What the detection is really telling you is that the bootloader is different than VC was expecting. It could be due to malicious activity, it could be poorly written software (anything with flexnet licensing), it could be corruption.
↧
New Post: Bootloader fingerprint fialed Evil Main Attack.. Seems faulse
↧
Created Unassigned: Veracrypt password not working [662]
My veracrypt volume was mounted when my windows updated a couple days ago. Now when I try to mount it with the password which I know is correct, it does not mount.
↧
↧
New Post: TRIM Not Working
Probably you are right. System drive is filtered by VeraCrypt. So empty data inside system volume is decrypted also.
How do you check TRIM?
Do you have partition non-encrypted on the same SSD in addition to system? Try check trim on it.
I did not trace IOCTL_STORAGE_MANAGE_DATA_SET_ATTRIBUTES. Probably this is for crash dumps and hibernate.
How do you check TRIM?
Do you have partition non-encrypted on the same SSD in addition to system? Try check trim on it.
I did not trace IOCTL_STORAGE_MANAGE_DATA_SET_ATTRIBUTES. Probably this is for crash dumps and hibernate.
↧
New Post: veracrypt volume in multiple files...
-
With all due respect to cbeerse and all new suggestions, but why would someone need encrypted container of more than 2GB in size? I am using encrypted container from the time my RAM was 4MB and my laptop screen had 64 shades of grey LOL... never ever needed anything larger than 1GB... With the NTFS, the container size can be significantly higher...
-
If the container is split into chunks, there are many issues to be dealt with, such as, which chunk updates and which do not, which chunk is backed and what the time stamp of it is. It becomes extremely complicated. In the current environment when people dont know whether their mobile phone pictures get uploaded to a cloud or thunderstorm somewhere there.... why the additional headache? Encryption, unless KEPT SIMPLE, will backfire for sure....
-
If you are storing multiple versions of container in a cloud, this is serious security risk, based on the presumption that the cloud is not safe (and it is not, why would you otherwise using VC).
↧
New Post: TRIM Not Working
kavsrf wrote:
I'm checking trim via a utility called "trimcheck" - https://github.com/CyberShadow/trimcheck/releases
I also tried the hex editor method (pick a file on another drive, copy a unique string from the file, move it to your SSD, find the location, delete the file and observe the location 30 seconds later - it should be zeroed).
Interesting, that method specifically mentioned TRIM - but it doesn't seem to be making much difference either way. At least in my case, the extended control codes don't seem to do much of anything.
Probably you are right. System drive is filtered by VeraCrypt. So empty data inside system volume is decrypted also.Unfortunately I don't have one unencrypted to test with at this point - though I wish I'd left a space now for testing. If I have enough time for a backup/decrypt/encrypt/test/restore next week I'll see what it looks like.
How do you check TRIM?
Do you have partition non-encrypted on the same SSD in addition to system? Try check trim on it.
I did not trace IOCTL_STORAGE_MANAGE_DATA_SET_ATTRIBUTES. Probably this is for crash dumps and hibernate.
I'm checking trim via a utility called "trimcheck" - https://github.com/CyberShadow/trimcheck/releases
I also tried the hex editor method (pick a file on another drive, copy a unique string from the file, move it to your SSD, find the location, delete the file and observe the location 30 seconds later - it should be zeroed).
Interesting, that method specifically mentioned TRIM - but it doesn't seem to be making much difference either way. At least in my case, the extended control codes don't seem to do much of anything.
↧
↧
New Post: Problem mounting volume using script
Thanks Adrian. That worked nicely.
Regards,
Charles
Regards,
Charles
↧
New Post: Favorite Volumes Not Mounting on Login
System Favorites is pre-OS. Hence, there is no user. System Favorites will mount any volume you add to the System Favorites as part of the mounting of the system drive.
Another way of saying the above statement is the System Favorites is performed as part of the mounting of the OS drive/partition before the user even logins into Windows.
Another way of saying the above statement is the System Favorites is performed as part of the mounting of the OS drive/partition before the user even logins into Windows.
↧
New Post: Hidden volume question
So I tried out the hidden volume on a SSD. Let's say my SSD is 100GB. Let's say I create a hidden volume of 20GB and a standard volume of 80GB. When I open up the 80GB volume, the drive will say there's only 80GB of space. But we know that the drive is actually 100GB total.
I'm confused as to how there's a plausible deniability. If I open up the standard space, it's clear that there's 20GB missing.
Thanks.
I'm confused as to how there's a plausible deniability. If I open up the standard space, it's clear that there's 20GB missing.
Thanks.
↧
New Post: Hidden volume question
Hidden volume technics is to hide one encrypted data inside another encrypted data. In your case SSD has to have one partition 100GB. Fake data is 80GB. Hidden data is 20GB.
limitations:
If you wrote something big on fake data part without protection of hidden data it can destroy hidden data.
if you do not work with fake data for long period it is suspicious. Any expert can suggest: old unused data => No one need it for long => why is this data encrypted? => it can be fake => probably there is hidden data => plausible deniability?
Lets suggest you work with fake data regular but you need smooth encryption => Fake data encrypted and hidden data encrypted has to be undistinguishable statistically. At least encryption algorithms of fake and hidden data have to be the same.
Note: Hidden volume is tool only. plausible deniability is possible but not easy to keep.
limitations:
If you wrote something big on fake data part without protection of hidden data it can destroy hidden data.
if you do not work with fake data for long period it is suspicious. Any expert can suggest: old unused data => No one need it for long => why is this data encrypted? => it can be fake => probably there is hidden data => plausible deniability?
Lets suggest you work with fake data regular but you need smooth encryption => Fake data encrypted and hidden data encrypted has to be undistinguishable statistically. At least encryption algorithms of fake and hidden data have to be the same.
Note: Hidden volume is tool only. plausible deniability is possible but not easy to keep.
↧
↧
New Post: Bootloader fingerprint fialed Evil Main Attack.. Seems faulse
Well something is very strange, because it just happened again today while I was (already logged into windows). This time it didn't do it at boot time. The error came up as soon as I brought the VC mount window forward on the screen. So it's not a boot loader issue or else I would have got the message when I booted windows.
The only thing I've done different is, I turned on Show System Files in windows. Seems totally unrelated. Why would the boot loader be changing anyway? This is the second time I've updated the system password. I've never had to do this in the past. My system hard drive is not even half populated. I have not installed any software on this computer in over 2 months. I just ran a mem86 memory test with 5 passes, no issues. Know one is in the system because I monitor my ports and all background startup locations. I also checked all my registry load branches, nothing out of the ordinary. I have not left the house today either.
The only thing I've done different is, I turned on Show System Files in windows. Seems totally unrelated. Why would the boot loader be changing anyway? This is the second time I've updated the system password. I've never had to do this in the past. My system hard drive is not even half populated. I have not installed any software on this computer in over 2 months. I just ran a mem86 memory test with 5 passes, no issues. Know one is in the system because I monitor my ports and all background startup locations. I also checked all my registry load branches, nothing out of the ordinary. I have not left the house today either.
↧
New Post: Windows 10 defragment tool not working
I have a SSD boot + HDD storage setup and just finished encrypting both of them with veracrypt but the windows 10 defragment tool is not working for my HDD. The HDD is set to auto mount when windows boots up.
Any way to fix this?
Any way to fix this?
↧
Created Unassigned: Veracrypt volume missing after restart [663]
I had created a Veracrypt volume / container on a __32 GB USB drive__ using exFAT file system in windows 8 OS. The veracrypt volume size was set to 25 GB.
Yesterday, i mounted the veracrypt volume and was accessing a file saved in this veracrypt volume. Unknowingly __before dismounting the veracrypt volume__, I restarted the computer. After rebooting, when I tried to access the USB drive it displayed the message 'E:\ is not accessible' (Location is not available) error.
Windows displayed also displayed an error message 'There's a problem with this drive. Scan the drive now and fix it.' When I clicked on this message box, the contents of the USB drive were immediately displayed but the veracrypt volume, which I had labeled as __MyVault__ was __missing__ from the files list in the USB drive.
Also when I checked the USB partitions in Disk Management, it displayed a __single partition__ instead of two partitions ( one for veracrypt volume & other for the remaining USB drive).
__All the files in the veracrypt volume are available on the USB (as the USB shows used space as 25 GB) but I am unable to access these files, as the veracrypt volume MyVault is not listed in the list of files on the USB drive.__
Kindly provide a solution __to access the files stored on my veracrypt volume__.
Yesterday, i mounted the veracrypt volume and was accessing a file saved in this veracrypt volume. Unknowingly __before dismounting the veracrypt volume__, I restarted the computer. After rebooting, when I tried to access the USB drive it displayed the message 'E:\ is not accessible' (Location is not available) error.
Windows displayed also displayed an error message 'There's a problem with this drive. Scan the drive now and fix it.' When I clicked on this message box, the contents of the USB drive were immediately displayed but the veracrypt volume, which I had labeled as __MyVault__ was __missing__ from the files list in the USB drive.
Also when I checked the USB partitions in Disk Management, it displayed a __single partition__ instead of two partitions ( one for veracrypt volume & other for the remaining USB drive).
__All the files in the veracrypt volume are available on the USB (as the USB shows used space as 25 GB) but I am unable to access these files, as the veracrypt volume MyVault is not listed in the list of files on the USB drive.__
Kindly provide a solution __to access the files stored on my veracrypt volume__.
↧
Edited Unassigned: Veracrypt volume missing after restart [663]
I had created a Veracrypt volume / container on a __32 GB USB drive__ using exFAT file system in windows 8 OS. The veracrypt volume size was set to 25 GB.
Yesterday, i mounted the veracrypt volume and was accessing a file saved in this veracrypt volume. Unknowingly __before dismounting the veracrypt volume__, I restarted the computer. After rebooting, when I tried to access the USB drive it displayed the message 'E:\ is not accessible' (Location is not available) error.
Windows also displayed an error message 'There's a problem with this drive. Scan the drive now and fix it.' When I clicked on this message box, the contents of the USB drive were immediately displayed but the veracrypt volume, which I had labeled as __MyVault__ was __missing__ from the files list in the USB drive.
Also when I checked the USB partitions in Disk Management, it displayed a __single partition__ instead of two partitions ( one for veracrypt volume & other for the remaining USB drive).
__All the files in the veracrypt volume are available on the USB (as the USB shows used space as 25 GB) but I am unable to access these files, as the veracrypt volume MyVault is not listed in the list of files on the USB drive.__
Kindly provide a solution __to access the files stored on my veracrypt volume__.
Yesterday, i mounted the veracrypt volume and was accessing a file saved in this veracrypt volume. Unknowingly __before dismounting the veracrypt volume__, I restarted the computer. After rebooting, when I tried to access the USB drive it displayed the message 'E:\ is not accessible' (Location is not available) error.
Windows also displayed an error message 'There's a problem with this drive. Scan the drive now and fix it.' When I clicked on this message box, the contents of the USB drive were immediately displayed but the veracrypt volume, which I had labeled as __MyVault__ was __missing__ from the files list in the USB drive.
Also when I checked the USB partitions in Disk Management, it displayed a __single partition__ instead of two partitions ( one for veracrypt volume & other for the remaining USB drive).
__All the files in the veracrypt volume are available on the USB (as the USB shows used space as 25 GB) but I am unable to access these files, as the veracrypt volume MyVault is not listed in the list of files on the USB drive.__
Kindly provide a solution __to access the files stored on my veracrypt volume__.
↧
↧
New Post: Veracrypt volume missing after computer restart
I had created a Veracrypt volume / container on a 32 GB USB drive using exFAT file system in windows 8 OS. The veracrypt volume size was set to 25 GB.
Yesterday, i mounted the veracrypt volume and was accessing a file saved in this veracrypt volume. Unknowingly before dismounting the veracrypt volume, I restarted the computer. After rebooting, when I tried to access the USB drive it displayed the message 'E:\ is not accessible' (Location is not available) error.
Windows also displayed an error message 'There's a problem with this drive. Scan the drive now and fix it.' When I clicked on this message box, the contents of the USB drive were immediately displayed but the veracrypt volume, which I had labeled as MyVault was missing from the files list in the USB drive.
Also when I checked the USB partitions in Disk Management, it displayed a single partition instead of two partitions ( one for veracrypt volume & other for the remaining USB drive).
All the files in the veracrypt volume are available on the USB (as the USB shows used space as 25 GB) but I am unable to access these files, as the veracrypt volume MyVault is not listed in the list of files on the USB drive.
Kindly provide a solution to access the files stored on my veracrypt volume.
Yesterday, i mounted the veracrypt volume and was accessing a file saved in this veracrypt volume. Unknowingly before dismounting the veracrypt volume, I restarted the computer. After rebooting, when I tried to access the USB drive it displayed the message 'E:\ is not accessible' (Location is not available) error.
Windows also displayed an error message 'There's a problem with this drive. Scan the drive now and fix it.' When I clicked on this message box, the contents of the USB drive were immediately displayed but the veracrypt volume, which I had labeled as MyVault was missing from the files list in the USB drive.
Also when I checked the USB partitions in Disk Management, it displayed a single partition instead of two partitions ( one for veracrypt volume & other for the remaining USB drive).
All the files in the veracrypt volume are available on the USB (as the USB shows used space as 25 GB) but I am unable to access these files, as the veracrypt volume MyVault is not listed in the list of files on the USB drive.
Kindly provide a solution to access the files stored on my veracrypt volume.
↧
New Post: How to use GRUB over VeraCrypt bootloader? (TrueCrypt VC TC)
Q: Does anyone have succeeded in nesting VC bootloader into GRUB/GRUB2 so it can be shown as a GRUB entry? If yes, can U provide a complete list of instructions how to achieve it, please? I no, Do U guys think it might interest the Dev Team in working out an official solution? (there sure are many more important issues and I don't know how to make it worth for Them to be involved in this one)
The issue is not new and was mentioned at least in 2015-10 (see topic https://sourceforge.net/p/veracrypt/discussion/technical/thread/8e010ef0/
Some people've tried to achieve it by "extracting the MBR created by VeraCrypt and putting it in a place accessible by GRUB (for example /boot)" as Mounir IDRASSI had written but with no luck. The only successful approach is to press Esc in VC bootloader to proceed to GRUB. It would be great if some linux gurus could help us work out a solution.
The issue is not new and was mentioned at least in 2015-10 (see topic https://sourceforge.net/p/veracrypt/discussion/technical/thread/8e010ef0/
Some people've tried to achieve it by "extracting the MBR created by VeraCrypt and putting it in a place accessible by GRUB (for example /boot)" as Mounir IDRASSI had written but with no luck. The only successful approach is to press Esc in VC bootloader to proceed to GRUB. It would be great if some linux gurus could help us work out a solution.
↧
New Post: Do I need to create one VeraCrypt rescue disk for each disk I encrypt?
Thank you kavsrf, appreciate your responses and help.
↧
New Post: Veracrypt format password
Basically, since governments are putting people in prison for failing to decrypt HDD:
I see a few ways which a better end result could be achieved:
e.g. "Man jailed 16 months, and counting, for refusing to decrypt hard drives
He’s not charged with a crime. Judge demands he help prosecutors build their case."
Plenty of people may have encrypted sticks or disks laying around home from many years ago of which they forgot the password genuinely... Of which they don't need the content anymore.
I see a few ways which a better end result could be achieved:
- Allow for entering two passwords: one for decrypting, and one for wiping (quick format).
-
Allow for entering two encryption passwords: both will have different shadow files on the HDD. (only visible with password 1, or password 2). This way you can unlock the drive in different mode to see different files. Would it be possible to report empty space for other shadow files?It would have to keep track and writes on actual empty locations. (until full or something, maybe other people have better ideas for this one)
e.g. "Man jailed 16 months, and counting, for refusing to decrypt hard drives
He’s not charged with a crime. Judge demands he help prosecutors build their case."
Plenty of people may have encrypted sticks or disks laying around home from many years ago of which they forgot the password genuinely... Of which they don't need the content anymore.
↧
↧
New Post: Hidded operating system on a brand new SSD
Hi to all the community here
I have a very important and urgent question about making a Hidden OS on my brand new Samsung 850 EVO.
I read posts online saying that with the wear-leveling and TRIM feature of the SSD the encryption is less secure and less efficient on those SSD. Is that right?
I also read that in order to maintain a good speed after the full disk encryption I must create a partition of 75% of the total space of my SSD and install the Hidden operation system there, so the empty space should be used to not impact the performance, is this right too?
But there are some security concerns about what I'm going to do?
In the end what I want to do is create an Hidden OS on my SSD with the same security provided on a normal HDD but with a better performance than a normal HDD.
So my question is simple: How can I do that?
Unfortunately in all the posts I read I couldn't find a conclusive indication of what u should do on SSD to maintain perfect security and good speed.
So if I encrypt only the 75% of my SSD and install there the Hidded OS, am I safe?
Thanks in advance.
I have a very important and urgent question about making a Hidden OS on my brand new Samsung 850 EVO.
I read posts online saying that with the wear-leveling and TRIM feature of the SSD the encryption is less secure and less efficient on those SSD. Is that right?
I also read that in order to maintain a good speed after the full disk encryption I must create a partition of 75% of the total space of my SSD and install the Hidden operation system there, so the empty space should be used to not impact the performance, is this right too?
But there are some security concerns about what I'm going to do?
In the end what I want to do is create an Hidden OS on my SSD with the same security provided on a normal HDD but with a better performance than a normal HDD.
So my question is simple: How can I do that?
Unfortunately in all the posts I read I couldn't find a conclusive indication of what u should do on SSD to maintain perfect security and good speed.
So if I encrypt only the 75% of my SSD and install there the Hidded OS, am I safe?
Thanks in advance.
↧
New Post: Veracrypt format password
You spoke about area - steganography
steganography - In real word this is illusion of protection. Possibility to prove presence of some data and guess the data is encrypted is high => problem you wrote.
VC hidden volumes is good step but VC is tool only. Plausible Deniability is not simple.
steganography - In real word this is illusion of protection. Possibility to prove presence of some data and guess the data is encrypted is high => problem you wrote.
VC hidden volumes is good step but VC is tool only. Plausible Deniability is not simple.
↧
New Post: Installing on Vista - shortcut icon problem
I have Vista 32-bit. I tried to install VeraCrypt 1.19 (and 1.18a and 1.2x beta) first time and I have the similar problem described here: https://veracrypt.codeplex.com/workitem/518
Installing process stops ('installation failed') in command 'adding icon c:(...)Veracrypt.lnk'. If I uncheck 'Add Veracrypt to Start menu', and leave select 'Add Veracrypt icon to desktop', then stops when adding icon to desktop.
So I uncheck both adding icon shortcut, then installation successful without shortcut. It looks fine, but whether will all work properly?
I opened 'Veracrypt Setup' and 'Repair/Reinstal' with select both adding icon, then appear:
'The Veracrypt device driver cannot be unloaded.
Please close all open Veracrypt windows first. If it does not help, please restart Windows and then try again.'
Ofcorse, nothing proces of Veracrypt turned on. Anyway, I restart computer, without result.
Uninstalled Veracrypt, and installed successful ver. 1.17 WITH shortcut, and then upgrade to 1.19 WITHOUT select add shortcut. (If I upgrade with select add icon shortcut, then 'installation failed'.) Now it looks fine, but again, whether will all work properly?
Installing process stops ('installation failed') in command 'adding icon c:(...)Veracrypt.lnk'. If I uncheck 'Add Veracrypt to Start menu', and leave select 'Add Veracrypt icon to desktop', then stops when adding icon to desktop.
So I uncheck both adding icon shortcut, then installation successful without shortcut. It looks fine, but whether will all work properly?
I opened 'Veracrypt Setup' and 'Repair/Reinstal' with select both adding icon, then appear:
'The Veracrypt device driver cannot be unloaded.
Please close all open Veracrypt windows first. If it does not help, please restart Windows and then try again.'
Ofcorse, nothing proces of Veracrypt turned on. Anyway, I restart computer, without result.
Uninstalled Veracrypt, and installed successful ver. 1.17 WITH shortcut, and then upgrade to 1.19 WITHOUT select add shortcut. (If I upgrade with select add icon shortcut, then 'installation failed'.) Now it looks fine, but again, whether will all work properly?
↧