FG

Using a decoy operating system, with another OS hidden by TrueCrypt?

Fresh3 days ago
Mar 15, 20264683 views
Confidence Score0%
0%

Problem

TrueCrypt provides an option to use a hidden operating system. This works by having a decoy operating system residing on partition 1, and using partition 2 as (encrypted) data storage for the decoy OS. The catch is, TrueCrypt makes it possible for the partition 2, the "outer" partition, also contai…

Unverified for your environment

Select your OS to check compatibility.

1 Fix

Canonical Fix
Unverified Fix
New Fix – Awaiting Verification

Fix for: Using a decoy operating system, with another OS hidden by TrueCrypt?

Low Risk

It does appear that file copying will require a remount. Despite this, "You should use the decoy operating system as frequently as you use your computer. Ideally, you should use it for all activities that do not involve sensitive data. Otherwise, pl…

Awaiting Verification

Be the first to verify this fix

Sign in to verify this fix

Environment