Is there any way to encrypt a Linux filesystem in such a way to maintain plausible deniability? E.g. "Hidden OS support," the way TrueCrypt and Veracrypt work, they only support Windows OS due to low level DISK IO (via filter driver) and support hasn't been extended to Linux.
As you know, TrueCrypt is no longer in development and VeraCrypt has yet to implement low level disk IO drivers.
What about running/chrooting a filesystem from a hidden partition/volume without it leaking in the 'normal'/unencrypted FS?
Edit:
Plausible Deniability a la (True/Vera)Crypt: there is an 'outer' encrypted container (which is encrypted/possess high entropy/appear random) and has an 'inner' encrypted container (which must possess the same trait) to where a password can be provided and depending on the password, it decrypts either the outer/inner container, so that an extortionist/blackmailer can be provided the 'outer' container password and be satisfied, yet still cannot prove the existence of any other encrypted data. Also, that I would want decrypt and chroot the filesystem and when I power down it stays encrypted.