Setting up false volumes in TrueCrypt

TrueCrypt is a free tool to create virtual encrypted disks housed within individual files, or a ‘volume within a volume’ – a hidden operating system and set of files that is invisibly housed in an encrypted file.

1. Inner and hidden volumes
A hidden volume is hidden inside another file with a separate password. This might smack of paranoia, and it’s crucial to manage it carefully, but if your customer is concerned about being forced to reveal their decryption key by customs
or immigration officials – which the US Department 
of Homeland Security can now require – they can hand over the outer volume and password without revealing the hidden one, which is protected using stenography.

-- click image to enlarge --

2. Choose a password

Multiple key files can be used in conjunction with a password to make the system more secure by stopping key loggers and brute force attacks. Any type of file including a MP3 can be a key file. During key generation, TrueCrypt asks you to move your mouse randomly in the window to create a random pool of data that it then uses to generate a cryptographic key for your data.

-- click image to enlarge --

3. The finished outer volume
The outer volume has been created in the form of a file, which can be mounted as a disk image. Decoy data is then copied onto this ‘disk’.

-- click image to enlarge --

4. Creating the hidden volume
Set the password and size for the hidden volume, which will be inside the file but which will not show when the disk is mounted. You’ll also need to create a TrueCrypt Rescue Disk on CD or DVD – and if the password changes, you’ll need to make a new recovery disc.

-- click image to enlarge --

Link to a Relevant Feature Click here to go to the main feature - Specifying and Supporting Disk Encryption


Show other articles by this author

Share |
Write comment
security image
smaller | bigger



Subscribe and get the magazine in the post before it's online

Subscribe and get access to all of the back issues

To read a sample eMagazine - March 2010



leave When you add a new user and their email address doesn't show up in the Global Address List, work through the tips and suggestions in the ever-useful Exchangepedia Blog:
Bulk-add new users with the script here ( or give existing users mail access ( - this also has details for adding multiple meeting rooms as resources). And when an employee gets replaced, the steps at make it easy to connect the previous user's mailbox to the new user account so that mail for that job role keeps going to the right place. Reject spam with a custom message Just in case the message you're rejecting comes from a real person, you can have Exchange send a less cryptic message that the default error; it will make your customers look more professional. This blog post
explains how - but make sure to keep the 550 error code at the beginning.
read more


Unified communications


The #1 Bestseller for Only 77p

Key resources

Login to view Key Resources