Home   Documentation   FAQ   Downloads   News   Future   History   Screenshots   Forum   Contact  
 
   
  
 AES
   

System Encryption >  Hidden Operating System






Hidden Operating System

It may happen that you are forced by somebody to decrypt the operating system. There are many situations where you cannot refuse to do so (for example, due to extortion). VeraCrypt allows you to create a hidden operating system whose existence should be impossible to prove (provided that certain guidelines are followed). Thus, you will not have to decrypt or reveal the password for the hidden operating system. For more information, see the section Hidden Operating System in the chapter Plausible Deniability.
 




  Next Section >>


Legal Notices www.veracrypt.fr