Hello, I have a drive that was once a system encrypted bootable drive. It was actually a physical sector-by-sector clone of my current boot drive which is also system encrypted, and of course (because it is a clone) with the same password. But then I decided I no longer need the clone, reformatted and partitioned it and created a non-system encrypted partition on it. Everything works fine, I can access all data. However, I now noticed that when I boot the system with a WinPE bootable USB stick, that...
Hello, I have a drive that was once a system encrypted bootable drive. It was actually a physical sector-by-sector clone of my current boot drive which is also system encrypted, and of course (because it is a clone) with the same password. But then I decided I no longer need the clone, reformatted and partitioned it and created a non-system encrypted partition on it. Everything works fine, I can access all data. However, I now noticed that when I boot the system with a WinPE bootable USB stick, that...
Hello, I have a drive that was once a system encrypted bootable drive. It was actually a physical sector-by-sector clone of my current boot drive which is also system encrypted, and of course (because it is a clone) with the same password. But then I decided I no longer need the clone, reformatted and partitioned it and created a non-system encrypted partition on it. Everything works fine, I can access all data. However, I now noticed that when I boot the system with a WinPE bootable USB stick, that...
Hello, when I boot from the rescue media (CD or stick) and enter the password, wouild that be the password that is valid for the key on the rescue media, or on the harddisk? Meaning: would it be possible to have several rescue media with different passwords? This way you could encrypt the system with password A, create the rescue CD, change to password B, create a second CD, and then boot the system with two different passwords from the two CDs. This would support a real multi-user environment without...
Hello, I am wondering if there is any more detailed documentation about system encryption on GPT disks. First thing I am curious about is that the encryption wizard talks inconsistently about rescue media (CD and/or USB stick). I understand that there is no longer a CD involved but the rescue files have to be copied to a USB stick. But there seems to be no information about how to use that stick. Is this a bootable stick, and if so how do I make it bootable and boot from it? Or does the VeraCrypt...
On the other hand, it is important to keep this check in the portable version since it provides an extra way to test the system without relaying on the binaries already present. I cannot agree to this. I think that in my case I am facing an example where this is not useful at all. I created a bootable Win10XPE stick containing several tools, among them VeraCrypt portable, and an encrypted file container hosting several additional files. Whenever I plug in the stick into one of my machines I mount...
Hi, I created a Hyper-V machine hosting a Windows 10 LTSC evaluation installation. I attempt to encrypt the windows partition. I cannot encrypt the whole drive because it is GPT partitioned. During the process, I am asked to create a VeraCrypt rescue disk, which is in this case a ZIP archive that I am asked to copy to a USB stick. There is no possibility to attach a USB stick to a Hyper-V machine as far as I know. The /noisocheck parameter does not help since I cannot skip this step either. Is there...
Well, I answered ;) Point is that the Evil Maid warning seems to pop up as soon as anyone runs a portable VeraCrypt exe on a machine with system encryption, where the portable version is older than the installed one. This is, in my opinion, not acceptable, given the seriousness of that (falsely reported) attack.