http://blog.nowherejezfoltodf4jiyl6r56jnzintap5vyjlia7fkirfsnfizflqd.onion/opsec/anonsensitive/index.html
Bob’s setup, although suitable for Anonymous Use, is not suitable for Sensitive Use due to the lack of Deniable Encryption For instance, if Bob had implemented VeraCrypt’s deniable encryption to store the sensitive data, he could’ve given password A to open the decoy volume for the adversary, and could’ve claimed that there was no hidden volume.