658731
37
Zoom out
Zoom in
Previous page
1/162
Next page
38
anyone who would force you to hand over the password. You will reveal only the password for the
outer volume, not for the hidden one. Files that really are sensitive will be stored on the hidden
volume.
A hidden volume can be mounted the same way as a standard VeraCrypt volume: Click Select File
or Select Device to select the outer/host volume (important: make sure the volume is not mounted).
Then click Mount, and enter the password for the hidden volume. Whether the hidden or the outer
volume will be mounted is determined by the entered password (i.e., when you enter the password
for the outer volume, then the outer volume will be mounted; when you enter the password for the
hidden volume, the hidden volume will be mounted).
VeraCrypt first attempts to decrypt the standard volume header using the entered password. If it
fails, it loads the area of the volume where a hidden volume header can be stored (i.e. bytes
65536131071, which contain solely random data when there is no hidden volume within the
volume) to RAM and attempts to decrypt it using the entered password. Note that hidden volume
headers cannot be identified, as they appear to consist entirely of random data. If the header is
successfully decrypted (for information on how VeraCrypt determines that it was successfully
decrypted, see the section Encryption Scheme), the information about the size of the hidden
volume is retrieved from the decrypted header (which is still stored in RAM), and the hidden
volume is mounted (its size also determines its offset).
A hidden volume can be created within any type of VeraCrypt volume, i.e., within a file-hosted
volume or partition/device-hosted volume (requires administrator privileges). To create a hidden
VeraCrypt volume, click on Create Volume in the main program window and select Create a hidden
VeraCrypt volume. The Wizard will provide help and all information necessary to successfully create
a hidden VeraCrypt volume.
When creating a hidden volume, it may be very difficult or even impossible for an inexperienced
user to set the size of the hidden volume such that the hidden volume does not overwrite data on
the outer volume. Therefore, the Volume Creation Wizard automatically scans the cluster bitmap of
the outer volume (before the hidden volume is created within it) and determines the maximum
possible size of the hidden volume.
*
If there are any problems when creating a hidden volume, refer to the chapter Troubleshooting for
possible solutions.
Note that it is also possible to create and boot an operating system residing in a hidden volume
(see the section Hidden Operating System in the chapter Plausible Deniability).
* The wizard scans the cluster bitmap to determine the size of the uninterrupted area of free space (if there is any) whose
end is aligned with the end of the outer volume. This area accommodates the hidden volume and therefore the size of
this area limits the maximum possible size of the hidden volume. On Linux and Mac OS X, the wizard actually does not
scan the cluster bitmap, but the driver detects any data written to the outer volume and uses their position as previously
described.
37


Need help? Post your question in this forum.

Forumrules


Report abuse

Libble takes abuse of its services very seriously. We're committed to dealing with such abuse according to the laws in your country of residence. When you submit a report, we'll investigate it and take the appropriate action. We'll get back to you only if we require additional details or have more information to share.

Product:

For example, Anti-Semitic content, racist content, or material that could result in a violent physical act.

For example, a credit card number, a personal identification number, or an unlisted home address. Note that email addresses and full names are not considered private information.

Forumrules

To achieve meaningful questions, we apply the following rules:

Register

Register getting emails for VeraCrypt 1.16 at:


You will receive an email to register for one or both of the options.


Get your user manual by e-mail

Enter your email address to receive the manual of VeraCrypt 1.16 in the language / languages: English as an attachment in your email.

The manual is 2,98 mb in size.

 

You will receive the manual in your email within minutes. If you have not received an email, then probably have entered the wrong email address or your mailbox is too full. In addition, it may be that your ISP may have a maximum size for emails to receive.

The manual is sent by email. Check your email

If you have not received an email with the manual within fifteen minutes, it may be that you have a entered a wrong email address or that your ISP has set a maximum size to receive email that is smaller than the size of the manual.

The email address you have provided is not correct.

Please check the email address and correct it.

Your question is posted on this page

Would you like to receive an email when new answers and questions are posted? Please enter your email address.



Info