Re: Using uncrypted Vista partition as TSA bait and encrypting Hardy partition - how?
Frankly, that would be a waste of time and effort. In the vanishingly small chance that you do get tapped for imaging, how are you going to explain all the missing real estate on that drive?
It's not going to be some $16/hr TSA gate agent type that's going to be doing the forensics, it's going to be someone considerably better qualified, equipped with tools from both commercial sources (like Encase) and what the NSA/CIA/DIS have. When this person sees the structure ... you've clearly something to hide. That's like bleeding into a pool of sharks. They'll be all over you. Forever.
Setting GRUB to boot Vista is good enough. All the gate TSA type wants to see is a functioning computer.
Main system: Dell 1420n - C2D T5250, 4GB RAM, 120GB SATA. Ubuntu 8.04.3.
Assorted VMs (via VBox). Favorites: Fedora, FreeBSD, Solaris.