I'm new to Veracrypt but was wondering if the following scenario would give evidence a device "possibly" having a hidden volume.
Here's the scenario:
* There's a 1TB SSD formatted as a normal drive (NTFS, ext4, etc). Just a normal every day format
* A 500GB visable veracrypt volume is created
* Inside the 500GB VC volume a 100GB hidden volume is created (plausible deniability)
* The drive from the "bad guy" falls into the hands of the CIA
* Under interrogation, the bad guy gives up the password to the visible 500GB volume
* The CIA hacker-cracker knows about hidden VC volumes but as much as the CIA tries, they can't get the bad guy to admit it or hand over the PW
* The CIA hacker-cracker gets into the 500GB VC visible volume and writes a script to fill up the 500GB with a series of 1MB files and folders until the 500GB runs out of space. He then totals up the space taken by his script and files / folders
So, the question is:
Does the total amount of space = 400GB showing that "mysteriously" there's 100GB of space "somewhere"?
or
Does his script somehow / someway overwrite the 100GB hidden volume?
or
Do I not know what I'm talking about?
I know that this doesn't "prove" there's a hidden drive, but it sure insinuates it.
Just curious............. TIA
If you would like to refer to this comment somewhere else in this project, copy and paste the following link:
So, the question is:
Does the total amount of space = 400GB showing that "mysteriously" there's 100GB of space "somewhere"?
No. When you mount the outer volume with or without the option to protect the hidden volume from being overwritten, the outer volume size total is as if the hidden volume does not exist.
If you would like to refer to this comment somewhere else in this project, copy and paste the following link:
is that drive just randomly sitting in your home? if yes, then you're good
but in a more real life scenario that drive is inside a computer and anyone with access on windows partition not only it will break your plausible deniability but will also get tons of actual data and metadata from the encrypted drive as windows tends to leak everything you do, especially now with the new "feature" of windows screenshoting your desktop every few hours.
If you would like to refer to this comment somewhere else in this project, copy and paste the following link:
I'm new to Veracrypt but was wondering if the following scenario would give evidence a device "possibly" having a hidden volume.
Here's the scenario:
* There's a 1TB SSD formatted as a normal drive (NTFS, ext4, etc). Just a normal every day format
* A 500GB visable veracrypt volume is created
* Inside the 500GB VC volume a 100GB hidden volume is created (plausible deniability)
* The drive from the "bad guy" falls into the hands of the CIA
* Under interrogation, the bad guy gives up the password to the visible 500GB volume
* The CIA hacker-cracker knows about hidden VC volumes but as much as the CIA tries, they can't get the bad guy to admit it or hand over the PW
* The CIA hacker-cracker gets into the 500GB VC visible volume and writes a script to fill up the 500GB with a series of 1MB files and folders until the 500GB runs out of space. He then totals up the space taken by his script and files / folders
So, the question is:
Does the total amount of space = 400GB showing that "mysteriously" there's 100GB of space "somewhere"?
or
Does his script somehow / someway overwrite the 100GB hidden volume?
or
Do I not know what I'm talking about?
I know that this doesn't "prove" there's a hidden drive, but it sure insinuates it.
Just curious............. TIA
No. When you mount the outer volume with or without the option to protect the hidden volume from being overwritten, the outer volume size total is as if the hidden volume does not exist.
is that drive just randomly sitting in your home? if yes, then you're good
but in a more real life scenario that drive is inside a computer and anyone with access on windows partition not only it will break your plausible deniability but will also get tons of actual data and metadata from the encrypted drive as windows tends to leak everything you do, especially now with the new "feature" of windows screenshoting your desktop every few hours.