"Fossies" - the Fresh Open Source Software Archive

Member "doc/html/Security Requirements and Precautions.html" (10 Oct 2018, 7332 Bytes) of package /windows/misc/VeraCrypt_1.23-Hotfix-2_Source.zip:


Caution: In this restricted "Fossies" environment the current HTML page may not be correctly presentated and may have some non-functional links. You can here alternatively try to browse the pure source code or just view or download the uninterpreted raw source code. If the rendering is insufficient you may try to find and view the page on the project site itself.

VeraCrypt

Documentation >> Security Requirements and Precautions

Security Requirements and Precautions

IMPORTANT: If you want to use VeraCrypt, you must follow the security requirements and security precautions listed in this chapter.
The sections in this chapter specify security requirements for using VeraCrypt and give information about things that adversely affect or limit the ability of VeraCrypt to secure data and to provide plausible deniability. Disclaimer: This chapter is not guaranteed to contain a list of all security issues and attacks that might adversely affect or limit the ability of VeraCrypt to secure data and to provide plausible deniability.