top of page

COURSE 1 - 6. Nested encryption

So  far, we have discussed different encryption methods and shown how they  work, individually. However, these encryption methods can also be  combined one into the other, like onion layers. For example, you could  have (the combinations are infinite: be creative):


  1. a USB stick encrypted with LUKS;

  2. inside of it, a certain number of pictures, one of which has been encrypted with steghide;

  3. inside of it, you can have a VeraCrypt file container encrypted with plausible deniability;

  4. inside the hidden volume of it, you can have a KeePassXC encrypted database;

  5. inside of it, you can have some text or files encrypted with PGP symmetric or asymmetric encryption.


This is 5 different levels of very strong encryption that protect your data. If (!) the computer where you worked is secure and cold, and of course if the OS used was Tails, then your data would be pretty safe.

bottom of page