It doesn’t matter if your operating system can support encryption. VeraCrypt does something extra – it enables “plausible deniability“, something the operating system alone does not.
Plausible deniability is something I think is necessary when traveling anywhere you have to make contact with government officials.
It only takes three commands:
sudo add-apt-repository ppa:unit193/encryption sudo apt update sudo apt install veracrypt
You don’t need the “sudo”, of course, if you’re logged in as “root”.
I’ve heard and read stories of laptop computers (and storage devices) being confiscated at airports for various reasons. The TSA agents at American airports “imagine” laws being broken.
The last thing I need is to be hassled by TSA agents while traveling to and from the United States. I don’t think a USB flash drive with MP3 files on it would be considered a big deal but one with movies on it would probably draw suspicion.
Never mind that it’s perfectly legal for me to have copies of the movies I’ve purchased on DVD or blu ray discs – the MPAA doesn’t agree with me. Government agents tend to behave as agents for the MPAA at times. Just google “kim dotcom” if you don’t believe me.
Hiding files is the way to go. They can’t see and inspect what they don’t know is there. VeraCrypt makes it pretty easy to do.
If you’re afraid you won’t be able to regain access to your hidden and encrypted files because you’re using a different operating system, don’t sweat it. There’s a version of VeraCrypt for Windows, Linux and Mac OS X.
The easiest way, in my humble opinion, is to set up a Linux USB flash drive with VeraCrypt installed and store the encrypted files on the same drive. You’ll need software that uses “persistence” when creating the Linux drive, so the first go will probably be trial and error.