<p>The Persistent Storage is not hidden. An attacker in possession of your USB stick can know that there is a Persistent Storage. Take into consideration that you could be forced or tricked to give out its passphrase.</p>
[LUKS](https://gitlab.com/cryptsetup/cryptsetup/) and [DMCrypt](https://gitlab.com/cryptsetup/cryptsetup/-/wikis/DMCrypt) are the standard system for disk encryption in Linux. Tails uses their default encryption parameters, which are considered highly secure. This is the same technique as we recommend for [[creating and using encrypted volumes|doc/encryption_and_privacy/encrypted_volumes]] in general.
<p>We recommend choosing a long passphrase made of 5 to 7 random words. <a href="https://theintercept.com/2015/03/26/passphrases-can-memorize-attackers-cant-guess/">Learn about the maths behind memorizable and secure passphrases.</a></p>