Differences
This shows you the differences between two versions of the page.
Both sides previous revision Previous revision | |||
dcc:itsol:veracrypt:precautions [2025/06/03 13:54] – wording adapted giulio | dcc:itsol:veracrypt:precautions [2025/06/03 14:22] (current) – alba | ||
---|---|---|---|
Line 66: | Line 66: | ||
- Click on // | - Click on // | ||
- | - A new window will appear. You can then deselect the option in the red box, then click //OK//. VeraCrypt will now update the date the file was modified, | + | - A new window will appear. You can then deselect the option in the red box, then click //OK//. VeraCrypt will now update the date the file was modified, |
**IMPORTANT**: | **IMPORTANT**: | ||
Line 85: | Line 85: | ||
- If your machine is not easily accessible, but you suspect that at some point someone gained access to it and could have compromised it, then VeraCrypt could be entirely unable to secure your data. In that case, please make sure **NOT TO MOUNT AND WORK** with a VeraCrypt volume until you have contacted the DCC ([[dcc@rug.nl|dcc@rug.nl]]). | - If your machine is not easily accessible, but you suspect that at some point someone gained access to it and could have compromised it, then VeraCrypt could be entirely unable to secure your data. In that case, please make sure **NOT TO MOUNT AND WORK** with a VeraCrypt volume until you have contacted the DCC ([[dcc@rug.nl|dcc@rug.nl]]). | ||
- The same goes if you suspect that your machine might have been infected by malware. Keep in mind that **making sure your machine is up-to-date** is a good way to reduce the chance of malware infection. | - The same goes if you suspect that your machine might have been infected by malware. Keep in mind that **making sure your machine is up-to-date** is a good way to reduce the chance of malware infection. | ||
- | - When choosing a password, make sure that you choose a strong one. VeraCrypt defines what a strong password is, both when prompting you to choose it and in its manual. In short, choose a sequence of words, rather than a single word, use both upper and lower case and special characters, and makes sure that your password contains at least be 20 characters. (Example: Song lyrics are a good inspiration if you don’t know where to start). | + | - When choosing a password, make sure that you choose a strong one. VeraCrypt defines what a strong password is, both when prompting you to choose it and in its manual. In short, choose a sequence of words, rather than a single word, use both upper and lower case and special characters, and makes sure that your password contains at least 20 characters. (Example: Song lyrics are a good inspiration if you don’t know where to start). |
- | - Changing password and keyfile(s) does not change the masterkey | + | - Changing password and keyfile(s) does not change the master key of the encryption. The master key is an element of your volume’s header that ensures the correct interpretation of the encrypted data in combination with your password and keyfiles. Should you suspect that someone gained access to your password(s) or keyfile(s), **changing password will not protect your data** if they gained access to the masterkey. In short, having access to the master key is already enough to ensure decryption by brute force methods. In such a case, we ask you to **disconnect your machine** or your VeraCrypt volume(s) from any point of access (internet access, USB drives, or other) and to **please contact the DCC ([[dcc@rug.nl|dcc@rug.nl]]) immediately**. |
- | - Should you be working on a machine where you **DO NOT** have administrator privileges, we advise you to not use VeraCrypt on it. Find a machine where you are administrator and use that machine. This is because the administrator of a machine you are using might be able to see what you used or what you did with VeraCrypt. They might not have access to your data, but can potentially log your activity. | + | - Should you be working on a machine where you **DO NOT** have administrator privileges, we advise you to not use VeraCrypt on it. Find a machine where you are administrator and use that machine. This is because the administrator of a machine you are using might be able to see what you used or what you did with VeraCrypt. They might not have access to your data, but they can potentially log your activity. |
- | - If you are using keyfiles, you can store them in single copy on a separate device (e.g. a USB stick) for an added layer of security. Please keep in mind that **if you lose the USB stick, you lose access to your data**. We advise you to have a second | + | - If you are using keyfiles, you can store them in a single copy on a separate device (e.g. a USB stick) for an added layer of security. Please keep in mind that **if you lose the USB stick, you lose access to your data**. We advise you to have a second |
++++ | ++++ |