Encryption

VeraCrypt and Encrypted Containers: Plausible Deniability and Hidden Volumes Explained

May 11, 2026 9 min read Haven Team

VeraCrypt is free, open-source encryption software that can create encrypted containers — files that mount as volumes — and encrypt entire partitions or drives. Its most distinctive feature is the hidden volume: a container that yields completely different contents depending on which of two passwords you enter. The plausible deniability property this creates is technically sound. Whether it helps in practice depends heavily on your specific threat model and operational discipline.


VeraCrypt is the successor to TrueCrypt, which was abandoned in 2014 under circumstances that generated significant controversy (the developers published a notice claiming it was insecure and recommending migration to BitLocker — widely interpreted as a canary warning, though never confirmed). The VeraCrypt fork has continued active development, addressed the cryptographic concerns raised in the TrueCrypt audit, and added support for modern algorithms and key derivation functions.

Understanding what VeraCrypt provides requires separating three distinct features: standard encrypted containers, full-disk encryption, and hidden volumes. They serve different purposes and have different threat models.

Standard Encrypted Containers

A VeraCrypt container is a file of fixed size — say, 10 GB — that contains an encrypted filesystem. When you mount it with the correct password, it appears as a drive letter (Windows) or mount point (Linux/macOS) with your files in it. When you dismount it, it's an opaque blob of encrypted data.

The encryption is strong: VeraCrypt defaults to AES-256 in XTS mode. Key derivation uses PBKDF2 with a high iteration count, configurable for SHA-512, Whirlpool, or other hash functions. You can use cascaded ciphers (AES-Twofish-Serpent) for additional layers if the paranoia warrants it, at a performance cost.

Containers are practical for:

Compared to full-disk encryption like BitLocker or LUKS, containers offer more flexibility — you can have multiple containers for different sensitivity levels, carry them on USB drives, and open them on different systems. The tradeoff is that the container file is visible and its size may reveal that you're storing something.

The Hidden Volume Architecture

VeraCrypt's hidden volume feature is cryptographically elegant. The mechanism:

  1. You create an outer volume of, say, 20 GB with password A. It contains plausible-looking files — documents, photos, routine data you don't mind disclosing under pressure.
  2. Within the outer volume's free space, you create a hidden volume with password B. It contains your actual sensitive material.
  3. When you mount with password A, you see the outer volume. When you mount with password B, you see the hidden volume.
  4. Cryptographically, the hidden volume occupies what appears to be random data in the outer volume's unallocated space. Because VeraCrypt containers are uniformly filled with random-looking encrypted data, there is no byte-level difference between "random noise" and "hidden volume encrypted data" — without the password, neither forensic analysis nor mathematical examination can prove a hidden volume exists.
The deniability claim

If compelled to reveal your password, you provide password A. The outer volume decrypts; its contents look legitimate. You have not disclosed the hidden volume's existence. Because VeraCrypt cannot be forced to reveal whether a hidden volume exists (it would be indistinguishable from random data to an adversary without the correct password), no forensic tool can disprove your claim that there is only one volume.

The hidden volume cannot be detected from the outside with current tools. VeraCrypt's documentation makes this explicit: the outer and hidden volumes occupy the same address space, with the hidden volume in the free space of the outer. The cryptographic randomness of both layers is indistinguishable.

Real Operational Limits of Plausible Deniability

The cryptographic deniability is genuine. The practical deniability depends on factors outside the algorithm:

The outer volume must look believable. An outer volume that contains nothing but an empty text file named "decoy.txt" is not convincing. The files in the outer volume need to look like they might actually be the reason you're encrypting anything. This requires maintenance — if the outer volume's file timestamps are all from 2019 and nothing in it has changed in years, the freshness mismatch is suspicious.

Protecting the hidden volume from outer volume writes. When you mount the outer volume with password A, writing new files to it can overwrite the hidden volume's data — because the outer volume sees that space as free. VeraCrypt has a "protect hidden volume" option when mounting the outer volume that prevents writes to the hidden volume's address space, but it requires entering password B to do so. Mounting the outer volume without this protection is a real risk if you're actively using both volumes.

Metadata outside the container. Your operating system maintains file access logs, shell history, recently opened files lists, thumbnail caches, and application-specific logs. If your OS logs show that a VeraCrypt container was mounted and a specific application (a PGP keyring manager, a password manager for sources) was launched, that record exists outside the container. Deniability against the encrypted bytes doesn't help if the surrounding metadata is readable.

Legal context varies. In the United States, the Fifth Amendment protects against compelled self-incrimination, and courts have generally held that compelling a password is testimonial — you can't be forced to provide it. The picture is different in the UK (Regulation of Investigatory Powers Act Section 49 allows courts to compel key disclosure), Australia, France, and other jurisdictions. In a coercive environment outside these legal frameworks, technical deniability may be irrelevant.

"The question 'can you prove a hidden volume exists?' is different from 'can you prove no hidden volume exists?' VeraCrypt makes the latter impossible, which is the right property."

VeraCrypt vs. Other Full-Disk Encryption Options

Tool Platform Hidden Volume Open Source Best For
VeraCrypt Windows, macOS, Linux Yes Yes Portable containers, plausible deniability
BitLocker Windows No No Full-disk encryption on Windows, convenience
LUKS Linux No Yes Full-disk encryption on Linux
FileVault macOS No No Full-disk encryption on macOS, convenience
Cryptomator All + mobile No Yes Cloud storage encryption, cross-device access

Setting Up VeraCrypt: Practical Guidance

Creating a standard container is straightforward — the VeraCrypt wizard walks through it. The choices that matter most:

For the hidden volume specifically: fill the outer volume with plausible content before creating the hidden volume inside it. Write enough data that the outer volume looks actively used. Then create the hidden volume in the remaining space, with a different, strong password.

VeraCrypt pairs well with other encryption layers — for example, storing an encrypted full-disk encrypted laptop's most sensitive files in a VeraCrypt container adds a second encryption layer that survives if the disk decryption key is somehow extracted. Defense in depth, applied practically.

When Hidden Volumes Don't Belong in Your Setup

Hidden volumes add complexity and operational risk. The outer-volume-overwriting-hidden-volume failure mode is real and non-obvious. If your threat model is "protect my data if my laptop is stolen" — standard full-disk encryption handles this completely; hidden volumes add cost without benefit.

Hidden volumes are appropriate when: (1) your threat model involves coercion with legal authority to demand passwords; (2) you operate in a jurisdiction where key disclosure can be legally compelled; (3) you are willing to maintain the operational discipline required to keep the decoy volume plausible and to mount with protection enabled. If any of those conditions is false, the added complexity likely creates more risk than it eliminates.

Encryption that works for real people

Haven encrypts your email and messages with strong, audited cryptography — without requiring you to manage keys manually.

Try Haven Free →