Full disk (/partition) encryption means you don’t know what files there are until you decrypt. Additionally for that sort of encryption scenario you fill the partition with random data first so you can’t tell files from empty space (unless the attacker can watch the drive over time).
One possible countermeasure being https://en.wikipedia.org/wiki/Deniable_encryption
I know veracrypt has a form of this. You can set up two different keys, and depending on which one you use, you decrypt different data.
So you can encrypt your stuff, and if anyone ever compels you to reveal the key, you can give the wrong key, keeping what you wanted secured, secure.
won’t they know there are files they haven’t decrypted?
if it could hide or delete the remaining files encrypted that would be nifty.
Full disk (/partition) encryption means you don’t know what files there are until you decrypt. Additionally for that sort of encryption scenario you fill the partition with random data first so you can’t tell files from empty space (unless the attacker can watch the drive over time).
There was an encryption system a few years ago that offered this out of the box.
I can’t remember the name of it but there was a huge vulnerability and basically made the software unusable.
Crypt box or something like that.
The prominent one was called Marutukku - and the developer turned out to be someone who might actually need the feature.
As referred in other comment, the counter counter is to just keep beating to get further keys/hidden data.