Help support alternative media by visiting our advertisers

2021 Security Series (Part 2): Veracrypt – Installing, Setting Up, and Using Encrypted Data Storage

There are legal documents to which you simply don’t want thieves to have access

Veracrypt

Veracrypt – Installing, Setting Up, and Using Encrypted Data Storage

By John Jacob Schmidt, Radio Free Redoubt

First off… it’s FREE and open source

In many countries today, such as Afghanistan, China, Pakistan, Iran, and elsewhere, simply getting caught with an electronic version of the Bible can get you and/or your family and friends arrested, tortured, or killed.

Not all information is a matter of life or death.  There are legal documents (such as your will), banking information, family medical information, etc which you simply don’t want hackers, thieves, or snooping government entities to have access to.

Veracrypt is a cross-platform application which allows:

  • Creation of encrypted storage vaults (partitioned volumes) on your hard drive or on portable storage (such as thumb drives)
  • Can encrypt entire drives (thumb drives, external hard drives, etc.)
  • Can encrypt your whole operating system (later, after you’ve become familiar with using Veracrypt)
  • Encrypted volumes can be transferable across the internet or handed off using portable drives

From the Veracrypt Website Main Page:

VeraCrypt is a free open source disk encryption software for Windows, Mac OSX and Linux. Brought to you by IDRIX (https://www.idrix.fr) and based on TrueCrypt 7.1a.

VeraCrypt main features:

 

These excellent tutorials will walk you through downloading, setting up, and using most (if not all) the features included in the Veracrypt software program:

 

 

Download it and practice setting up an encrypted volume on a thumb drive today!

Then, lean how to create a hidden volume (a volume within a volume — the password you enter determines which of the two volumes will open).  Here’s a tutorial:

NOTE:  The author does not mention, the first file (volume) you create must be larger than the next one (hidden volume) you intend to create inside of the first volume.  Example… If you intend to create another (hidden) volume size (let’s say), 3 gigabytes, then create a 5 gigabyte volume first.  If you have 5GB of ‘TOP-secret’ data, then make your first volume (folder) 6 or 7 GB, so the 5GB volume will fit, and still leave room in the first volume for ‘Not-so-secret’ data.

 

Another great posting, with step-by-step download and setup instructions on Windows (ptooey!) is at:

Veracrypt

 

 

 

Related: 2021 Security Series (Part 1): Setting up TAILS Portable Secure Operating System

The views, opinions, or positions expressed by the authors and those providing comments are theirs alone, and do not necessarily reflect the views, opinions, positions of Redoubt News. Social Media, including Facebook, has greatly diminished distribution of our content to our readers’ newsfeeds and is instead promoting Main Stream Media sources. This is called ‘Shadow-banning’. Please take a moment and consider sharing this article with your friends and family. Thank you. Please support our coverage of your rights. Donate here

(Visited 33 times, 1 visits today)