48
are normally stored). If it fails and if there is a partition behind the active partition, the TrueCrypt
Boot Loader (even if there is actually no hidden volume on the drive) automatically tries to decrypt
(using the same entered password again) the area of the first partition
behind the active partition
*
where the encrypted header of a possible hidden volume might be stored. Note that TrueCrypt
never knows if there is a hidden volume in advance (the hidden volume header cannot be
identified, as it appears to consist entirely of random data). If the header is successfully decrypted
(for information on how TrueCrypt determines that it was successfully decrypted, see the section
Encryption Scheme
), the information about the size of the hidden volume is retrieved from the
decrypted header (which is still stored in RAM), and the hidden volume is mounted (its size also
determines its offset). For further technical details,
see the section
Encryption Scheme
in the
chapter
Technical Details
.
When running, the hidden operating system appears to be installed on the same partition as the
original operating system (the decoy system). However, in reality, it is installed within the partition
behind it (in a hidden volume). All read/write operations are transparently redirected from the
system partition to the hidden volume. Neither the operating system nor applications will know that
data written to and read from the system partition is actually written to and read from the partition
behind it (from/to a hidden volume). Any such data is encrypted and decrypted on the fly as usual
(with an encryption key different from the one that is used for the decoy operating system).
Note that there will also be a third password — the one for the
Dostları ilə paylaş: