In this final part of a three-part series on creating a hidden operating system with TrueCrypt, we'll complete the process with some cleanup. We'll also install the decoy system, and show you how to boot into the decoy or hidden system.
Cleanup After Starting Hidden System
Now that your hidden system is stated, TrueCrypt has some house-cleaning to perform. This consists of wiping the first partition so all the data are thoroughly destroyed. Click the "Next" button to start this process.
TrueCrypt will now detail the actions it is about to perform, including an explanation of why the first partition needs to be securely erased. Click the "Next" button to continue.
Next you will select a wipe mode. You have four wipe modes to choose from:
1-pass random data. Fastest, least secure.
3-pass (US DoD 5220.22-M). Department of Defense recognized; slower than 1-pass, but more secure.
7-pass (US DoD 5220.22-M). Department of Defense recognized; slower than 3-pass, but more secure.
35-pass ("Gutmann"). Completes 35 passes of random data. This is more secure than the 7-pass method, but it could take days for this process to complete.
For testing purposes, and since it requires the least amount of time, select the "1-pass random data" method, and then click the "Next" button.
Click the "Wipe" button.
TrueCrypt will prompt a warning about the entire first partition being erased. Click the "OK" button to continue.
In order for TrueCrypt to truly create random data, it will ask you to move your mouse randomly across the window. This action will generate a random number which TrueCrypt will use during the wiping process. After you have moved your mouse around the window for several seconds, click the "Continue" button.
Depending on the wipe mode you selected earlier, this process can span several minutes to several days.
Once the wipe process is complete, TrueCrypt will prompt a message detailing the success of the process. Click the "OK" button to close the window.
TrueCrypt will now present instructions for installing and creating the decoy system. You can print these instructions out as a backup, but I will detail these steps in the next section. This window will display during every boot of the hidden system until a decoy system is installed. Click the "OK" button to continue.
TrueCrypt will present another warning about the importance of installing the same version of Windows as used by the hidden system. This is necessary because both systems will share a single boot partition. Click the "OK" button to continue.
The entire hidden system encryption process is now complete. Now it is time to install the decoy system. Click the "Exit" button to close TrueCrypt and continue working with your computer.
This step is a good stopping point. You do not have to create the decoy system now. If you want to wait a few days and then create it, that is perfectly fine.
KEITHLEE2zdeconfigurator/configs/INFUSIONSOFT_OVERLAY.phpzdeconfigurator/configs/ OFFLOADING INFUSIONSOFTLOADING INFUSIONSOFT 1debug:overlay status: OFF overlay not displayed overlay cookie defined: TI_CAMPAIGN_1012_D OVERLAY COOKIE set: status off