Are "images" of encrypted devices possible? How much does this help when an "image" of the encrypted device exists? Perhaps there need to be different sessions stored with different unlock codes for each session? (Much like some carry "fake" wallets to hand over during robbery.)