Menu

Self Destruct Password for VeraCrypt container/ drives

Anonymous
2014-10-10
2015-05-22
  • Anonymous

    Anonymous - 2014-10-10

    Hi,
    what do you think about to implement in VeraCrypt an additional self destruct password so if you type in this password the file will be deleted and VeraCrypt overwrites the file so that no one is able to reconstruct your data.
    Maybe it is enough that the header will be destroyed.
    In case that a person is forced to hand out the password this could be an amazing opportunity to protect your data.

    I am looking for a mechanism which scramble the volume header or the file. So you have 3 different passwords. One for the container, one for the hidden container and one if someone forces you to hand out the password. If you type in this special password there will be no way to break the code because the file is scrambled. There are a lot of situations where the attackers don't have the time or the technical ressources to copy your VeraCrypt file before so that after the scrambling the file is lost forever.

    Another feature which is missing is that VeraCrypt have the ability to scramble the header or file if someone enters the wrong password. There should be a possibility to choose the number of wrong attempts before encrypting.

    Furthermore if you don't use a container and your entire drive is encrypted the self destruct password could act as a panic button before booting.

     
  • Anonymous

    Anonymous - 2014-10-15

    +1 to you mate, very important spec

     
  • Anonymous

    Anonymous - 2014-10-16

    Thx :) These are features which could VeraCrypt really pushes forward. I hope that the developers will implement these ideas.

     
  • Anonymous

    Anonymous - 2014-11-03

    This is not a security feature, and thus rather useless. Please don't waste time with implementing such functionality. Reason: a determined attacker could always copy the file before and/or work on a read-only medium. So an attempt to irretrievably "destroy" the container/file is not possible in the digital world.
    The "lot of situations where the attackers don't have the time or the technical ressources to copy your VeraCrypt file" statement is not valid here - you always have to assume the worst case and consider a knowledgeable attacker. The only protection in all kind of scenarios is choosing a strong password, and of course using the "hidden volume" feature.

     
  • Anonymous

    Anonymous - 2014-11-05

    To the post above...

    You have misunderstood the threat model.

     
  • Mounir IDRASSI

    Mounir IDRASSI - 2014-12-10

    There is a discussion about this in the VeraCrypt forum on Codeplex: https://veracrypt.codeplex.com/discussions/570172

    At this stage, the best approach is to implement this feature through the use of hot-keys and/or button click coupled with warning dialog because validating a password would take a long time and this will defeat the purpose of such "panic button" feature.

    Don't hesitate to participate to the discussion.

     
  • Anonymous

    Anonymous - 2015-01-16

    In a worst case scenario the adversary could gather proof that hidden data really exist by comparing some hashes before and after such an operation. Of course he still would have to clone the data before. So this functionality itself could compromise plausible deniability.

    With that in mind as a user, I still would find this useful - to have a choice.

     
  • Anonymous

    Anonymous - 2015-05-21

    And with a copy protection system? I use the ironkey for example...

     

Log in to post a comment.

MongoDB Logo MongoDB