# # Derived from source code of TrueCrypt 7.1a, which is # Copyright (c) 2008-2012 TrueCrypt Developers Association and which is governed # by the TrueCrypt License 3.0. # # Modifications and additions to the original source code (contained in this file) # and all other portions of this file are Copyright (c) 2013-2017 IDRIX # and are governed by the Apache License 2.0 the full text of which is # contained in the file License.txt included in VeraCrypt binary and source # code distribution packages. # OBJS := OBJS += CoreBase.o OBJS += CoreException.o OBJS += FatFormatter.o OBJS += HostDevice.o OBJS += MountOptions.o OBJS += RandomNumberGenerator.o OBJS += VolumeCreator.o OBJS += Unix/CoreService.o OBJS += Unix/CoreServiceRequest.o OBJS += Unix/CoreServiceResponse.o OBJS += Unix/CoreUnix.o OBJS += Unix/$(PLATFORM)/Core$(PLATFORM).o OBJS += Unix/$(PLATFORM)/Core$(PLATFORM).o ifeq "$(PLATFORM)" "MacOSX" OBJS += Unix/FreeBSD/CoreFreeBSD.o endif include $(BUILD_INC)/Makefile.inc i>Home
  • Source Code
  • Downloads
  • Documentation
  • Donate
  • Forums
  • aboutsummaryrefslogtreecommitdiff
    path: root/doc/html/Journaling File Systems.html
    blob: b04a6e47c437efdd74fffb5da3d4ba0230251602 (plain)
    1
    2
    3
    4
    5
    6
    7
    8
    9
    10
    11
    12
    13
    14
    15
    16
    17
    18
    19
    20
    21
    22
    23
    24
    25
    26
    27
    28
    29
    30
    31
    32
    33
    34
    35
    36
    37
    38
    39
    40
    41
    42
    43
    44
    45
    46
    
    <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
        "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
    <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
    <head>
    <meta http-equiv="content-type" content="text/html; charset=utf-8" />
    <title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title>
    <meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/>
    <meta name="keywords" content="encryption, security"/>
    <link href="styles.css" rel="stylesheet" type="text/css" />
    </head>
    <body>
    
    <div>                      
    <a href="https://www.veracrypt.fr/en/Home.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a>
    </div>
    
    <div id="menu">
    	<ul>
    	  <li><a href="Home.html">Home</a></li>
    	  <li><a href="/code/">Source Code</a></li>
    	  <li><a href="Downloads.html">Downloads</a></li>
    	  <li><a class="active" href="Documentation.html">Documentation</a></li>
    	  <li><a href="Donation.html">Donate</a></li>
    	  <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li>
    	</ul>
    </div>
    
    <div>
    <p>
    <a href="Documentation.html">Documentation</a>           
    <img src="arrow_right.gif" alt=">>" style="margin-top: 5px">
    <a href="Security%20Requirements%20and%20Precautions.html">Security Requirements and Precautions</a>
    <img src="arrow_right.gif" alt=">>" style="margin-top: 5px">
    <a href="Journaling%20File%20Systems.html">Journaling File Systems</a>
    </p></div>
    
    <div class="wikidoc">
    <h1>Journaling File Systems</h1>
    <p>When a file-hosted VeraCrypt container is stored in a journaling file system (such as NTFS or Ext3), a copy of the VeraCrypt container (or of its fragment) may remain in the free space on the host volume. This may have various security implications. For
     example, if you change the volume password/keyfile(s) and an adversary finds the old copy or fragment (the old header) of the VeraCrypt volume, he might use it to mount the volume using an old compromised password (and/or using compromised keyfiles using an
     old compromised password (and/or using compromised keyfiles that were necessary to mount the volume before the volume header was re- encrypted). Some journaling file systems also internally record file access times and other potentially sensitive information.
     If you need plausible deniability (see section <a href="Plausible%20Deniability.html">
    <em>Plausible Deniability</em></a>), you must not store file-hosted VeraCrypt containers in journaling file systems. To prevent possible security issues related to journaling file systems, do one the following:</p>
    <ul>
    <li>Use a partition/device-hosted VeraCrypt volume instead of file-hosted. </li><li>Store the container in a non-journaling file system (for example, FAT32). </li></ul>
    </div><div class="ClearBoth"></div></body></html>