Decoy Text
Definition
Decoy Text is ordinary text produced by transforming a seed phrase or sensitive data so that it appears natural, normal, and non-suspicious. Decoy Text contains no sensitive data, has no security value, and cannot be used to recover anything without the corresponding mapping file.
Because Decoy Text is purely textual, it can be stored as a text document and archived for the long term, including in permanent storage.
Characteristics
Decoy Text has the following key characteristics:
Pure text format
It can be stored as
.txt,.md,.doc, or any other text-based format.
Supports letters, numbers, and symbols
Decoy Text may include letters, numbers, and symbols, including combinations within a single word or sentence, as long as it remains textual.
Supports multiple languages
It is not limited to a single language and may use any language or a combination of languages.
Each element must be unique
No two words may be completely identical.
Words may appear similar as long as they are technically different, for example:
Differences in letter casing (
wordvswoRd)Added attached characters (
datavsdata_)Directly connected special characters (
filevsfile,)
Contains no sensitive patterns
It must not resemble a seed phrase, private key, or any other secret format.
Why it is safe to store or share
Decoy Text is safe to store or share because it:
Does not contain the Original Secret
Cannot be used on its own
Cannot be verified or guessed
Does not indicate any connection to sensitive data
Decoy Text is safe to:
Store on local devices
Save as a text document
Upload to permanent storage
Share via email, chat, or public platforms
Be given to anyone without risk
Without the mapping file, Decoy Text is nothing more than ordinary writing with no security value. It is intentionally designed to be safe to handle as regular text, even though it is part of a sensitive data protection system.
Last updated
