VeraCrypt

Documentation >> Plausible Deniability >> Hidden Volume >> Security Requirements for Hidden Volumes

Security Requirements and Precautions Pertaining to Hidden Volumes

If you use a hidden VeraCrypt volume, you must follow the security requirements and precautions listed below in this section. Disclaimer: This section is not guaranteed to contain a list of all security issues and attacks that might adversely affect or limit the ability of VeraCrypt to secure data stored in a hidden VeraCrypt volume and the ability to provide plausible deniability.

In addition to the above, you must follow the security requirements and precautions listed in the following chapters:

Next Section >>


* This does not apply to filesystems on CD/DVD-like media and on custom, untypical, or non-standard devices/media.