658731
35
Zoom out
Zoom in
Previous page
1/162
Next page
36
Plausible Deniability
In case an adversary forces you to reveal your password, VeraCrypt provides and supports two
kinds of plausible deniability:
1.
Hidden volumes (for more information, see the section Hidden Volume below) and hidden
operating systems (see the section Hidden Operating System).
2.
Until decrypted, a VeraCrypt partition/device appears to consist of nothing more than
random data (it does not contain any kind of "signature"). Therefore, it should be impossible
to prove that a partition or a device is a VeraCrypt volume or that it has been encrypted
(provided that the security requirements and precautions listed in the chapter Security
Requirements and Precautions are followed). A possible plausible explanation for the
existence of a partition/device containing solely random data is that you have wiped
(securely erased) the content of the partition/device using one of the tools that erase data by
overwriting it with random data (in fact, VeraCrypt can be used to securely erase a
partition/device too, by creating an empty encrypted partition/device-hosted volume within
it). However, you need to prevent data leaks (see section Data Leaks) and also note that, for
system encryption, the first drive track contains the (unencrypted) VeraCrypt Boot Loader,
which can be easily identified as such (for more information, see the chapter
System Encryption). When using system encryption, plausible deniability can be achieved
by creating a hidden operating system (see the section Hidden Operating System).
Although file-hosted VeraCrypt volumes (containers) do not contain any kind of "signature"
either (until decrypted, they appear to consist solely of random data), they cannot provide
this kind of plausible deniability, because there is practically no plausible explanation for the
existence of a file containing solely random data. However, plausible deniability can still be
achieved with a file-hosted VeraCrypt volume (container) by creating a hidden volume
within it (see above).
Notes
When formatting a hard disk partition as a VeraCrypt volume (or encrypting a partition in
place), the partition table (including the partition type) is never modified (no VeraCrypt
“signature” or “ID” is written to the partition table).
There are methods to find files or devices containing random data (such as VeraCrypt
volumes). Note, however, that this should not affect plausible deniability in any way. The
adversary still should not be able to prove that the partition/device is a VeraCrypt volume or
that the file, partition, or device, contains a hidden VeraCrypt volume (provided that you
follow the security requirements and precautions listed in the chapter Security
Requirements and Precautions and in the subsection Security Requirements and
Precautions Pertaining to Hidden Volumes).
35


Need help? Post your question in this forum.

Forumrules


Report abuse

Libble takes abuse of its services very seriously. We're committed to dealing with such abuse according to the laws in your country of residence. When you submit a report, we'll investigate it and take the appropriate action. We'll get back to you only if we require additional details or have more information to share.

Product:

For example, Anti-Semitic content, racist content, or material that could result in a violent physical act.

For example, a credit card number, a personal identification number, or an unlisted home address. Note that email addresses and full names are not considered private information.

Forumrules

To achieve meaningful questions, we apply the following rules:

Register

Register getting emails for VeraCrypt 1.16 at:


You will receive an email to register for one or both of the options.


Get your user manual by e-mail

Enter your email address to receive the manual of VeraCrypt 1.16 in the language / languages: English as an attachment in your email.

The manual is 2,98 mb in size.

 

You will receive the manual in your email within minutes. If you have not received an email, then probably have entered the wrong email address or your mailbox is too full. In addition, it may be that your ISP may have a maximum size for emails to receive.

The manual is sent by email. Check your email

If you have not received an email with the manual within fifteen minutes, it may be that you have a entered a wrong email address or that your ISP has set a maximum size to receive email that is smaller than the size of the manual.

The email address you have provided is not correct.

Please check the email address and correct it.

Your question is posted on this page

Would you like to receive an email when new answers and questions are posted? Please enter your email address.



Info