COURSE 1 - 6. Nested encryption
So far, we have discussed different encryption methods and shown how they work, individually. However, these encryption methods can also be combined one into the other, like onion layers. For example, you could have (the combinations are infinite: be creative):
a USB stick encrypted with LUKS;
inside of it, a certain number of pictures, one of which has been encrypted with steghide;
inside of it, you can have a VeraCrypt file container encrypted with plausible deniability;
inside the hidden volume of it, you can have a KeePassXC encrypted database;
inside of it, you can have some text or files encrypted with PGP symmetric or asymmetric encryption.
This is 5 different levels of very strong encryption that protect your data. If (!) the computer where you worked is secure and cold, and of course if the OS used was Tails, then your data would be pretty safe.