Quote from: genghar on June 11, 2012, 01:29 pmQuote from: vlad1m1r on June 11, 2012, 01:15 pmQuote from: genghar on June 11, 2012, 07:28 amI recently had a nightmare of being arrested. Yes, I'm a grown ass man and I'm having nightmares now.Is there any way to use Truecrpyt and Tails together? Something like, to even look at the Tails OS you need to enter a password? While using plausible deniability, of course - one bogus password that reveals nothing and one password that lets you in. I've done a tiny bit of research and have found extensive guides on how to use them. But only individually.Hi Genghar - TAILS seem to distrust Truecrypt due to the fact the source code isn't reviewed as regularly as they would like.It is possible to use the built in disk utility in TAILS to encrypt an external drive (https://tails.boum.org/doc/encryption_and_privacy/encrypted_volumes/index.en.html) However this will not give you plausible denial.V.Nearly all of your posts have me wanting to +1. This is another one of them.Can you point me in the right direction for the safest layman route of plausible deniability? I know a million guides have been written on this. Just a nudge is all I need.Hi buddy,The best way to have plausible denial is to encrypt a USB stick. Encrypting your hard drive with Truecrypt would reduce the likelihood of data being seized but a forensic analysis could still reveal the "bootloader" i.e the program which asks for your password and actually decrypts the drive which means you'd have no way of denying the machine's encrypted.If you really want to use Truecrypt with TAILS it is possible to install it each time you fire it up:- Put in the CD and boot your computer into TAILS.- Select the "more options" button before logging in to set an admin password.- Open up the IceWeasel browser and go to www.truecrypt.org/downloads- Scroll down to Linux and select "standard" (32 or 64 bit depending on your machine - if unsure choose 32).- Save the tar.gz file to your home folder or similar- Exit Iceweasal and open the folder where the Truecrypt tar.gz file is stored.- Right click the file and select "Extract Here." The tar file will extract a setup file alongside itself.- Right click this new file and click "Properties". Click the "Permissions" tab and make sure the tick box is checked next to where it says "Allow executing this file as a program."- Close the window and double click the file.- A terminal window will open. Choose Option 1.- Press enter to view the licence. Press and hold enter again to scroll down. When given the chance type "yes" to say you agree to the terms.- Enter the admin password you set up when logging in before to begin installation.- Go to Applications at the top left > Accessories > Terminal- Type "truecrypt" without the quotes and hit return.Congratulations you now have Truecrypt until you power off the machine at least...Watch this video to see how to use Truecrypt to create a USB stick with a hidden partition:http://www.youtube.com/watch?v=eJ_RBR9jVLQPlease bear in mind that you won't be able to use a USB with a hidden partition on Windows - not that you'll need to if you're using TAILS!Also take a peek at http://www.truecrypt.org/docs/?s=hidden-volume-precautions - to see how you can make sure your hidden volume stays that way.Remember your first defence when it comes to your encrypted USB stick being seized should be to claim that it's not encrypted but has been wiped using a secure erasure program. It's nearly impossible to tell the difference between a USB that's been erased in this way i.e by overlaying it with random data and an encrypted stick.Hope this helps.V.