Re: Another reason
Err, you can do this with Firefox, Chrome, etc see Selenium.
3 publicly visible posts • joined 25 Nov 2009
Sure, NP.
The idea is that you create a volume that is 2GB. This volume is a single file, which gives the encrypted drive on the non-encrypted drive room to grow. The unused part of the encrypted volume doesn't just have 00 are anything else. It _should be_ indistinguishable for the encrypted part without the key.
Without the key it all looks encrypted. If the noise at the end is another encrypted volume then opening the first volume with the key just looks like the noise you'd get if there was not encrypted volume. It does mean that the container volume with overwrite the hidden volume because it doesn't know that it is being used. Just like the unused part of a physical drive, the file system will just see it as free unallocated space and use it up. Typing in the other password means that it will decrypt in a way shows the hidden volume, it scans until it finds a valid decryption.
I say should they are thing like TCHunt which have vectors against this
P