This is an extension of TrueCrypt (based on TrueCrypt 6. 1a) with two new features. First, instead of just one hidden volume, using cCrypt allows us to create up to three hidden volumes. Second, instead of mounting either outer or hidden volume of a encrypted repository, we can use cCrypt to mount BOTH outer and hidden volume(s) simultaneously and have the hidden volume(s) protected automatically. cCrypt also retains all other existing features of TrueCrypt 6. 1a. Create virtual encrypted disks (outer/hidden) within a file and mount them as real disks. Create up to three hidden volumes within a file. (since cCrypt 0. 7) Mount both outer and hidden volume(s) of a single cCrypt repository simultaneously and have the hidden volume(s) protected automatically. (since cCrypt 0. 6) Encrypt an entire partition or storage device such as USB flash drive or hard disk. Encrypt a partition or drive where Windows is installed (pre-boot authentication). Encryption algorithms: AES-256, Serpent, and Twofish. Mode of operation: XTS. Encryption is automatic, real-time and transparent. In case an adversary forces you to reveal your password, cCrypt provides and supports two kinds of plausible deniability: Hidden volume and hidden operating system. Until decrypted, a cCrypt partition/device appears to consist of nothing more than random data. Therefore, it is impossible to prove that a partition or a device is a cCrypt volume or that it has been encrypted.