"Fossies" - the Fresh Open Source Software Archive

Member "doc/html/Security Requirements for Hidden Volumes.html" (10 Oct 2018, 22215 Bytes) of package /windows/misc/VeraCrypt_1.23-Hotfix-2_Source.zip:


Caution: In this restricted "Fossies" environment the current HTML page may not be correctly presentated and may have some non-functional links. You can here alternatively try to browse the pure source code or just view or download the uninterpreted raw source code. If the rendering is insufficient you may try to find and view the page on the project site itself.

VeraCrypt

Documentation >> Plausible Deniability >> Hidden Volume >> Security Requirements for Hidden Volumes

Security Requirements and Precautions Pertaining to Hidden Volumes

If you use a hidden VeraCrypt volume, you must follow the security requirements and precautions listed below in this section. Disclaimer: This section is not guaranteed to contain a list of all security issues and attacks that might adversely affect or limit the ability of VeraCrypt to secure data stored in a hidden VeraCrypt volume and the ability to provide plausible deniability.

In addition to the above, you must follow the security requirements and precautions listed in the following chapters:

Next Section >>


* This does not apply to filesystems on CD/DVD-like media and on custom, untypical, or non-standard devices/media.