From 5e1fffa87191c3566bcbe20c6e8d29d5f21651d5 Mon Sep 17 00:00:00 2001 From: Mounir IDRASSI Date: Sat, 13 May 2017 17:34:16 +0200 Subject: Add HTML documentation. --- doc/html/Journaling File Systems.html | 46 +++++++++++++++++++++++++++++++++++ 1 file changed, 46 insertions(+) create mode 100644 doc/html/Journaling File Systems.html (limited to 'doc/html/Journaling File Systems.html') diff --git a/doc/html/Journaling File Systems.html b/doc/html/Journaling File Systems.html new file mode 100644 index 00000000..b04a6e47 --- /dev/null +++ b/doc/html/Journaling File Systems.html @@ -0,0 +1,46 @@ + + + + +VeraCrypt - Free Open source disk encryption with strong security for the Paranoid + + + + + + +
+VeraCrypt +
+ + + +
+

+Documentation +>> +Security Requirements and Precautions +>> +Journaling File Systems +

+ +
+

Journaling File Systems

+

When a file-hosted VeraCrypt container is stored in a journaling file system (such as NTFS or Ext3), a copy of the VeraCrypt container (or of its fragment) may remain in the free space on the host volume. This may have various security implications. For + example, if you change the volume password/keyfile(s) and an adversary finds the old copy or fragment (the old header) of the VeraCrypt volume, he might use it to mount the volume using an old compromised password (and/or using compromised keyfiles using an + old compromised password (and/or using compromised keyfiles that were necessary to mount the volume before the volume header was re- encrypted). Some journaling file systems also internally record file access times and other potentially sensitive information. + If you need plausible deniability (see section +Plausible Deniability), you must not store file-hosted VeraCrypt containers in journaling file systems. To prevent possible security issues related to journaling file systems, do one the following:

+ +
\ No newline at end of file -- cgit v1.2.3