Table of Contents
This documentation is not guaranteed to be error-free and is provided "as is" without warranty of any kind. For more information, see Disclaimers.
- Preface
- Introduction
- Beginner's Tutorial
- VeraCrypt Volume
- System Encryption
- Plausible Deniability
- Main Program Window
- Normal Dismount vs Force Dismount
- Avoid Third-Party File Extensions
- Parallelization
- Pipelining
- Hardware acceleration
- Hot keys
- Keyfiles
- Security Tokens & Smart Cards
- EMV Smart Cards
- Portable Mode
- TrueCrypt Support
- Converting TrueCrypt Volumes & Partitions
- Conversion Guide for Versions 1.26 and Later
- Default Mount Parameters
- Language Packs
- Encryption Algorithms
- Hash Algorithms
- Supported Operating Systems
- Command Line Usage
- Security Model
- Security Requirements And Precautions
- Data Leaks
- Unencrypted Data in RAM
- VeraCrypt RAM Encryption
- VeraCrypt Memory Protection
- Physical Security
- Malware
- Multi-User Environment
- Authenticity and Integrity
- Choosing Passwords and Keyfiles
- Changing Passwords and Keyfiles
- Trim Operation
- Wear-Leveling
- Reallocated Sectors
- Defragmenting
- Journaling File Systems
- Volume Clones
- Additional Security Requirements and Precautions
- How To Back Up Securely
- Miscellaneous
- Troubleshooting
- Incompatibilities
- Known Issues and Limitations
- Frequently Asked Questions
- Technical Details
- Contact
- Legal Information
- Version History
- Acknowledgements
- References