TrueCrypt 7: Creating Hidden Partitions - A Step-by-Step Guide

Creating a Hidden Volume with TrueCrypt
TrueCrypt is a robust, open-source encryption application renowned for its ability to securely encrypt files. We have previously detailed its functionality through guides on USB drive encryption and folder encryption. This article will demonstrate how to establish a hidden encrypted volume, designed to remain concealed even under duress.
The Concept of Hidden Volumes
A hidden volume operates within a larger, outwardly visible encrypted volume. This provides a layer of plausible deniability. If compelled to disclose the password for the outer volume, the existence of the inner, hidden volume remains unknown.
Steps to Create a Hidden Volume
The process involves several key steps. First, an outer volume is created with a specific size. Then, within that volume, a hidden volume is established, appearing as unused space.
It’s crucial to choose strong passwords for both volumes. The security of this system relies heavily on the strength of these credentials.
Important Considerations
- Sufficient Free Space: Ensure the outer volume has enough unallocated space to accommodate the hidden volume.
- Random Data: After creating the hidden volume, fill the remaining space in the outer volume with random data to obscure its presence.
- Password Management: Never store passwords together or in easily accessible locations.
TrueCrypt’s documentation provides detailed instructions and warnings regarding hidden volumes. Carefully review these resources before implementation.
By following these guidelines, a highly secure and concealed storage solution can be created, offering an additional layer of protection for sensitive data.
Hidden Volumes: A Layered Security Approach
An encrypted "hidden" volume offers a degree of "plausible deniability" in situations where data compromise is a concern. Should your storage devices be legally seized and password disclosure compelled, this method provides an additional security layer.
The process involves initially establishing an encrypted outer volume, populated with decoy files. Within this outer volume, a second, further encrypted volume is then created.
Dual Encryption for Enhanced Protection
This results in two password-protected volumes. You can disclose the password for the outer volume without compromising the security of the concealed, inner volume.
For a more detailed, technical explanation of hidden volumes, refer to the documentation available on the TrueCrypt website.
This technique allows for a separation of concerns, protecting sensitive data even under duress.
Plausible deniability is the core benefit, offering a defense against forced decryption of all data.
The creation of a hidden volume is a proactive step towards safeguarding your digital information.
Essential RequirementsHaving previously addressed fundamental Truecrypt file and folder encryption techniques, this demonstration will focus on encrypting an entire partition. This partition could reside on a USB hard drive or an additional hard drive installed within your computer.
Be aware that the selected drive will undergo complete formatting during this process. Therefore, it is crucial to ensure that no vital data is present on the drive beforehand.
Software Acquisition
A current version of TrueCrypt, compatible with your operating system, is also necessary. You can obtain the latest release from here.
This guide utilizes the Mac OSX version of the software; however, the user interface remains largely consistent across Windows and Linux platforms.
Preparing for Partition Encryption
Before proceeding, confirm that the target drive is properly connected and recognized by your system. Double-check that all important data has been backed up, as the formatting step is irreversible.
Important: Data loss is guaranteed during partition formatting. Proceed with caution and only on a drive containing no essential information.
TrueCrypt Installation
Install TrueCrypt following the standard installation procedure for your operating system. Once installed, launch the application to begin the partition encryption process.
The following steps will guide you through the creation of a hidden TrueCrypt volume on the selected partition, providing a robust layer of data security.
Establishing a Partition for Encryption
The initial step involves connecting your storage drive and establishing a partition designated for encryption. Instructions for partition creation on Windows were previously detailed. However, within an OS X environment, the process is streamlined through Disk Utility.
Locate the drive within the left-hand panel of the application, then select the Partition tab situated on the right side.
Partitioning Process
- Select the option for 1 partition.
- Assign a descriptive name to the newly created partition.
- Confirm the settings by clicking Apply.
This action will prepare a dedicated space on your drive for secure data storage.
Establishing an Encrypted Volume
Initiate TrueCrypt and select Create Volume. Opt for the second presented choice, designated as "Create a volume within a partition / drive".
Subsequently, designate the creation of a Hidden TrueCrypt Volume.
Exercise caution during the device selection phase. A clearly named partition will simplify this process. Proceed to select the appropriate device.
The subsequent stage involves encryption settings. The default configurations are considered sufficiently secure for highly classified governmental data, and are likely adequate for most users.
You will now be prompted to establish a password for the outer volume. This password should be one you infrequently utilize, and one you would be prepared to relinquish under duress. It’s crucial that this password differs significantly from the one protecting your hidden drive.
The following screen requires a degree of random mouse movement to enhance drive security. Approximately 30 seconds of movement is recommended, after which you can click Format.
Encrypting the outer volume can be time-consuming; for a 160 GB USB drive, it took around 90 minutes. However, this is a one-time process, with subsequent access requiring only password entry.
Next, populate the encrypted disk with decoy files. These should appear personal, such as home videos, representing data you wouldn't object to someone viewing if compelled. Warning: Avoid writing further data to this outer volume, as it could compromise your hidden volume’s integrity. It functions solely as a diversionary storage container. Select Open Outer Volume and begin copying files. Consider the plausibility of the file size; a small amount of "secret" data on a large drive may raise suspicion.
Once the copying process is complete, proceed by clicking next. TrueCrypt will automatically dismount the drive and calculate the remaining space available for your actual hidden volume.
Configure the outer volume similarly, but prioritize a robust and lengthy password. Incorporate uppercase and lowercase letters, numbers, and punctuation. A useful technique is to construct a sentence-based password, for example: 20MILLIONsecretF1l3$. When prompted about large file storage, select 'yes' to accommodate the increasing size of modern files, some exceeding 4 GB.
Allow time for the outer volume to be encrypted. You can then mount your secure hidden volume through TrueCrypt; it will not be mounted automatically upon creation. Simply click Mount All Devices and enter the correct password. Only the hidden volume password is required at this stage.
If your computer remains active for extended periods, remember to dismount the drive. The volume will be automatically dismounted following a system restart or shutdown.
Safeguarding Your Data: The Importance of Encrypted Volumes
Having reached this point in the discussion, it's evident you recognize the need to protect sensitive information. Employing a hidden, encrypted volume provides a crucial safeguard, offering a potential solution should unforeseen circumstances arise.
The question arises: what is the purpose of drive encryption if authorities possess the legal authority to compel the disclosure of decryption keys, or even impose penalties for non-compliance? A proactive approach is essential – provide inaccurate keys to protect your data.
Exploring TrueCrypt
Consider downloading and experimenting with TrueCrypt to understand its capabilities.
This software allows for the creation of secure, encrypted spaces on your storage devices.
- Data Protection: Encrypting your data renders it unreadable without the correct key.
- Plausible Deniability: Hidden volumes offer a layer of security, making it difficult to prove the existence of concealed data.
- User Control: You maintain control over your encryption keys, unlike cloud-based solutions.
Image credit: ShutterStock





