I2P , Tor , or a similar anonymizing network. 3. Verify the digital signatures of the downloaded file (see the sectimore information).
128
4. Run the downloaded file, and select Extract
(instead of Install
) on the second page of the TrueCrypt Setup wizard. Extract the contents to the RAM disk. 5. Run the file TrueCrypt.exe
from the RAM disk. Note: You may also want to consider creating a hidden operating system (see the section Hidden
Operating System
). See also the chapter Plausible Deniability
. Can I encrypt my system partition/drive if I don’t have a US keyboard? Yes, TrueCrypt supports all keyboard layouts. Can I save data to the decoy system partition without risking damage to the hidden system partition? Yes. You can write data to the decoy system partition anytime without any risk that the hidden volume will get damaged (because the decoy system is not
installed within the same partition as the hidden system). For more information, see the section Hidden Operating System
. Can I use TrueCrypt in Windows if I do not have administrator privileges? See the chapter ‘
Using TrueCrypt Without Administrator Privileges ‘.
Does TrueCrypt save my password to a disk? No. How does TrueCrypt verify that the correct password was entered? See the chapter
Technical Details , section
Encryption Scheme .