2. it may not just look random, unless the encryption is done in a way that tries to be plausibly deniable. Not all disk/data encryption methods try to hide their existence.
2. it may not just look random, unless the encryption is done in a way that tries to be plausibly deniable. Not all disk/data encryption methods try to hide their existence.