VeraCrypt
aboutsummaryrefslogtreecommitdiff
path: root/src/Setup/Resource.h
blob: 8feaf3dc5de35766acbde11891f47ae38da97e3f (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
//{{NO_DEPENDENCIES}}
// Microsoft Visual C++ generated include file.
// Used by Setup.rc
//
#define IDR_COMREG                      10
#define IDD_INSTALL                     101
#define IDD_INSTALL_OPTIONS_PAGE_DLG    102
#define IDD_UNINSTALL                   103
#define IDI_SETUP                       104
#define IDR_SETUP_RSRC_HEADER           105
#define IDD_EXTRACTION_OPTIONS_PAGE_DLG 106
#define IDB_SETUP_WIZARD                107
#define IDD_INTRO_PAGE_DLG              108
#define IDB_SETUP_WIZARD_BKG            109
#define IDD_INFO_PAGE_DLG               110
#define IDD_INSTL_DLG                   111
#define IDD_WIZARD_MODE_PAGE_DLG        112
#define IDD_PROGRESS_PAGE_DLG           113
#define IDD_DONATIONS_PAGE_DLG          114
#define IDC_DESTINATION                 1000
#define IDC_BOX_TITLE                   1001
#define IDC_BROWSE                      1002
#define IDC_BOX_INFO                    1003
#define IDC_LICENSE                     1004
#define IDC_BOX_HELP                    1005
#define IDC_LICENSE_TEXT                1006
#define IDC_BOX_HELP2                   1007
#define IDC_FILE_TYPE                   1008
#define IDT_UNINSTALL_DIR               1009
#define IDC_PROG_GROUP                  1010
#define IDC_SYSTEM_RESTORE              1011
#define IDC_DESKTOP_ICON                1012
#define IDC_ALL_USERS                   1013
#define IDT_INSTALL_DESTINATION         1014
#define IDC_UNINSTALL                   1015
#define IDC_PROGRESS_BAR                1016
#define IDC_LOG_WINDOW                  1017
#define IDC_SETUP_WIZARD_BKG            1018
#define IDC_SETUP_WIZARD_GFX_AREA       1019
#define IDC_HR                          1020
#define IDC_OPEN_CONTAINING_FOLDER      1021
#define IDC_AGREE                       1022
#define IDC_HR_BOTTOM                   1023
#define IDC_WIZARD_MODE_INSTALL         1024
#define IDC_WIZARD_MODE_EXTRACT_ONLY    1025
#define IDC_NEXT                        1026
#define IDC_PREV                        1027
#define IDT_EXTRACT_DESTINATION         1028
#define IDC_POS_BOX                     1029
#define IDC_BITMAP_SETUP_WIZARD         1030
#define IDC_MAIN_CONTENT_CANVAS         1031
#define IDC_DONATE                      1032

// Next default values for new objects
//
#ifdef APSTUDIO_INVOKED
#ifndef APSTUDIO_READONLY_SYMBOLS
#define _APS_NO_MFC                     1
#define _APS_NEXT_RESOURCE_VALUE        115
#define _APS_NEXT_COMMAND_VALUE         40001
#define _APS_NEXT_CONTROL_VALUE         1033
#define _APS_NEXT_SYMED_VALUE           101
#endif
#endif
an>><a href="Home.html">Home</a></li> <li><a href="/code/">Source Code</a></li> <li><a href="Downloads.html">Downloads</a></li> <li><a class="active" href="Documentation.html">Documentation</a></li> <li><a href="Donation.html">Donate</a></li> <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li> </ul> </div> <div> <p> <a href="Documentation.html">Documentation</a> <img src="arrow_right.gif" alt=">>" style="margin-top: 5px"> <a href="Plausible%20Deniability.html">Plausible Deniability</a> </p></div> <div class="wikidoc"> <h1>Plausible Deniability</h1> <div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> In case an adversary forces you to reveal your password, VeraCrypt provides and supports two kinds of plausible deniability:</div> <ol style="text-align:left; margin-top:18px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> <li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> Hidden volumes (see the section <a href="Hidden%20Volume.html" style="text-align:left; color:#0080c0; text-decoration:none; font-weight:bold.html"> Hidden Volume</a>) and hidden operating systems (see the section <a href="Hidden%20Operating%20System.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> <strong style="text-align:left">Hidden Operating System</strong></a>). </li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> Until decrypted, a VeraCrypt partition/device appears to consist of nothing more than random data (it does not contain any kind of &quot;signature&quot;). Therefore, it should be impossible to prove that a partition or a device is a VeraCrypt volume or that it has been encrypted (provided that the security requirements and precautions listed in the chapter <a href="Security%20Requirements%20and%20Precautions.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> Security Requirements and Precautions</a> are followed). A possible plausible explanation for the existence of a partition/device containing solely random data is that you have wiped (securely erased) the content of the partition/device using one of the tools that erase data by overwriting it with random data (in fact, VeraCrypt can be used to securely erase a partition/device too, by creating an empty encrypted partition/device-hosted volume within it). However, you need to prevent data leaks (see the section <a href="Data%20Leaks.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> Data Leaks</a>) and also note that, for <a href="System%20Encryption.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> system encryption</a>, the first drive track contains the (unencrypted) VeraCrypt Boot Loader, which can be easily identified as such (for more information, see the chapter <a href="System%20Encryption.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> System Encryption</a>). When using <a href="System%20Encryption.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> system encryption</a>, plausible deniability can be achieved by creating a hidden operating system (see the section <a href="Hidden%20Operating%20System.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> Hidden Operating System</a>).<br style="text-align:left"> <br style="text-align:left"> Although file-hosted VeraCrypt volumes (containers) do not contain any kind of &quot;signature&quot; either (until decrypted, they appear to consist solely of random data), they cannot provide this kind of plausible deniability, because there is practically no plausible explanation for the existence of a file containing solely random data. However, plausible deniability can still be achieved with a file-hosted VeraCrypt volume (container) by creating a hidden volume within it (see above). </li></ol> <h4 style="text-align:left; font-family:Arial,Helvetica,Verdana,sans-serif; font-weight:bold; margin-top:0px; font-size:12px; margin-bottom:1px"> <br style="text-align:left"> Notes</h4> <ul style="text-align:left; margin-top:18px; margin-bottom:19px; padding-top:0px; padding-bottom:0px"> <li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> When formatting a hard disk partition as a VeraCrypt volume (or encrypting a partition in place), the partition table (including the partition type) is <em style="text-align:left">never</em> modified (no VeraCrypt &quot;signature&quot; or &quot;ID&quot; is written to the partition table). </li><li style="text-align:left; margin-top:0px; margin-bottom:0px; padding-top:0px; padding-bottom:0px"> There are methods to find files or devices containing random data (such as VeraCrypt volumes). Note, however, that this should <em style="text-align:left">not </em>affect plausible deniability in any way. The adversary still should not be able to <em style="text-align:left">prove</em> that the partition/device is a VeraCrypt volume or that the file, partition, or device, contains a hidden VeraCrypt volume (provided that you follow the security requirements and precautions listed in the chapter <a href="Security%20Requirements%20and%20Precautions.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> Security Requirements and Precautions</a> and in the subsection <a href="Security%20Requirements%20for%20Hidden%20Volumes.html" style="text-align:left; color:#0080c0; text-decoration:none.html"> Security Requirements and Precautions Pertaining to Hidden Volumes</a>). </li></ul> <p>&nbsp;</p> <p><a href="Hidden%20Volume.html" style="text-align:left; color:#0080c0; text-decoration:none; font-weight:bold.html">Next Section &gt;&gt;</a></p> </div><div class="ClearBoth"></div></body></html>