Anonymous Ghostwriters - Rubber Hose Cryptography works by filling the entire hard drive with random characters that are indistinguishable from encrypted data. The file system then takes each archive of real data
The Best Defense Against Rubber-Hose Cryptanalysis | by Cory Doctorow | OneZero
Computer game secures crypto systems from rubber hose attacks | Ars Technica
Schlock Mercenary - Wednesday 29 Mar 2006
Neuroscience Meets Cryptography: Crypto Primitives Secure Against Rubber Hose Attacks | May 2014 | Communications of the ACM