>>106206238
In Veracrypt, we have what are called hidden volumes. The way this works is, when you create an encrypted volume, you have the option to create two -- an inner volume and an outer volume. Each volume has a different password. The inner volume is created inside the encrypted storage of the outer volume, and therefore, is indistinguishable from free storage. At the time of creating the encrypted volume, it is advised that you place as many files as possible onto the outer volume, that you would consider embarassing enough to want to encrypt, but not especially damning. Maybe you'd use this for storing financial documents, which should probably be kept secret anyways. Or it contains porn that is not illegal but makes you look like a weirdo. Either way, it doesn't contain anything you don't want your attacker to have, but it gives you an excuse as to why you have up until now refused to give up your password.
Meanwhile, if they do not have the second password, they cannot access the real hidden files. They cannot prove that there is such a password, and moreover, if they accidentally write to the volume while the first password is in use, it is possible that the hidden/inner volume will be overwritten, and the data they want to crack out of you will be destroyed.