<p>There are times when you might be forced to reveal the contents of a harddrive. To combat this you can go for a "Plausible Deniability Setup" where you have a drive that can be split. In my case i use a harddrive for this purpose, so it is actually possible to completely wipe it's contents if needed unlike on a SSD.</p>
<imgsrc="19.png"class="imgRz">
<p>First install veracrypt:</p>
<pre><codeclass="nim">
[ 10.0.2.2/24 ] [ /dev/pts/35 ] [/mnt]
→ sudo pacman -S veracrypt
</code></pre>
<p>Then just select the following:</p>
<imgsrc="20.png"class="imgRz">
<imgsrc="21.png"class="imgRz">
<imgsrc="22.png"class="imgRz">
<imgsrc="23.png"class="imgRz">
<imgsrc="24.png"class="imgRz">
<imgsrc="25.png"class="imgRz">
<imgsrc="26.png"class="imgRz">
<imgsrc="27.png"class="imgRz">
<imgsrc="28.png"class="imgRz">
<imgsrc="29.png"class="imgRz">
<imgsrc="30.png"class="imgRz">
<p>Then setup the hidden inner volume:</p>
<imgsrc="31.png"class="imgRz">
<imgsrc="32.png"class="imgRz">
<imgsrc="33.png"class="imgRz">
<imgsrc="34.png"class="imgRz">
<imgsrc="35.png"class="imgRz">
<imgsrc="36.png"class="imgRz">
<imgsrc="37.png"class="imgRz">
<imgsrc="38.png"class="imgRz">
<imgsrc="39.png"class="imgRz">
<imgsrc="40.png"class="imgRz">
<p>Then you can just mount the volume you created like so:</p>
<imgsrc="41.png"class="imgRz">
<imgsrc="42.png"class="imgRz">
<imgsrc="43.png"class="imgRz">
<p>Now we successfully mounted it in /mnt/veracrypt1 and as you can see it's type "Normal". This is the procedure to do if you want to are forced to give away your password. Now if you want to mount the real hidden volume instead you do the following:</p>
<imgsrc="44.png"class="imgRz">
<imgsrc="45.png"class="imgRz">
<p>And there you go ! You have plausible deniability setup on a drive connected to your computer. It is also being mounted in /mnt/veracrypt1, this time as the type "Hidden". Then you can put the whonix VMs in both partitions:</p>
<p>You can go through the above setup we saw in the first part to setup the whonix VMs on both partitions.</p>
<p>Keep in mind that there may be forensics clues on the Host OS (like command history) that may lead to the VMs so you have to replicate the VMs on both partitions. Such a setup will allow you to completely deny the existance of the whonix VMs B and their real usage. Instead when you are forced to reveal the password of your harddrive you can give the password of the Decoy outer volume with password A. NEVER mention password B anywhere, memorize it yourself. So go through the above process to setup the whonix VMs on both partitions after installing the veracrypt hidden volume (do not select "will mount only on linux" otherwise it will give you an error.) Then we will use 2 scripts to ensure a quick setup and trackscleaning:</p>
<p>That way you can have that script on both partitions, and simply refresh the VMs back to normal after you're done using it on the hidden volume. </p>
<pre><codeclass="nim">
[ 10.0.2.2/24 ] [ /dev/pts/34 ] [/mnt/veracrypt1]
→ chmod +x refreshvms.sh
[ 10.0.2.2/24 ] [ /dev/pts/34 ] [/mnt/veracrypt1]
→ ./refreshvms.sh
[sudo] password for nothing:
Domain 'Whonix-Gateway' destroyed
Domain 'Whonix-Workstation' destroyed
Domain 'Whonix-Gateway' has been undefined
Domain 'Whonix-Workstation' has been undefined
Network Whonix-External destroyed
Network Whonix-Internal destroyed
Network Whonix-External has been undefined
error: failed to get network 'Whonix-External'
error: Network not found: no network with matching name 'Whonix-External'
Network Whonix-External defined from Whonix_external_network-16.0.9.0.xml
error: Failed to define network from Whonix_internal_network-16.0.9.0.xml
Network Whonix-External marked as autostarted
Network Whonix-External started
Network Whonix-Internal marked as autostarted
Network Whonix-Internal started
Domain 'Whonix-Gateway' defined from Whonix-Gateway-XFCE-16.0.9.0.xml
Domain 'Whonix-Workstation' defined from Whonix-Workstation-XFCE-16.0.9.0.xml