Differences
This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
dcc:itsol:veracrypt:precautions [2024/07/22 14:03] – added step-by-step guide on memory dump file and further precautions giulio | dcc:itsol:veracrypt:precautions [2025/04/01 11:56] (current) – removed reference to Lv4 protection giulio | ||
---|---|---|---|
Line 2: | Line 2: | ||
===== Security requirements and precautions ===== | ===== Security requirements and precautions ===== | ||
- | **IMPORTANT**: | + | **IMPORTANT**: |
- | From Lvl 4 Protection onwards, we suggest that you **talk to someone at the DCC** for assistance. These higher levels of protection ensure that your data is harder to find and leaves less traces, but they also carry the risk of **losing data by overwriting it** or **losing access to your operating system, IF THEY ARE SET UP INCORRECTLY**. You will also have to be told about clear practices that you need to follow in order to ensure **plausible deniability and the best level of protection**. | + | This guide advises |
- | + | ||
- | In our consultation with you we have advised | + | |
In order for VeraCrypt to provide effective security, the user needs to be aware and follow a number of guidelines that are listed here in short form and in their entirety in the VeraCrypt manual. Please refer to the VeraCrypt manual (pp.90-99 in the pdf or the [[https:// | In order for VeraCrypt to provide effective security, the user needs to be aware and follow a number of guidelines that are listed here in short form and in their entirety in the VeraCrypt manual. Please refer to the VeraCrypt manual (pp.90-99 in the pdf or the [[https:// | ||
Line 26: | Line 24: | ||
++++ Click to display step-by-step guide | | ++++ Click to display step-by-step guide | | ||
- | - Mount your VeraCrypt volume on an unoccupied drive. {{ : | + | - Mount your VeraCrypt volume on an unoccupied drive. {{ : |
- | - Navigate to the //My Computer/My PC// icon, right-click and select // | + | - Navigate to the //My Computer/My PC// icon, right-click and select // |
- This will open up the //About// section of the // | - This will open up the //About// section of the // | ||
- | - The System Properties window will open on the // | + | - The System Properties window will open on the // |
- | - Navigate to the // | + | - Navigate to the // |
- | - In the //Virtual Memory// window, first deselect // | + | - In the //Virtual Memory// window, first deselect // |
| | ||
++++ | ++++ | ||
Line 42: | Line 40: | ||
- Navigate to the //About// section of the // | - Navigate to the //About// section of the // | ||
- | - In the // | + | - In the // |
- | - In the resulting window, select //(none)// under the //Write debugging information// | + | - In the resulting window, select //(none)// under the //Write debugging information// |
+ | |||
+ | ++++ | ||
+ | |||
+ | ==== Disabling hibernation files ==== | ||
+ | |||
+ | Hibernation files are files that Windows creates when entering power saving mode. These files contain information that Windows uses to restore all processes once it exits power saving mode. This means that information stored on a VeraCrypt volume you were working with, the master key of the mounted volume and/or other information contained in your VeraCrypt volume might be written on disk unencrypted by Windows. To avoid this occurrence, follow these steps. **Warning: Keep in mind that the best way to avoid this, is to manually dismount all VeraCrypt volumes when done and shut down the computer for a few minutes (the longer, the better) before turning it on again**. | ||
+ | |||
+ | ++++ Click to display step-by-step guide | | ||
+ | |||
+ | - Open VeraCrypt and select the // | ||
+ | - Select the // | ||
+ | - Tick the //Entering power saving mode// choice (red box), then confirm your selection by clicking //Ok//. {{ : | ||
+ | |||
+ | ++++ | ||
+ | |||
+ | ==== Ensuring proper synchronization ==== | ||
+ | |||
+ | In order to give as little as possible information away to an unauthorized user, VeraCrypt preserves the date of creation of the files contained in a volume. This means that if you modify a file after it was created, VeraCrypt will not update the date of the last change done to the file. This is not a problem, unless you want to synchronize your VeraCrypt folder (once encrypted and dismounted) with a cloud service. The cloud service performs its synchronization by checking the modification date of the data contained in the volume and the volume itself. As VeraCrypt does not update the date of last modification, | ||
+ | |||
+ | To prevent this from happening, there are two easy steps you can follow: | ||
+ | |||
+ | ++++ Click to display step-by-step guide | | ||
+ | |||
+ | - Click on // | ||
+ | - A new window will appear. You can then deselect the option in the red box, then click //OK//. VeraCrypt will now update the date the file was modified, intead of preserving the original date. {{ : | ||
+ | |||
+ | **IMPORTANT**: | ||
++++ | ++++ |