The methods of breaking encrypted file-hosted volumes and how to protect yourself from them