Security Requirements and Precautions
IMPORTANT: If you want to use VeraCrypt, you must follow the security requirements and security precautions listed in this chapter. |
The sections in this chapter specify security requirements for using VeraCrypt and give information about things that adversely affect or limit the ability of VeraCrypt to secure data and to provide plausible deniability. Disclaimer: This chapter is not guaranteed
to contain a list of all security issues and attacks that might adversely affect or limit the ability of VeraCrypt to secure data and to provide plausible deniability.
- Data Leaks
- Unencrypted Data in RAM
- VeraCrypt Memory Protection
- Physical Security
- Malware
- Multi-User Environment
- Authenticity and Integrity
- Choosing Passwords and Keyfiles
- Changing Passwords and Keyfiles
- Trim Operation
- Wear-Leveling
- Reallocated Sectors
- Defragmenting
- Journaling File Systems
- Volume Clones
- Additional Security Requirements and Precautions