Both sides previous revision Previous revision | |
dcc:itsol:veracrypt:precautions [2024/07/30 11:30] – resized figures giulio | dcc:itsol:veracrypt:precautions [2025/04/01 11:56] (current) – removed reference to Lv4 protection giulio |
---|
===== Security requirements and precautions ===== | ===== Security requirements and precautions ===== |
| |
**IMPORTANT**: Please take into account that you can use VeraCrypt yourself up to what we call Lvl 3 Protection without the risk of losing important data or access to your system. As long as you follow the encryption guide provided here and are careful about the things we warn you about, you should not need assistance in setting this up. | **IMPORTANT**: Please take into account that you can use VeraCrypt yourself at any level of protection suggested in this guide. The risk of losing important data is mainly linked to losing your password or your keyfiles. As long as you follow the encryption guide provided here and are careful about the things we warn you about, you should not need assistance in setting this up. |
| |
From Lvl 4 Protection onwards, we suggest that you **talk to someone at the DCC** for assistance. These higher levels of protection ensure that your data is harder to find and leaves less traces, but they also carry the risk of **losing data by overwriting it** or **losing access to your operating system, IF THEY ARE SET UP INCORRECTLY**. You will also have to be told about clear practices that you need to follow in order to ensure **plausible deniability and the best level of protection**. | This guide advises you on a level of protection that is ultimately just a suggestion. You can decide to get higher protection for your data, of course. Be aware, once again, that in getting a higher protection level the risk you face shifts from data leakage to actual data loss. We would ask that you follow our guidelines unless you really need a higher level of protection for your data, in which case you should request a consultation with us. |
| |
In our consultation with you we have advised you on a level of protection that is ultimately just a suggestion. You can decide to get higher protection for your data, of course. Be aware, once again, that in getting a higher protection level the risk you face shifts from data leakage to actual data loss. We would ask that you follow our guidelines unless you really need a higher level of protection for your data, in which case you should request a follow up consultation with us. | |
| |
In order for VeraCrypt to provide effective security, the user needs to be aware and follow a number of guidelines that are listed here in short form and in their entirety in the VeraCrypt manual. Please refer to the VeraCrypt manual (pp.90-99 in the pdf or the [[https://www.veracrypt.fr/en/Security%20Requirements%20and%20Precautions.html| Security requirements and precautions]] section of the online documentation) for a more detailed explanation. | In order for VeraCrypt to provide effective security, the user needs to be aware and follow a number of guidelines that are listed here in short form and in their entirety in the VeraCrypt manual. Please refer to the VeraCrypt manual (pp.90-99 in the pdf or the [[https://www.veracrypt.fr/en/Security%20Requirements%20and%20Precautions.html| Security requirements and precautions]] section of the online documentation) for a more detailed explanation. |