Does VeraCrypt also encrypt file names and folder names?
Yes. The entire file system within a VeraCrypt volume is encrypted (including file names, folder
names, and contents of every file). This applies to both types of VeraCrypt volumes – i.e., to file
containers (virtual VeraCrypt disks) and to VeraCrypt-encrypted partitions/devices.
Does VeraCrypt use parallelization?
Yes. Increase in encryption/decryption speed is directly proportional to the number of
cores/processors your computer has. For more information, please see the chapter Parallelization
in the documentation.
Can data be read from and written to an encrypted volume/drive as fast as if the drive was
not encrypted?
Yes, since VeraCrypt uses pipelining and parallelization. For more information, please see the
chapters Pipelining and Parallelization.
Does VeraCrypt support hardware-accelerated encryption?
Yes. For more information, please see the chapter Hardware Acceleration.
Is it possible to boot Windows installed in a hidden VeraCrypt volume?
Yes, it is. For more information, please see the section Hidden Operating
System.
Will I be able to mount my VeraCrypt volume on any computer?
Yes, VeraCrypt volumes are independent of the operating system. You will be able to mount your
VeraCrypt volume on any computer on which you can run VeraCrypt (see also the question
” Can I use VeraCrypt in Windows if I do not have administrator privileges?”).
Can I unplug or turn off a hot-plug device (for example, a USB flash drive or USB hard drive)
when there is a mounted VeraCrypt volume on it?
Before you unplug or turn off the device, you should always dismount the VeraCrypt volume in
VeraCrypt first, and then perform the ‘Eject’ operation if available (right-click the device in the
‘Computer’ or ‘My Computer’ list), or use the ‘Safely Remove Hardware’ function (built in Windows,
accessible via the taskbar notification area). Otherwise, data loss may occur.
What is a hidden operating system?
See the section Hidden Operating System.