![]() Select ‘Hidden VeraCrypt volume’ and click next.Make sure the ‘Create an encrypted file container’ radio button is selected, and click ‘Next’.From the VeraCrypt main screen click ‘Create Volume’.Please also note our section on the dangers of VeraCrypt’s hidden volumes feature towards the end of this article. If you need to hide highly sensitive data then please carefully consult the official documentation starting here (and take the time to fully understand the implications this information). Please note that this is a beginner's guide designed to help get you started using VeraCrypt hidden volumes. Of course, because this feature of VeraCrypt is known to data security specialists, it may be suspected that data is hidden, but there is no way to prove it (and thus coerce you into divulging the password for it). ![]() The key to this is that VeraCrypt fills up any empty volume space with random data, and it is impossible to distinguish this random data from a second volume hidden inside a ‘normal’ volume.Įven when the outer volume is mounted, it should be impossible to prove that another volume is hidden in the apparently random-data filled ‘free space’. It does this by hiding an encrypted volume inside another VeraCrypt volume in such a way that it is impossible to prove the second hidden volume exists (if the correct precautions are taken). One of the best features of VeraCrypt is that it allows you plausible deniability. If you haven't done so already, be sure to check out Part 1: VeraCyrpt & how-to basics
0 Comments
Leave a Reply. |