Mounir, you may or may not see this but it needs to be said regardless. I just wanted to take a moment to acknowledge the tremendous effort put forth by you into the VeraCrypt project. Upon reading the BSI security evaluation that recently came out, all I could think about was the countless hours and late nights (for 7 years!) you must have put in to continuously improve the program. VeraCrypt is obviously a passion project and your effort does not go unnoticed. Thank you Mounir. Thank you Enigma2Illusion...
Option to include VC portable when creating encrypted removable drives and auto-run VC portable upon drive mount, if possible. When I insert my bitlocker encrypted drive, I am greeted with a passphrase prompt. This ease of use would be a great benefit to the users of VC. An encrypted removable drive should be a self contained system that does not require the use of external programs to function.
It would be nice if there was a central, continuously updated webpage page that shows the Audit findings and if those finding have been corrected or not for whatever reason + the VC version that correction took place . That way the users could see the current versions attack vectors.
It would be nice if there was a central, updated webpage page that shows the Audit findings and if those finding have been corrected or not for whatever reason. That way the users could see the current versions attack vectors.
Option to include VC portable when creating encrypted removable drives and auto-run VC portable upon drive mount, if possible. When I insert my bitlocker encrypted drive, I am greeted with a passphrase prompt. This ease of use would be a great benefit to the users of VC. An encrypted removable drive should be a self contained system that does not require there use of extenal programs to function.
When I insert my bitlocker encrypted drive, I am greeted with a passphrase prompt. This ease of use would be a great benefit to the users of VC. An encrypted removable drive should be a self contained system that does not require there use of extenal programs to function.
I've been using VC exclusively with HDDs rather than flash media due to HDDs seeming to be a more secure storage media compared to SSDs due to TRIM/Wear Leveling technologies inherant to SSDs. I am curious as to whether or not SD cards are safe to use with VC (non-system whole drive encrypton use case). The idea is to encrypt the drive before any personal info is written to the drive (no sensitive info will be written to an unencrypted SD card at any time). Good or bad idea? Should I stick with HDDs...
I've been using VC exclusively with HDDs rather than flash media due to HDDs seeming to be a more secure storage media compared to SSDs due to TRIM/Wear Leveling technologies inherant to SSDs. I am curious as to whether or not SD cards are safe to use with VC (non-system whole drive encrypton use case). The idea is to encrypt the drive before any personal info is written to the drive (no sensitive info will be written to an unencrypted SD card at any time). Good or bad idea? Should I stick with HDDs...