I have a pressing question about TrueCrypt. Granted it may in fact be nothing more than my ignorance of exactly how the prog is supposed to operate. The problem deals with hidden volumes. As I understand it, a hidden volume is simply a container within a container. Using this technique you then have acquired "plausible deniability", whereby you can easily deny the existence of the hidden container, since it cannot be proven that it actually exists. (Hopefully I am not mis-stating anything here.) Let's say for example that on a new partition I place the following files: video1.mpg video2.mpg and video4.mpg Now I create a TrueCrypt container and call it video3.mpg (since you can give a container any extension and the idea is to make the container blend in with my existing files.) The purpose of this container is to hold a hidden container where I will place my most sensitive files. I will therefore size this container at 60GB. Inside this container (video3.mpg) I place a few files that I would like to hide, but would not be disastrous if they were to be found. Let's say these files are: music1.mp3 music2.mp3 and music3.mp3 Now I am going to create my hidden container. I will call my hidden container music4.mp3. This container is created 'inside' my outer container (video3.mpg). This will be where all of the files I really want to keep hidden will be located, so I'll size it at 50GB (10GB less than the outside container size of 60GB.) I now move all my most secretive files into music4.mp3, my top secret container. ** Here's the part I don't understand ** When browsing the partition in Windows Explorer you will see... video1.mpg, which can be played and shows a file size of say 1.9MB video2.mpg can be played and shows a file size of .8MB video4.mpg can be played and shows a file size of 6.9MB However, video3.mpg - the outer encrypted container - cannot be played, and worst of all, shows a file size of 60GB. Obviously, to anyone looking, this is not just another mpg file, but some sort of container. Now, using the plausible deniability scenario from TrueCrypt, let's say I am forced to reveal the password to this outer container. Under this scenario, even once the outer password has been compromised (according to the TrueCrypt folks), my truly hidden files are supposed to be safe and sound. But, by opening the outer container using the forcefully acquired password I now see: music1.mp3 which can be played and shows a file size of 2.9MB music2.mp3 which can be played and shows a file size of 3.2MB music3.mp3 which can be played and shows a file size of 2.7MB and then there's music4.mp3 - my top secret hidden container - which cannot be played and shows a file size of 50GB! Obviously this is another container, just like the outer container, that I was just forced to provide the password to. SO WHY WOULDN'T I JUST BE FORCED TO PROVIDE THIS PASSWORD AS WELL?? If the container can be seen, and it is noticeably different from all the other files (or even if it wasn't - it's certainly not impossible to actually check out every file) then I can't see how you could possibly 'deny' that it exists?! Am I doing something wrong in setting up my containers? Am I misunderstanding something here? Hopefully someone can help shed some light on this puzzling predicament for me.