TrueCrypt also supports a concept called plausible deniability. This feature allows a single hidden volume to be created within another volume. Windows users can even create an encrypted, hidden operating system whose existence can be denied. TrueCrypt might be the single best means of hiding your business data on your BYOD.
Credit: Images by Jack Wallen for TechRepublic
Jack Wallen is an award-winning writer for TechRepublic and Linux.com. He’s an avid promoter of open source and the voice of The Android Expert. For more news about Jack Wallen, visit his website jackwallen.com.