Hidden Containers


BestCrypt creates virtual drives on your computer. All data to be written to the virtual drive are placed into the container in encrypted form. The encryption algorithms used in BestCrypt are reliable, and the container cannot be decrypted without knowing the correct password.

But under some circumstances the user may be forced to disclose the password to his container. For this reason someone may wish to hide the existence of encrypted containers on the computer.

This aim is achieved with BestCrypt containers hidden in another container. There is a number of advantages to do this:

  • performance of the hidden containers is the same as the performance of the original containers;
  • hiding containers in this way does not waste space;
  • the potential intruder cannot prove whether an additional (hidden) container exists or not: the information stored in the hidden container is regarded as random data even you mounted the original container.

  • NOTE: IT IS STRONGLY RECOMMENDED THAT YOU READ THE Hidden Containers: Precautions AND Hidden Containers: A Good Advice SECTIONS TO ENSURE THAT YOU USE THE HIDDEN CONTAINERS PROPERLY.



    See also: