Top Banner

Click here to load reader

TRUECRYPT User Guide.pdf · PDF file this document is provided "as is" without warranty of any kind, whether express, implied, or statutory. the entire risk as to the...

Jul 22, 2020

ReportDownload

Documents

others

  • TTRRUUEECCRRYYPPTT F R E E O P E N - S O U R C E O N - T H E - F L Y E N C R Y P T I O N

    USER’S GUIDE

    www.truecrypt.org

    Version Information

    TrueCrypt User’s Guide, version 7.1a Released by TrueCrypt Foundation on February 7, 2012

    Legal Notices

    THIS DOCUMENT IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND, WHETHER EXPRESS, IMPLIED, OR STATUTORY. THE ENTIRE RISK AS TO THE QUALITY, CORRECTNESS, ACCURACY, OR COMPLETENESS OF THE CONTENT OF THIS DOCUMENT IS WITH YOU. THE CONTENT OF THIS DOCUMENT MAY BE INACCURATE, INCORRECT, INVALID, INCOMPLETE AND/OR MISLEADING. IN NO EVENT WILL ANY AUTHOR OF THE SOFTWARE OR DOCUMENTATION, OR ANY APPLICABLE COPYRIGHT OWNER, OR ANY OTHER PARTY WHO MAY COPY AND/OR (RE)DISTRIBUTE THIS SOFTWARE OR DOCUMENTATION, BE LIABLE TO YOU OR TO ANY OTHER PARTY FOR ANY DAMAGES, INCLUDING, BUT NOT LIMITED TO, ANY DIRECT, INDIRECT, GENERAL, SPECIAL, INCIDENTAL, PUNITIVE, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, CORRUPTION OR LOSS OF DATA, ANY LOSSES SUSTAINED BY YOU OR THIRD PARTIES, A FAILURE OF THIS SOFTWARE TO OPERATE WITH ANY OTHER PRODUCT, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES, OR BUSINESS INTERRUPTION), WHETHER IN CONTRACT, STRICT LIABILITY, TORT (INCLUDING, BUT NOT LIMITED TO, NEGLIGENCE) OR OTHERWISE, ARISING OUT OF THE USE, COPYING, MODIFICATION, OR (RE)DISTRIBUTION OF THIS SOFTWARE OR DOCUMENTATION (OR A PORTION THEREOF), OR INABILITY TO USE THIS SOFTWARE OR DOCUMENTATION, EVEN IF SUCH DAMAGES (OR THE POSSIBILITY OF SUCH DAMAGES) ARE/WERE PREDICTABLE OR KNOWN TO ANY (CO)AUTHOR, INTELLECTUAL-PROPERTY OWNER, OR ANY OTHER PARTY.

    BY INSTALLING, RUNNING, USING, COPYING, (RE)DISTRIBUTING, AND/OR MODIFYING THIS SOFTWARE, INCLUDING, BUT NOT LIMITED TO, ITS DOCUMENTATION, OR A PORTION THEREOF, YOU ACCEPT AND AGREE TO BE BOUND BY ALL TERMS AND CONDITIONS OF THE TRUECRYPT LICENSE THE FULL TEXT OF WHICH IS CONTAINED IN THE FILE License.txt INCLUDED IN TRUECRYPT BINARY AND SOURCE CODE DISTRIBUTION PACKAGES.

    http://www.truecrypt.org/�

  • 2

    CONTENTS

    INTRODUCTION .............................................................................................................................. 6 BEGINNER’S TUTORIAL .............................................................................................................. 7

    How to Create and Use a TrueCrypt Container ....................................................................... 7 How to Create and Use a TrueCrypt-Encrypted Partition/Device ......................................... 25

    TRUECRYPT VOLUME ................................................................................................................ 26 CREATING A NEW TRUECRYPT VOLUME ........................................................................................ 26

    Hash Algorithm ...................................................................................................................... 26 Encryption Algorithm ............................................................................................................ 26 Quick Format ......................................................................................................................... 27 Dynamic ................................................................................................................................. 27 Cluster Size ............................................................................................................................ 27 TrueCrypt Volumes on CDs and DVDs ................................................................................ 27 Hardware/Software RAID, Windows Dynamic Volumes ..................................................... 28 Additional Notes on Volume Creation .................................................................................. 28

    FAVORITE VOLUMES ....................................................................................................................... 29 SYSTEM FAVORITE VOLUMES ......................................................................................................... 31

    SYSTEM ENCRYPTION ............................................................................................................... 33 Hidden Operating System ...................................................................................................... 33 Operating Systems Supported for System Encryption ........................................................... 34 TrueCrypt Rescue Disk .......................................................................................................... 34

    PLAUSIBLE DENIABILITY ......................................................................................................... 37 HIDDEN VOLUME ............................................................................................................................ 38

    Protection of Hidden Volumes Against Damage ................................................................... 40 Security Requirements and Precautions Pertaining to Hidden Volumes ............................... 43

    HIDDEN OPERATING SYSTEM .......................................................................................................... 47 Process of Creation of Hidden Operating System ................................................................. 49 Plausible Deniability and Data Leak Protection .................................................................... 50 Possible Explanations for Existence of Two TrueCrypt Partitions on Single Drive ............. 50 Safety/Security Precautions and Requirements Pertaining to Hidden Operating Systems ... 52

    MAIN PROGRAM WINDOW ....................................................................................................... 54 Select File .............................................................................................................................. 54 Select Device ......................................................................................................................... 54 Mount ..................................................................................................................................... 54 Auto-Mount Devices .............................................................................................................. 54 Dismount ................................................................................................................................ 54 Dismount All .......................................................................................................................... 55 Wipe Cache ............................................................................................................................ 55 Never Save History ................................................................................................................ 55 Exit ......................................................................................................................................... 55 Volume Tools ........................................................................................................................ 56

  • 3

    PROGRAM MENU ............................................................................................................................. 57 Volumes -> Auto-Mount All Device-Hosted Volumes ......................................................... 57 Volumes -> Dismount All Mounted Volumes ....................................................................... 57 Volumes -> Change Volume Password ................................................................................. 57 Volumes -> Set Header Key Derivation Algorithm .............................................................. 57 Volumes -> Add/Remove Keyfiles to/from Volume ............................................................. 58 Volumes -> Remove All Keyfiles from Volume ................................................................... 58 Favorites -> Add Mounted Volume to Favorites ................................................................... 58 Favorites -> Organize Favorite Volumes ............................................................................... 58 Favorites -> Mount Favorites Volumes ................................................................................. 58 Favorites -> Add Mounted Volume to System Favorites ...................................................... 58 Favorites -> Organize System Favorite Volumes .................................................................. 58 System -> Change Password .................................................................................................. 58 System -> Mount Without Pre-Boot Authentication ............................................................. 58 Tools -> Clear Volume History ............................................................................................. 59 Tools -> Traveler Disk Setup ................................................................................................. 59 Tools -> Keyfile Generator .................................................................................................... 59 Tools -> Backup Volume Header .......................................................................................... 59 Tools -> Restore Volume Header .......................................................................................... 59 Settings -> Preferences ..........................................................................................................

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.