Encryption algorithms: AES-256, Serpent, and Twofish.2) No TrueCrypt volume can be identified (volumes cannot be distinguished from random data). Provides two levels of plausible deniability, in case an adversary forces you to reveal the password: 1) Hidden volume (steganography) and hidden operating system.Encryption is automatic, real-time (on-the-fly) and transparent.Encrypts a partition or drive where Windows is installed (pre-boot authentication).Encrypts an entire partition or storage device such as USB flash drive or hard drive.Creates a virtual encrypted disk within a file and mounts it as a real disk.