Eu não acho que é possível fazer isso de dentro do ambiente Windows, no entanto, se você for capaz de inicializar em um drive USB ou em um CD de boot, você pode usar algo como true crypt em suas FAQ e então crie uma partição oculta em seu verdadeiro container crypt.
I live in a country that violates basic human rights of its people. Is it possible to use TrueCrypt without leaving any 'traces' on unencrypted Windows?
Yes. This can be achieved by running TrueCrypt in portable mode under BartPE or in a similar environment. BartPE stands for "Bart's Preinstalled Environment", which is essentially the Windows operating system prepared in a way that it can be entirely stored on and booted from a CD/DVD (registry, temporary files, etc., are stored in RAM – hard drive is not used at all and does not even have to be present). The freeware Bart's PE Builder can transform a Windows XP installation CD into a BartPE CD. Note that you do not even need any special TrueCrypt plug-in for BartPE. Follow these steps:
Create a BartPE CD and boot it. (Note: You must perform each of the following steps from within BartPE.
Download the TrueCrypt self-extracting package to the RAM disk (which BartPE automatically creates).
Note: If the adversary can intercept data you send or receive over the Internet and you need to prevent the adversary from knowing you downloaded TrueCrypt, consider downloading it via I2P, Tor, or a similar anonymizing network.
Verify the digital signatures of the downloaded file (see this section of the documentation for more information).
Run the downloaded file, and select Extract (instead of Install) on the second page of the TrueCrypt Setup wizard. Extract the contents to the RAM disk.
Run the file TrueCrypt.exe from the RAM disk.
Note: You may also want to consider creating a hidden operating system (see the section Hidden Operating System in the documentation). See also the chapter Plausible Deniability.