Using a decoy operating system, with another OS hidden by TrueCrypt?
Fresh3 days ago
Mar 15, 20264683 viewsConfidence Score0%
0%
Problem
TrueCrypt provides an option to use a hidden operating system. This works by having a decoy operating system residing on partition 1, and using partition 2 as (encrypted) data storage for the decoy OS. The catch is, TrueCrypt makes it possible for the partition 2, the "outer" partition, also contai…
Unverified for your environment
Select your OS to check compatibility.
1 Fix
Canonical Fix
Unverified Fix
New Fix – Awaiting Verification
Fix for: Using a decoy operating system, with another OS hidden by TrueCrypt?
Low Risk
It does appear that file copying will require a remount. Despite this, "You should use the decoy operating system as frequently as you use your computer. Ideally, you should use it for all activities that do not involve sensitive data. Otherwise, pl…
Awaiting Verification
Be the first to verify this fix
Sign in to verify this fix