It will only return 100% valid if you certify the Veracrypt certificate with yours prior to doing the signature check. You may have overlooked this because you said you are not familiar with gpg4win. Highlight the imported Veracrypt certificate > choose Certify from the Toolbar/Menu or right click the imported Veracrypt key: 5069A233D55A0EEB174A5FC3821ACD02680D16DE (in the Kleopatra window) > Certify.
Firstly, it is always a prudent practice to keep a second copy of your container (or any other file that may matter to you) as a fallback. No grounds for second thoughts there even if there is an exception to every rule. You say your USB drive needs erasing to enable password protection. If that's the case why would you be in any doubt whatsoever of the need for a backup of the container? And, yes you will still have access to your backed up container once you move it back to your USB drive after...
Yes, if the Veracrypt folder (Container ?) itself is not damaged, you should be able to decrypt (or did you mean Mount ?). You can also decrypt if you run VC in portable mode: https://www.veracrypt.fr/en/Portable%20Mode.html You have to be consistent with how you address VC Volumes: Containers, Partitions (System & Non-system), Volumes (System & Non-system), Folders, Files. You can't casually throw them around by calling it a folder only to switch to a file in the next sentence. Can throw off those...
I linked you to the issue just to alert you to any potential for mishaps if they (MS) muck up somewhere during the deployment phase via Windows Update. Once the Revocations are in place (manually or via an update), your external installation Boot media/Backup Rescue Disks (across the board) will be rendered un-bootable from, with Secureboot enabled. You'd have to manually disable Secureboot until all your Boot media are updated with the modifications, to get back in. Ideally we'd want the updated...
@kysvggbb You're running Windows 11 (so likely UEFI and Secureboot enabled). You'll very soon have to contend with this issue: KB5025885: How to manage the Windows Boot Manager revocations for Secure Boot changes associated with CVE-2023-24932 https://support.microsoft.com/help/5025885. And, there's no opt-out, it seems. More details here: https://www.elevenforum.com/t/additional-guidance-for-devices-using-secure-boot-to-address-cve-2023-24932.14761/
Thank you Was late to find out they had a change of mind.
I asked the same question to a search engine. It threw up an overwhelming number of choices. I'll leave you to do the reading and make your own decision. For e.g: https://www.lifewire.com/free-backup-software-tools-2617964 Personally, I'm familiar with the all too popular Macrium Reflect, Disk Genius and Clonezilla. Although Clonezilla is open source, it is as the name suggests a cloning tool which lacks the feature of differential backups. If you are armed with any of the Linux distros, cloning...
@idrassi Thank you for your acknowledgement. Happy to have done my little bit. You guys (the unsung heroes) do the real deal. Like others, I also want to take this opportunity to thank you and others involved in the project for taking time and resources away from your personal lives in making our digital lives more secure. A big thanks also to the Bitdefender team for extending their support by going beyond the call of duty. @ehheh1000 You set the ball rolling. We could have gotten there quicker...