Hidden Operating System
隐藏的操作系统
It may happen that you are forced by somebody to decrypt the operating system. There are many situations where you cannot refuse to do so (for example, due to extortion). VeraCrypt allows you to create a hidden operating system whose existence should be impossible to prove (provided that certain guidelines are followed). Thus, you will not have to decrypt or reveal the password for the hidden operating system. For more information, see the section Hidden Operating System in the chapter Plausible Deniability.
可能会有人强迫解密操作系统。在许多情况下,你不能拒绝这样做(例如,由于勒索)。VeraCrypt允许创建一个隐藏的操作系统,其存在应该无法证明(前提是遵循某些准则)。因此,将不必解密或透露隐藏操作系统的密码。有关更多信息,请参阅“合理拒绝”一章中的“隐藏的操作系统”一节。