Logo Retina Logo
  • Home
    • Global Mass Surveillance
  • OS
    • Operating Systems
    • Mobile OS
    • Router Firmware
  • VPN
    • VPN Comparison
    • Choosing a VPN
  • Browsers
    • Web browsers
    • Fingerprinting
    • WebRTC IP Leak
    • Browser Addons
    • Firefox Tweaks
    • Tor Project Browser
  • Email
    • Email comparison
  • Software
    • File Encryption
    • Encrypted Instant Messengers
    • Password Manager
    • Metadata Removal Tools
  • Tutorials
    • VeraCrypt
    • Pretty Good Privacy (PGP)
  • Contact

Veracrypt Guide: Encryption Made Easy

Creating a Hidden Drive in VeraCrypt

Tutorial

Complete setup and guide to encrypting your files, folders, operating systems, and drives with Veracrypt, a free and open source encryption software.

Veracrypt will keep your files in encrypted containers which will keep your data safe.


Important information

Your encrypted volume is only as strong as your password. Make sure it's a strong and memorable password with at least 30 characters long, as your adversary can bruteforce it with trillions guesses per second.

Always encrypt in a Hidden Volume. It's only one more step but will give you a tremendous security. They are made to give you a protection of plausible deniability. In certain jurisdiction, like the UK or (parts of) US, if the police finds your encrypted storage, you must give them a decryption key. With Veracrypt hidden volume, you actually create a decoy volume, where you store sensitively looking data. And the hidden encrypted volume stores your actually sensitive data.

What's crucial is that these two volumes have DIFFERENT passwords. So that when you are asked by the law enforcement to hand over your decryption key, you can give them a password to your decoy volume and they will never know about the hidden volume.

  • SourceTechlore, Jim Parshall and The Hated One

© 2020 i/oPrivacy | We do not use JavaScript, (Google) Ads, Google Analytics or Cross-Site Requests on our website.