Sabbath wrote:If you don't expand it to cover the whole idea of hidden volumes (including single level) then you are placing any user in an awkward legal position with your single layer option. You will effectively be forcing them to create a hidden volume when they don't need one. If they fail to do so, or forget the second password, they will be suspected of concealing one and a lengthy prison sentence awaits them.
No I'm not, yor own other means of solving the issue of a means to prove the negative case is sort-of viable too.
I've just deleted most of what I was going to write, I had a lightbulb moment
while I was walking the dog, thanks for mentioning brute forcing, it caused what was nagging subconciously to precipitate.
I do not need anymore to argue about if hidden volumes are good or bad in and of themselves,
multiple levels of them absolutely are, and proveably so compared to a single level:
Situation #1 Current capabilities:
Alice has sensitive documents which she has stored in a hidden volume inside an encrypted container, she understands the security requirements to not leak information and has set a good passphrase,she is compelled (by law) to give up the passcode to the outer volume at the border, and complies.
Finding nothing sensitive, the authorities now attempt brute force attacks attempting to open the hidden container they suspect but can't prove for some period of time, if Alice's password is reasonable strength, they have a fixed chance of doing so before they exceed the ime and financial constraints they're under.
Situation #2
Alice divided her sensitive information between 4 hidden volumes, with 4 different passphrases, everything else remains the same:
Let's now look at the differece, for each iteration of the password cracker, the authorities now have 4 times as much chance of exposing 1/4 of Alice's sensitive information, Alice is now 4 times as likely to be locked up.
Conclusion:
Extending the capability is simply bad security, all other arguments have become side issues.
Even if Alice puts all the sensitive data in one hidden volume only, disclosing a decoy won't stop an adversary atempting to brute force knowing another may be present, and her chances of detection remain completely unchanged from the present.