19
TrueCrypt - secure file storage Truecrypt secures your files by preventing anyone without the correct password from accessing them. It is an electronic 'safe', to lock up your files. Homepage http://www.truecrypt.org Computer Requirements Windows 2000/XP /2003/Vista Administrator rights required for installation or to create volumes but not to access existing volumes Version used in this guide 6.1a Installing TrueCrypt Follow any program-specific directions in the Guide If there are none, simply click the link below and choose a location to save the installer Find the installer on your computer and double-click it TrueCrypt: License FOSS (Free and Open Source Software) Required Reading How-to Booklet chapter 4. How to protect the sensitive files on your computer Level (Standard Volumes): 1: Beginner, 2: Average, 3: Intermediate, 4: Experienced, 5: Advanced (Hidden Volumes): 1: Beginner, 2: Average, 3: Intermediate, 4: Experienced, 5: Advanced Time required to start using this tool : (Standard Volumes): 30 minutes (Hidden Volumes): 30 minutes What you will get in return: The ability to effectively protect your files from intruders or unauthorised access The ability to easily and securely store backup copies of your important files 1.1 Things you should know about this tool before you start TrueCrypt will protect your data from being accessed by locking it with a password that you will create. If you forget the password, you will lose access to your data! TrueCrypt uses a process called encryption to protect your files. Please bear in mind that the use of encryption is illegal in some countries. Rather than encrypting specific files, TrueCrypt creates a protected area, called a volume, on your computer. You can safely store your files inside this encrypted volume. TrueCrypt offers the ability to create a standard encrypted volume or a hidden volume. Either one will keep your files confidential, but a hidden volume allows you to hide your important information behind less sensitive data in order to protect it even if you are forced to open up your TrueCrypt volume. This guide explains both processes in detail. During installation, you will be prompted to Install or Extract the software. The first option is best for those who wish to use TrueCrypt on their computer, while the second option is for those who wish to carry a portable version of TrueCrypt on a USB memory stick. TrueCrypt - secure file storage 06/03/2009 01:23 http://en.security.ngoinabox.org/book/export/html/183 1 of 19

TrueCrypt - Secure File Storage

Embed Size (px)

Citation preview

Page 1: TrueCrypt - Secure File Storage

TrueCrypt - secure file storage

Truecrypt secures your files by preventing anyone without the correct password from accessing them. It is an electronic

'safe', to lock up your files.

Homepage

http://www.truecrypt.org

Computer Requirements

Windows 2000/XP

/2003/Vista

Administrator rights required

for installation or to create

volumes but not to access

existing volumes

Version used in this guide

6.1a

Installing TrueCrypt

Follow any program-specific directions in theGuideIf there are none, simply click the link belowand choose a location to save the installerFind the installer on your computer anddouble-click it

TrueCrypt:

License

FOSS (Free and Open Source Software)

Required Reading

How-to Booklet chapter 4. How to protect the sensitive files on your computer

Level

(Standard Volumes): 1: Beginner, 2: Average, 3: Intermediate, 4: Experienced, 5: Advanced

(Hidden Volumes): 1: Beginner, 2: Average, 3: Intermediate, 4: Experienced, 5: Advanced

Time required to start using this tool:

(Standard Volumes): 30 minutes

(Hidden Volumes): 30 minutes

What you will get in return:

The ability to effectively protect your files from intruders or unauthorised access

The ability to easily and securely store backup copies of your important files

1.1 Things you should know about this tool before you start

TrueCrypt will protect your data from being accessed by locking it with a password that you will create. If you forget the

password, you will lose access to your data! TrueCrypt uses a process called encryption to protect your files. Please bear in

mind that the use of encryption is illegal in some countries. Rather than encrypting specific files, TrueCrypt creates a

protected area, called a volume, on your computer. You can safely store your files inside this encrypted volume.

TrueCrypt offers the ability to create a standard encrypted volume or a hidden volume. Either one will keep your files

confidential, but a hidden volume allows you to hide your important information behind less sensitive data in order to protect it

even if you are forced to open up your TrueCrypt volume. This guide explains both processes in detail.

During installation, you will be prompted to Install or Extract the software. The first option is best for those who wish to useTrueCrypt on their computer, while the second option is for those who wish to carry a portable version of TrueCrypt on a USB

memory stick.

TrueCrypt - secure file storage 06/03/2009 01:23

http://en.security.ngoinabox.org/book/export/html/183 1 of 19

Page 2: TrueCrypt - Secure File Storage

Check: The desired option and proceed through the installation

Working with Standard Volumes

TrueCrypt is a program which secures your files by preventing anyone without the correct password from accessing them. It

functions like an electronic 'safe', letting you lock up your files so that only someone with the correct password can read them.

TrueCrypt works by letting you set up volumes or sections on your computer where you can securely store files. When you

create data in, or move data to these volumes, TrueCrypt will automatically encrypt that information. As you open or take your

files out, it automatically decrypts them for use. This process is called on-the-fly encryption.

2.1 How to Create a Standard Volume

To start TrueCrypt, Select: Start > Programs > TrueCrypt > TrueCrypt or click: on your desktop.

TrueCrypt - secure file storage 06/03/2009 01:23

http://en.security.ngoinabox.org/book/export/html/183 2 of 19

Page 3: TrueCrypt - Secure File Storage

Figure 1: The TrueCrypt screen

TrueCrypt lets you create two kinds of volumes: Hidden and Standard. In this section, you will learn how to create a StandardVolume in which to store your files.

Step 1. Click: to activate the TrueCrypt Volume Creation Wizard as follows:

Figure 2: The TrueCrypt Volume Creation Wizard screen

The Volume Creation Wizard appears. You are presented with three options for creating an encrypted volume. We will

describe the creation of an encrypted file container in this section, which is the preferred option for security and maintenance.

Step 2. Click:

The following screen of the Volume Creation Wizard offers the opportunity to create a Standard or Hidden TrueCrypt volume.

TrueCrypt - secure file storage 06/03/2009 01:23

http://en.security.ngoinabox.org/book/export/html/183 3 of 19

Page 4: TrueCrypt - Secure File Storage

Figure 3: The TrueCrypt Volume Type screen

Important: For more information about How to Create a Hidden Volume, please see the Hidden Volumes Section.

Step 3. Check: the 'Standard TrueCrypt Volume' option

Step 4. Click:

You can specify where you would like to store your Standard Volume in the TrueCrypt Volume Creation Wizard screen. Thisfile can be stored like any other file. To specify a file name and location for your Standard Volume, perform the following steps:

Figure 4: The TrueCrypt Volume Creation Wizard featuring the Volume Location pane

Note: A TrueCrypt Standard Volume is contained inside a normal file. This means that it can be moved, copied or even

deleted! It's important to remember which file it is, and where you’ve put it.

Step 5. Click:

TrueCrypt - secure file storage 06/03/2009 01:23

http://en.security.ngoinabox.org/book/export/html/183 4 of 19

Page 5: TrueCrypt - Secure File Storage

Figure 5: The Specify Path and File Name window

In this tutorial, we will create our Standard Volume in the My Documents folder, and name the file My Volume (see Figure 5).However, you may choose your own file name and location (please refer to section 2.2 How to Create a Standard Volume

on a USB Memory Stick).

Tip: You can use any file name and file extension. For example, you can name your Standard Volume recipes.doc, so that itwill look like a Word document, or holidays.mpg, so it will look like a movie file. This is one way you can help disguise theexistence of your Standard Volume.

Step 6. Type the Standard Volume file name in the File name text field.

Step 7. Click: to close the Specify Path and File Name window and return to the Volume Creation Wizard windowas follows:

Figure 6: The TrueCrypt Volume Creation Wizard featuring the Volume Location pane

Step 8. Click:

2.2 How to Create a Standard Volume on a USB Memory Stick

To create a TrueCrypt Standard Volume on a USB memory stick, follow steps 1 to 3 in section 2.1 How to Create a Standard

Volume, where you activate the Select a TrueCrypt Volume screen. Instead of choosing My Documents as your file

location, navigate to and choose your USB memory stick. Then, choose a file name and create the Standard Volume there.

2.3 How to Create a Standard Volume (continued)

At this stage, you are ready to choose a specific encryption method (or algorithm as it is referred to on the screen) for yourStandard Volume. This will be used to encode the data that will be stored in the Standard Volume.

TrueCrypt - secure file storage 06/03/2009 01:23

http://en.security.ngoinabox.org/book/export/html/183 5 of 19

Page 6: TrueCrypt - Secure File Storage

Figure 7: The TrueCrypt Volume Creation Wizard featuring the Encryption Options pane

Note: You may leave the default options here as they appear. All algorithms presented in the two options here are considered

secure.

Step 1. Click: to activate the TrueCrypt Volume Creation Wizard screen as follows:

Figure 8: The TrueCrypt Volume Creation Wizard featuring the Volume Size pane

The Volume Size pane lets you specify the size of the Standard Volume. In this example, it is set at 10 megabytes. However,you may specify a different size. Consider the documents and file types you would like to store, and their sizes, and then set

an appropriate Volume Size for them.

Tip: If you want to backup your Standard Volume to a CD later on, then you could make the size 700MB.

Step 2. Type in your specific volume size into the text field.

Step 3. Click:

The TrueCrypt Volume Creation Wizard featuring the Volume Password pane appears as follows:

TrueCrypt - secure file storage 06/03/2009 01:23

http://en.security.ngoinabox.org/book/export/html/183 6 of 19

Page 7: TrueCrypt - Secure File Storage

Figure 9: The TrueCrypt Volume Creation Wizard featuring the Volume Password pane

Important: Choosing a secure and strong password is among the most important tasks you can perform in creating a

Standard Volume. A good password will protect your encrypted volume, and the stronger the password you choose, the better.

You don’t have to create your own passwords, or remember them, if you use a password generation program like KeePass.

Please refer to the KeePass guide to learn more information about password creation and storage.

Step 4. Type then re-type your password into the Confirm text fields.

Step 5. Click:

Important: The Next button will remain disabled until passwords in both text fields match. If your password is not particularlysafe or secure, you will see a warning advising you of this. Consider changing it! Although TrueCrypt will still work with any

password you have chosen, your data may not be very secure.

Figure 10: The TrueCrypt Volume Creation Wizard featuring the Volume Format pane

On the next screen, TrueCrypt will begin creating a Standard Volume. Move your mouse randomly within the TrueCrypt VolumeCreation Wizard window for at least 30 seconds. The longer you move the mouse, the better. This is important for the qualityof the encryption key.

Step 6. Click:

TrueCrypt will begin creating a Standard Volume. TrueCrypt will now create a file named My Volume in the My Documents

TrueCrypt - secure file storage 06/03/2009 01:23

http://en.security.ngoinabox.org/book/export/html/183 7 of 19

Page 8: TrueCrypt - Secure File Storage

folder as earlier specified. This file will be a TrueCrypt Standard Volume, 10 Megabytes in size, that you can use to securely

store your files .

After a Standard Volume has been created, the following dialog box will appear:

Figure 11: The TrueCrypt volume has been successfully created message screen

Step 7. Click:

We have just successfully created a TrueCrypt Standard Volume.

Step 8. Click: to finish creating your Standard Volume.

How to Mount the Standard Volume

In this section, you will learn how to 'mount' your newly created Standard Volume. In TrueCrypt, 'mounting' refers to making

the volume available for use.

To begin mounting your Standard Volume, perform the following steps:

Step 1: Start the TrueCrypt program.

Step 2: Select a drive from the list as follows:

Figure 12: The TrueCrypt main screen

The Standard Volume will be mounted on the M: drive.

Note: In this example, the 'M' drive letter is selected, but you can choose any other available drive letter.

Step 3. Click:

TrueCrypt - secure file storage 06/03/2009 01:23

http://en.security.ngoinabox.org/book/export/html/183 8 of 19

Page 9: TrueCrypt - Secure File Storage

The Select a TrueCrypt Volume screen will appear as follows:

Figure 13: The Select a TrueCrypt Volume screen

Step 4. Select the Standard Volume file that you created , then click:

The Select a TrueCrypt file screen closes to reveal the main TrueCrypt window.

Step 5: Click: to activate the Enter password for prompt screen as follows:

Figure 14: The Enter password prompt screen

Step 6: Type the password in the Password: text field.

Step 7:` Click:

TrueCrypt will begin to mount the Standard Volume.

Note: If the password you typed is incorrect, TrueCrypt will notify you and you will need to re-type your password and click:

. If the password is correct, the Standard Volume will be mounted as follows:

TrueCrypt - secure file storage 06/03/2009 01:23

http://en.security.ngoinabox.org/book/export/html/183 9 of 19

Page 10: TrueCrypt - Secure File Storage

Figure 15: The TrueCrypt main screen displaying the newly mounted Standard Volume

Step 8. Double-click the highlighted entry in TrueCrypt or double-click the corresponding drive letter in the My Computer

screen to access the Standard Volume now mounted on drive 'M:' on your computer).

Figure 16: Accessing the Standard Volume through the My Computer screen

Note: We have just successfully mounted the My Volume Standard Volume as a virtual disk 'M:'. This virtual disk behaves likea real disk, except that it is entirely encrypted. Any files will be automatically encrypted when you copy, move or save them to

this virtual disk (a process known as on-the-fly encryption).

You can copy files to and from the Standard Volume just as you would copy them to any normal disk (for example, by dragging-

and-dropping them). When you move a file out of the Standard Volume, it is automatically decrypted. Conversely if you move a

file onto the Standard Volume, TrueCrypt automatically encrypts it. If your computer crashes or is suddenly switched off,

TrueCrypt will immediately close the Standard Volume.

Tip: Its recommended to use the 'secure move' feature of the Eraser program for transferring files to the Truecrypt volume.

This will ensure that no traces of the files are left behind on the computer or USB memory stick that they came from.

3.1 How to Dismount the Standard Volume

In TrueCrypt, 'dismounting' a Standard Volume simply means closing it.

To close or dismount a Standard Volume and make its files accessible only to someone with a password, follow these steps:

Step 1. Select the volume from the list of mounted volumes in the main TrueCrypt window.

TrueCrypt - secure file storage 06/03/2009 01:23

http://en.security.ngoinabox.org/book/export/html/183 10 of 19

Page 11: TrueCrypt - Secure File Storage

Figure 17: Selecting the Standard Volume to be dismounted

Step 2. Click:

You have now successfully dismounted (or closed) the TrueCrypt Standard Volume.

Important! Make sure to dismount your TrueCrypt volume before putting it in Standby or Hibernate mode. Better yet, alwaysshut-down your computer or laptop if you plan on leaving it unattended. This will prevent anyone from being able to gain your

volume password.

To retrieve a file stored in your Standard Volume once you have closed or dismounted it, you will have to mount it again.

How to Back up your Volume

Backing up your documents, files and folders on a regular basis is critical. Backing up your TrueCrypt Volume is vital, and

(fortunately) easy to do. Don't forget that your volume must be dismounted before you back it up.

Step 1. Locate your Standard Volume (in our example it is located in the My Documents folder).

Figure 18: Locating the My Volume file, using the My Documents window

Step 2. Save the file to an external memory device, like a CD, DVD or a USB memory stick.

TrueCrypt - secure file storage 06/03/2009 01:23

http://en.security.ngoinabox.org/book/export/html/183 11 of 19

Page 12: TrueCrypt - Secure File Storage

Tip: If you have large amounts of data that you want to encrypt and archive repeatedly, why not create a new Standard

Volume which is the same size as a CD or DVD? This could be used as a secure archiving technique.

Before you back up the Volume to a removable device, make sure that the device size corresponds to the size of your

Volume.

Backup medium Suggested TrueCrypt volume size

CD 700mb

DVD 3900mb

USB memory stick Suggested 25% of total capacity (e.g. For 128MB USB stick, use 30MB for your Standard Volume)

Hidden Volumes

In TrueCrypt, a Hidden Volume is stored within your encrypted Standard Volume, but its existence is concealed. Even when

you mount or open your Standard Volume it is not possible either to find or to prove the existence of the hidden volume. If you

are forced to give up your password and the location of your Standard Volume, then its content may be revealed, but not the

existence of the Hidden Volume within.

Imagine a briefcase with a false bottom. You keep files that you do not mind losing or having confiscated in the normal section

of your briefcase, and you keep the important and private files in the false compartment. The point of the secret compartment

(especially a well-designed one) is to hide its own existence and therefore, the documents within it. This concept defines the

TrueCrypt Hidden Volumes.

5.1 How to a Create a Hidden Volume

The creation of a TrueCrypt Hidden Volume is similar to creating a TrueCrypt Standard Volume: Some panes, screens and

windows even appear to be the same.

Step 1. Start the TrueCrypt program

Step 2. Click:

Step 3. Click: in the Volume Creation Wizard to select the 'Create an encrypted file container' option

Step 4. Check the Create a hidden TrueCrypt volume option as follows:

Figure 19: The Create a hidden TrueCrypt volume option

Step 5. Click:

You will then be prompted to choose either Direct Mode: of creating the Hidden Volume within an existing Standard Volume, orNormal Mode: that will create a completely new Standard Volume in which to store the Hidden Volume. For this example, wewill use the Direct Mode.

Note: If you would rather start a new Standard Volume, please repeat the process from Section 2.1 How to Create a

Standard Volume.

TrueCrypt - secure file storage 06/03/2009 01:23

http://en.security.ngoinabox.org/book/export/html/183 12 of 19

Page 13: TrueCrypt - Secure File Storage

Figure 20: The Wizard Mode pane

Step 6. Check the Create a hidden volume within an existing TrueCrypt volume option.

Step 7. Click:

Step 8. Select the My Volume file located within the My Documents folder, that you created during the Standard Volume

tutorial.

Note: Make sure the Standard Volume is unmounted before selecting it.

Step 9. Click:

Figure 21: The Specify Path and File Name window

Step 10. Locate the volume file using the Specify Path and File Name window.

Step 11. Click:

The Specify Path and File Name screen closes, returning you to the TrueCrypt screen.

TrueCrypt - secure file storage 06/03/2009 01:23

http://en.security.ngoinabox.org/book/export/html/183 13 of 19

Page 14: TrueCrypt - Secure File Storage

Step 12. Click:

In the next screen, you are prompted for the password you used when creating the Standard Volume.

Step 13. Type your password into the Password and text field.

A message screen appears after you have correctly entered your passwords saying that the TrueCrypt program will now

examine the Standard Volume and determine how much space there is (if any) to create a Hidden Volume.

Step 14. Click:

The following screen confirms the last few steps taken, and lets you know what the next steps will be.

Step 15. Click:

Figure 22: The Hidden Volume Encryptions options pane

This screen looks familiar because it appeared when creating a Standard Volume in section 2. We must now choose an

encryption method for our Hidden Volume.

Step 16. Select an Encryption Algorithm and Hash Algorithm for your Hidden Volume

Tip: Select a different algorithm for the Hidden Volume from the one you chose for the Standard Volume.

Step 17. Click:

Figure 23: The Hidden Volume Size pane

You will be prompted to specify the size of the Hidden Volume.

Note: Consider the kind of documents, their quantity and size that need to be stored. Remember to leave some space for the

Standard Volume. If you select the maximum size available for the Hidden Volume, you will not be able to put any more new

files into the original Standard Volume.

If your Standard Volume is 10 Megabytes(MB) in size and you specify a Hidden Volume size of 5MB, you will end up with two

volumes (one Hidden and one Standard) of 5MB each.

You must make sure that the information you store in the Standard Volume does not exceed the 5MB you have chosen. This

is because the TrueCrypt program itself does not automatically detect the existence of the Hidden Volume, and it could

accidentally overwrite it. You will risk losing all files stored in the Hidden Volume if you exceed your previously established

TrueCrypt - secure file storage 06/03/2009 01:23

http://en.security.ngoinabox.org/book/export/html/183 14 of 19

Page 15: TrueCrypt - Secure File Storage

size.

Step 18. Type the hidden volume size you want into the text box as above (we choose 5MB for our example).

Step 19. Click:

Now you have to create a password for the Hidden Volume. Again, remember to choose a strong password. Please refer to

the KeePass chapter to learn more about creating strong passwords. In addition, the password must be different from the

one you created for the Standard Volume.

Tip: If you foresee a situation where you may be forced to reveal the contents of your TrueCrypt Volume, then create a

password that you can remember for the Standard Volume and a secure password, to store in KeePass, for the Hidden

Volume. This will help to conceal the existence of the Hidden Volume.

Step 20. Create your password and type it in twice.

Step 21.Click:

Figure 24: The Hidden Volume Format pane

Leave the default File System and Cluster options as they are.

Step 22. Move the mouse cursor around the screen to generate random data.

Step 23. Click:

When the Hidden Volume has been formatted, this warning screen will appear as follows:

Figure 25: The Volume Creation Wizard message screen

Warning: You are being advised of the danger of overwriting files in the Hidden Volume when storing files in the Standard

Volume.

A message screen appears notifying you that the The Hidden Volume has been successfully created.

Step 24. Click:

The Hidden Volume has now been created inside your Standard Volume. This now allows you to store documents, hidden

within your Standard Volume, that are invisible even to someone who has the password for that particular Standard Volume.

5.2 How to Mount the Hidden Volume

TrueCrypt - secure file storage 06/03/2009 01:23

http://en.security.ngoinabox.org/book/export/html/183 15 of 19

Page 16: TrueCrypt - Secure File Storage

Now that we have created the Hidden Volume, how do we access it? The answer is easy: Exactly the same way you would

access the Standard Volume! However, we will use the password for the Hidden Volume rather than the password for the

Standard Volume. This is how TrueCrypt determines whether to open the Hidden Volume, or the Standard Volume.

To 'mount' or open the Hidden Volume, follow these steps:

Figure 26: A mount drive selected in the TrueCrypt Volume screen

Step 1. Select: A drive letter, for example 'K:'

Step 2. Click:

The Select a TrueCrypt Volume screen will appear shortly.

Step 3. Locate then select the file that is your TrueCrypt volume.

Step 4. Click:

The Select a TrueCrypt Volume screen closes, returning you to the TrueCrypt main screen.

Step 5. Click: , activating the Enter Password for prompt screen as follows:

Figure 27: The Enter Password screen

Step 6. Type the password you used to create the Hidden Volume.

The Hidden Volume is now mounted (or opened).

Your will see an entry like this on your TrueCrypt screen:

Figure 28: The TrueCrypt main screen displaying the newly mounted Standard Volume

This displays the following information:

The Location - C:\My Documents\My Volume

The Size - 5.0MB

The Encryption Algorithm: - AES-TwoFish-Serpent

The Volume Type - Hidden

To access the Hidden Volume, either:

Step 1. Double-click on this entry or access through the My Computer window.

Step 2. Double-click the corresponding drive letter (in this example, it is the letter K).

5.3 Tips on How to Use the Hidden Disk Feature Securely

The purpose of the hidden disk feature is to escape a potentially dangerous situation by appearing to hand over yourencrypted files, when someone in a position of power demands to see them, without actually being forced to reveal your most

sensitive information. In addition to protecting your data, this may allow you to avoid further jeopardising your own safety or

exposing your colleagues and partners. For this technique to be effecitve, you must create a situation where the person

demanding to see your files will be satisfied by what you show them and let you go.

TrueCrypt - secure file storage 06/03/2009 01:23

http://en.security.ngoinabox.org/book/export/html/183 16 of 19

Page 17: TrueCrypt - Secure File Storage

In order to do this, you may want to implement some of the following suggestions:

Put some confidential documents that you do not mind exposing in the Standard Volume. This information must be

sensitive enough that it makes sense for you to keep it in an encrypted volume.

Be aware that someone who is demanding to see your files may know of TrueCrypt's ability to create Hidden Volumes.

If you are using TrueCrypt correctly, however, this person will not be able to prove that your Hidden Volume exists,

which will make your denial more believable.

Update the files in the Standard Volume on a weekly basis. This will createe the impression that you really are using

those files

Whenever you mount a TrueCrypt volume, you can choose to enable the Protect hidden volume against damage caused bywriting to outer volume feature. This is a very important option that allows you to add new 'decoy' files to your StandardVolume without worrying that you might accidentally delete and replace the encrypted contents of your Hidden Volume. As

mentioned earlier, exceeding the storage limit on your Standard Volume may otherwise destroy your hidden files. You should

never enable the Protect hidden volume option when forced by someone else to mount a TrueCrypt volume, because doing sorequires you to enter the secret password to your Hidden Volume and will clearly reveal that volume's existence. When you

are updating your 'decoy' files in private, however, you should always enable this option.

To use the Protect hidden volume feature, perform the following steps.

Step 1. Click the Mount Options button on the Enter Password prompt shown in Figure 27, above. This will reveal the MountOptions Window, as follows:

Figure 29: The Mount Options window

Step 2. Check the Protect hidden volume against damage caused by writing to outer volume option.

Step 3. Type the password you chose for your Hidden Volume

Step 4. Click OK

Step 5. Continue with the process of mounting your Standard Volume. When it is successfully mounted , you will be able to

add 'decoy' files without damaging your Hidden Volume

Step 6. Remember to dismount your Standard Volume when you are done modifying its contents.

Remember, you only need to do this when you are updating the files in your Standard Volume. When revealing your Standard

Volume to someone else, you should not use the Protect hidden volume feature.

FAQ and Review

Claudia and Pablo are pleased with TrueCrypt, especially as the program was easy to install and now works automatically.

However, before they finally decide on using it, they both still have a few questions about TrueCrypt.

Pablo wants to know:

Q: Am I going to have to spend all my time putting passwords into this thing?

A: No, you only need to type the password in once, when you’re opening the Standard Volume. When you’ve done that, youcan open any file in it without putting in the password each time.

TrueCrypt - secure file storage 06/03/2009 01:23

http://en.security.ngoinabox.org/book/export/html/183 17 of 19

Page 18: TrueCrypt - Secure File Storage

Q: Can I easily uninstall TrueCrypt if I don’t want it any more? If I do, will my files remain encrypted?

A: Yes, TrueCrypt can be easily removed by selecting Start > Programs > Truecrypt > Uninstall Truecrypt. Remember torelocate all of your files from the Volume before you remove the program, otherwise, you will NOT be able to access themagain. If you transfer the Volume to another computer, you will still need your password and the TrueCrypt program to accessit.

Q: If I have a problem with TrueCrypt, is there a website or an e-mail address I can contact for help?

A: For help and support, see the TrueCrypt websites documentation at http://www.TrueCrypt.org/docs/ or the forum athttp://forums.TrueCrypt.org/or the Security Box website. However, nobody will be able to recover a forgotten Volumepassword for you!

Claudia wants to know:

Q: Will different versions of Windows bring up different screens when we try to load and use TrueCrypt??

A: Their appearance may be slightly different, but the content will remain the same.

Q: Which files do we need to encrypt?

A: Ideally you should encrypt all your documents, pictures and any other files that contain private and work-related information.Should you lose your computer, or if it is confiscated, the information within your TrueCrypt volume will remain secure.

Both Claudia and Pablo want to know:

Q: How secure will our files be?

A: TrueCrypt has been independently tested and reviewed by security experts to see how well it performs and whether itperforms all the functions it claims to. Overall results show that TrueCrypt offers a very high level of protection. Choosing astrong password will be essential to the security of your Volume.

The hidden disk feature in TrueCrypt offers a unique level of security for information stored on the computer. The user needs

to have an excellent grasp of the program and its basic functions, as well as an expert assessment of their own security

situation, and of when the hidden disk feature might be useful.

Questions regarding the hidden disk feature

Q: Remind me again, how do I mount my original Standard Volume, rather than the one that’s hidden?

A: It all depends on what password you enter in the Password box. If you enter the Standard Volume password, thenTrueCrypt will mount that Standard Volume. If you enter the Hidden Volume password, then TrueCrypt will mount that HiddenVolume. If someone demands that you open your TrueCrypt volume so that they can see what type of information is there, youopen the Standard Volume. Hopefully this will be enough to get you off the hook and out of trouble.

Q: is it possible to inadvertently damage or delete the hidden disk?

A: Yes. If you continue to add files to the standard TrueCrypt Hidden Volume until the there isn't sufficient empty space (for thehidden disk to exist) then your hidden disk will be automatically overwritten. There is an option in TrueCrypt menu that canprotect your hidden disk from being overwritten, but switching this option on may identify the existence of the hidden disk to anadversary.

Q: Can I change the size of the hidden disk after creating it?

A: No. You will have to create another hidden disk and move files to it manually.

Q: Can I use tools like chkdsk, Disk Defragmenter, and others on the contents of a mounted TrueCrypt volume?

A: TrueCrypt volumes behave like real physical disk devices, so it is possible to use any file system checking/repairing/defragmenting tools on the contents of any mounted TrueCrypt volume.

Q: Is it possible to change the password for a Hidden Volume?

A: Yes. The Password change feature applies to both Standard and Hidden Volumes. Just type the password for the HiddenVolume in the 'Current Password' field of the 'Volume Password Change' prompt screen.

Q: When should I use the hidden disk feature?

A: Use TrueCrypt's hidden disk feature when you need to hide the existence of certain information on your computer. Notethat this is different from using a Standard Volume, where you are protecting access to the information.

For a detailed FAQ about TrueCrypt please refer to http://www.TrueCrypt.org/faq.php

6.1 Questions with which to test yourself after completing the Standard Volume section

TrueCrypt - secure file storage 06/03/2009 01:23

http://en.security.ngoinabox.org/book/export/html/183 18 of 19

Page 19: TrueCrypt - Secure File Storage

What is encryption? (hint: see the booklet chapter 4. How to protect the sensitive files on your computer)1.

What is a Standard Volume?2.

How can you create a Standard Volume on a USB memory stick?3.

What are the different ways to dismount a Standard Volume?4.

How can you choose and maintain a good password for your Standard Volume? (Tip: Please refer to the booklet

chapter 3. How to create and maintain secure passwords, and the KeePass hands-on guide).

5.

What are the possibilities for creating a backup of your Standard Volume?6.

What are some methods to disguise the presence of your Standard Volume on the computer?7.

6.2 Questions with which to test yourself after completing the Hidden Volume section

What is the main difference between a Standard Volume and a Hidden Volume?1.

What type of files should you put in a Standard Volume, if you also have a hidden one?2.

Where is the Hidden Volume located?3.

What is the ideal size for the Hidden Volume?4.

What are the advantages and disadvantages of protecting your Hidden Volume from accidental erasure?5.

TrueCrypt - secure file storage 06/03/2009 01:23

http://en.security.ngoinabox.org/book/export/html/183 19 of 19