1<p>The Persistent Storage is not hidden. An attacker in possession of your USB stick can know that there is a Persistent Storage. Take into consideration that you could be forced or tricked to give out its passphrase.2</p>
[LUKS](https://gitlab.com/cryptsetup/cryptsetup/) and [DMCrypt](https://gitlab.com/cryptsetup/cryptsetup/-/wikis/DMCrypt) are the standard system for disk encryption in Linux. Tails uses their default encryption parameters, which are considered highly secure. This is the same technique as we recommend for [[creating and using encrypted volumes|doc/encryption_and_privacy/encrypted_volumes]] in general.
8<p>We recommend choosing a long passphrase made of 5 to 7 random words. 9<a href="https://theintercept.com/2015/03/26/passphrases-can-memorize-attackers-cant-guess/">Learn about the maths behind memorizable and secure passphrases.0</a></p>