Attack Mode

If you are attacked and forced to reveal the password of your taSecretSafe file, you want to present something that looks convincingly like your real secrets, but in reality is just rubish.

How does it work?

You need to prepare for such a case: You create your fake file like all taSecretSafe files, and you store it in the same directory and with the same name as your real file. But you give it the extension .tsa instead of .tss. And, you must set a different password. So, if your real file is \taSecretSafe\mySecrets.tss, your fake file must be \taSecretSafe\mySecrets.tsa
It is also a good idea to set the hidden attribut on your fake file, so it is not shown in file explorer or dialog boxes.

If you open your real file, taSecretSafe will first try to open it with the password you entered. If this does not work, it will try to open the fake file with this password. Only if this also fails, it will display a message, saying that the password is wrong. If the password is accepted, you will only see by the content, whether the real or the fake file was opened.

Additional information