This demo shows how an encrypted image can be decrypted into two different disk images, depending on which password you use. Plausibly deniable encryption can be a powerful tool, but keep in mind that even just using an encryption format which supports hidden images might be suspicious.
If you would like to create your own volume, the VeraCrypt website provides clear instructions for doing so. The application is entirely GUI-based, no terminal required!
A pre-made volume file that we showed in class is available for download here.
The “fake” volume can be opened with password
password, while the hidden volume can be opened with
betterpassword. You should be able to see that the contents of the two volumes are totally different. In addition, there is no indication that there is anything else hidden inside the “fake” volume.