An excellent point Kappacino,You can be encrypted provided that it can be demonstrated that your hard drive is indeed encrypted. This would be fairly easy for a forensic analyst if you use FDE as the Truecrypt bootloader* is installed to the same partition. You could of course encrypt the whole HDD and use a Live CD or bootable USD to access it. That way you could plausibly say your HDD has been wiped by overwriting it with random data and no one could tell the difference.The same applies if you encrypt an entire external hard drive / USB key. In theory Truecrypt containers i.e TC files created on an otherwise unencrypted hard drive aren't identifiable but in practice they have "perfect" block symmetry so it's hard to pass them off as random data.It is a good point however and it actually might be worth your while to let the matter run the whole nine yards and let it come to court before revealing a password - the burden of proof is still upon the Police to show that the volume is encrypted and hasn't been wiped.V.*The bit which loads up when you first switch on your computer and asks for your password in order to access the encrypted drive. In the nature of things this can't be encrypted too.Quote from: Kappacino on May 17, 2012, 12:37 pmQuote from: oscarzululondon on May 15, 2012, 04:18 pmBy the way to the people say "TrueCrypt your entire hard drive"...I personally know people who have served the mandatory 1 year in prison (in the UK) for not revealing their Truecrypt password to the police. Two of my friends now and it's becoming more common. Better make a hidden TrueCrypted operating system (hidden partition), or TrueCrypt a memory stick and keep your TOR on there.Are you sure that you can actually be convicted for not revealing your truecrypt password? Could you not just claim that it isn't even your computer to begin with?