Table of contents
- Table Of Contents
- Preface
- Introduction
- Beginner's Tutorial
- VeraCrypt Volume
- System Encryption
- Plausible Deniability
- Main Program Window
- Parallelization
- Pipelining
- Hardware acceleration
- Hot keys
- Keyfiles
- Security Tokens & Smart Cards
- Portable Mode
- TrueCrypt Support
- Converting TrueCrypt Volumes & Partitions
- Default Mount Parameters
- Language Packs
- Encryption Algorithms
- Hash Algorithms
- Supported Operating Systems
- Command Line Usage
- Security Model
-
Security Requirements And Precautions
- Data Leaks
- Unencrypted Data in RAM
- Physical Security
- Malware
- Multi-User Environment
- Authenticity and Integrity
- Choosing Passwords and Keyfiles
- Changing Passwords and Keyfiles
- Trim Operation
- Wear-Leveling
- Reallocated Sectors
- Defragmenting
- Journaling File Systems
- Volume Clones
- Additional Security Requirements and Precautions
- How To Back Up Securely
- Miscellaneous
- Troubleshooting
- Incompatibilities
- Known Issues and Limitations
- Frequently Asked Questions
- Technical Details
- Contact
- Legal Information
- Version History
- Acknowledgements
- References