.

Designed for contexts where surveillance and coercion are plausible threats.

Anamorphic encryption concept visual

Why this product

The gap in current secure messaging

Mainstream encrypted messaging focuses on confidentiality during transit. In coercive settings, adversaries may still force device access or key disclosure. The People's Signal targets this threat model by supporting communication that remains deniable even when standard keys are exposed.

How It Works

Protocol flow for practical deniability

The concept builds on anamorphic encryption: ciphertexts are computationally indistinguishable from traditional public-key encryption outputs, while embedding hidden payloads recoverable only with a separately shared double key.

1. Setup

Users exchange anamorphic public keys and establish a double key through a secure channel.

2. Send

Sender creates one ciphertext containing both overt and covert messages.

3. Receive

Recipient decrypts overt content with standard key, then covert content with the double key.

Double-message scenarios

Two-party communication in real-world settings

Each exchange carries an overt message that remains safe to reveal under inspection and a covert message recoverable only by trusted recipients with the shared double key.

Journalist
Source
Journalist ↔ Source Overt: scheduling and logistics. Covert: sensitive testimony and evidence details.
Activist
Organizer
Activist ↔ Organizer Overt: public coordination notes. Covert: safe routes, legal contacts, emergency plans.
NGO Desk
Field Partner
NGO ↔ Field Partner Overt: status updates. Covert: identities, locations, and risk-level changes.

Security goals

Research claims driving the design

Anamorphic indistinguishability

Encrypted traffic should appear equivalent to standard ciphertexts to outside observers.

Coercion resistance

Users can reveal standard keys and overt messages without exposing covert communication.

Recipient privacy

Only intended recipients with the shared double key can recover hidden payloads.

Use cases

Built for high-risk communication contexts

Independent journalism

Protect source communications where device seizure or key disclosure is a realistic threat.

Civil society networks

Enable resilient coordination among activists and NGOs in hostile information environments.

Whistleblower channels

Maintain plausible deniability in disclosures involving sensitive political or institutional abuse.

Current status

Research prototype in progress

The People's Signal is currently a research-to-product initiative grounded in our paper "The People's Signal: Secure Messaging Against Surveillance and Coercion" (SACMAT'26 submission draft). We are refining protocol hardening, UX assumptions, and deployment pathways for pilot environments.