Differences
This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
dcc:itsol:veracrypt:precautions [2025/04/01 11:56] – removed reference to Lv4 protection giulio | dcc:itsol:veracrypt:precautions [2025/06/03 14:22] (current) – alba | ||
---|---|---|---|
Line 4: | Line 4: | ||
**IMPORTANT**: | **IMPORTANT**: | ||
- | This guide advises you on a level of protection that is ultimately just a suggestion. You can decide to get higher protection for your data, of course. Be aware, once again, that in getting a higher protection level the risk you face shifts from data leakage to actual data loss. We would ask that you follow our guidelines unless you really need a higher level of protection for your data, in which case you should request a consultation with us. | + | This guide advises you on a level of protection that is ultimately just a suggestion. You can decide to get higher protection for your data, of course. Be aware, once again, that in getting a higher protection level the risk you face shifts from data leakage to actual data loss. We would ask that you follow our guidelines unless you really need a higher level of protection for your data, in which case you should request a consultation with us. You are responsible for your data and what happens to it. |
In order for VeraCrypt to provide effective security, the user needs to be aware and follow a number of guidelines that are listed here in short form and in their entirety in the VeraCrypt manual. Please refer to the VeraCrypt manual (pp.90-99 in the pdf or the [[https:// | In order for VeraCrypt to provide effective security, the user needs to be aware and follow a number of guidelines that are listed here in short form and in their entirety in the VeraCrypt manual. Please refer to the VeraCrypt manual (pp.90-99 in the pdf or the [[https:// | ||
Line 13: | Line 13: | ||
* **Always lock your machine when you are not working with it**. If you are about to leave your machine unattended for more than ~5 min (bathroom break, quick coffee grab, etc.), dismount EVERY VeraCrypt volume and mount them again when you come back. | * **Always lock your machine when you are not working with it**. If you are about to leave your machine unattended for more than ~5 min (bathroom break, quick coffee grab, etc.), dismount EVERY VeraCrypt volume and mount them again when you come back. | ||
* **Never take sensitive data out of the VeraCrypt volume**. If you have to copy or create a new file, make sure that you move files or create them in a VeraCrypt volume. Files taken or created outside of the volume might leave traces of information on unencrypted parts of Windows. | * **Never take sensitive data out of the VeraCrypt volume**. If you have to copy or create a new file, make sure that you move files or create them in a VeraCrypt volume. Files taken or created outside of the volume might leave traces of information on unencrypted parts of Windows. | ||
- | * **When you are done working with a VeraCrypt volume, always dismount it, turn off your machine, and leave it turned off for a few minutes**. If you have to continue working on non-sensitive data later, you can safely | + | * **When you are done working with a VeraCrypt volume, always dismount it, and leave your computer running |
Line 66: | Line 66: | ||
- Click on // | - Click on // | ||
- | - A new window will appear. You can then deselect the option in the red box, then click //OK//. VeraCrypt will now update the date the file was modified, | + | - A new window will appear. You can then deselect the option in the red box, then click //OK//. VeraCrypt will now update the date the file was modified, |
**IMPORTANT**: | **IMPORTANT**: | ||
Line 76: | Line 76: | ||
++++ Click to display step-by-step guide | | ++++ Click to display step-by-step guide | | ||
- | - Unless you have encrypted your entire system (which carries its own risks and should not be done on your own) VeraCrypt | + | - VeraCrypt |
- | - VeraCrypt can only secure your volumes/ | + | - VeraCrypt can only secure your volumes/ |
- Examples of an easily accessible machine are: | - Examples of an easily accessible machine are: | ||
- You work on a shared workstation that is not specifically yours. Other people will sign into that machine after you leave. | - You work on a shared workstation that is not specifically yours. Other people will sign into that machine after you leave. | ||
Line 84: | Line 84: | ||
- Your machine is constantly connected to an internet connection that is not secure/that might be intercepted by people you don’t want to share your data with. | - Your machine is constantly connected to an internet connection that is not secure/that might be intercepted by people you don’t want to share your data with. | ||
- If your machine is not easily accessible, but you suspect that at some point someone gained access to it and could have compromised it, then VeraCrypt could be entirely unable to secure your data. In that case, please make sure **NOT TO MOUNT AND WORK** with a VeraCrypt volume until you have contacted the DCC ([[dcc@rug.nl|dcc@rug.nl]]). | - If your machine is not easily accessible, but you suspect that at some point someone gained access to it and could have compromised it, then VeraCrypt could be entirely unable to secure your data. In that case, please make sure **NOT TO MOUNT AND WORK** with a VeraCrypt volume until you have contacted the DCC ([[dcc@rug.nl|dcc@rug.nl]]). | ||
- | - The same goes if you suspect that your machine might have been infected by malware. Keep in mind that making sure your machine is up-to-date is a good way to reduce the chance of malware infection. | + | - The same goes if you suspect that your machine might have been infected by malware. Keep in mind that **making sure your machine is up-to-date** is a good way to reduce the chance of malware infection. |
- | - When choosing a password, make sure that you choose a strong one. VeraCrypt | + | - When choosing a password, make sure that you choose a strong one. VeraCrypt |
- | - Changing password and keyfile(s) does not change the masterkey | + | - Changing password and keyfile(s) does not change the master key of the encryption. The master key is an element of your volume’s header that ensures the correct interpretation of the encrypted data in combination with your password and keyfiles. Should you suspect that someone gained access to your password(s) or keyfile(s), **changing password will not protect your data** if they gained access to the masterkey. In short, having access to the master key is already enough to ensure decryption by brute force methods. In such a case, we ask you to **disconnect your machine** or your VeraCrypt volume(s) from any point of access (internet access, USB drives, or other) and to **please contact the DCC ([[dcc@rug.nl|dcc@rug.nl]]) immediately**. |
- | - Should you be working on a machine where you **DO NOT** have administrator privileges, we advise you to not use VeraCrypt on it. Find a machine where you are administrator and use that machine. This is because the administrator of a machine you are using might be able to see what you used or what you did with VeraCrypt. They might not have access to your data, but can potentially log your activity. | + | - Should you be working on a machine where you **DO NOT** have administrator privileges, we advise you to not use VeraCrypt on it. Find a machine where you are administrator and use that machine. This is because the administrator of a machine you are using might be able to see what you used or what you did with VeraCrypt. They might not have access to your data, but they can potentially log your activity. |
- | - If you are using keyfiles, you can store them in single copy on a separate device (e.g. a USB stick) for an added layer of security. Please keep in mind that **if you lose the USB stick, you lose access to your data**. We then advise you to have a second | + | - If you are using keyfiles, you can store them in a single copy on a separate device (e.g. a USB stick) for an added layer of security. Please keep in mind that **if you lose the USB stick, you lose access to your data**. We advise you to have a second |
++++ | ++++ |