From 5e1fffa87191c3566bcbe20c6e8d29d5f21651d5 Mon Sep 17 00:00:00 2001 From: Mounir IDRASSI Date: Sat, 13 May 2017 17:34:16 +0200 Subject: Add HTML documentation. --- doc/html/Plausible Deniability.html | 77 +++++++++++++++++++++++++++++++++++++ 1 file changed, 77 insertions(+) create mode 100644 doc/html/Plausible Deniability.html (limited to 'doc/html/Plausible Deniability.html') diff --git a/doc/html/Plausible Deniability.html b/doc/html/Plausible Deniability.html new file mode 100644 index 00000000..2a14c39d --- /dev/null +++ b/doc/html/Plausible Deniability.html @@ -0,0 +1,77 @@ + + + + +VeraCrypt - Free Open source disk encryption with strong security for the Paranoid + + + + + + +
+VeraCrypt +
+ + + +
+

+Documentation +>> +Plausible Deniability +

+ +
+

Plausible Deniability

+
+In case an adversary forces you to reveal your password, VeraCrypt provides and supports two kinds of plausible deniability:
+
    +
  1. +Hidden volumes (see the section +Hidden Volume) and hidden operating systems (see the section +Hidden Operating System).
  2. +Until decrypted, a VeraCrypt partition/device appears to consist of nothing more than random data (it does not contain any kind of "signature"). Therefore, it should be impossible to prove that a partition or a device is a VeraCrypt volume or that it has been + encrypted (provided that the security requirements and precautions listed in the chapter + +Security Requirements and Precautions are followed). A possible plausible explanation for the existence of a partition/device containing solely random data is that you have wiped (securely erased) the content of the partition/device using one of the tools + that erase data by overwriting it with random data (in fact, VeraCrypt can be used to securely erase a partition/device too, by creating an empty encrypted partition/device-hosted volume within it). However, you need to prevent data leaks (see the section + +Data Leaks) and also note that, for +system encryption, the first drive track contains the (unencrypted) VeraCrypt Boot Loader, which can be easily identified as such (for more information, see the chapter + +System Encryption). When using +system encryption, plausible deniability can be achieved by creating a hidden operating system (see the section + +Hidden Operating System).
    +
    +Although file-hosted VeraCrypt volumes (containers) do not contain any kind of "signature" either (until decrypted, they appear to consist solely of random data), they cannot provide this kind of plausible deniability, because there is practically no plausible + explanation for the existence of a file containing solely random data. However, plausible deniability can still be achieved with a file-hosted VeraCrypt volume (container) by creating a hidden volume within it (see above). +
+

+
+Notes

+ +

 

+

Next Section >>

+
-- cgit v1.2.3