Which type of VeraCrypt volume is better – partition or file container?
File containers are normal files so you can work with them as with any normal files (file containers
can be, for example, moved, renamed, and deleted the same way as normal files). Partitions/drives
may be better as regards performance. Note that reading and writing to/from a file container may
take significantly longer when the container is heavily fragmented. To solve this problem,
defragment the file system in which the container is stored (when the VeraCrypt volume is
dismounted).
What’s the recommended way to back up a VeraCrypt volume?
See the chapter How to Back Up Securely.
What will happen if I format a VeraCrypt partition?
See the question “Is it possible to change the file system of an encrypted volume?” in this FAQ.
Is it possible to change the file system of an encrypted volume?
Yes, when mounted, VeraCrypt volumes can be formatted as FAT12, FAT16, FAT32, NTFS, or any
other file system. VeraCrypt volumes behave as standard disk devices so you can right-click the
device icon (for example in the ‘Computer’ or ‘My Computer’ list) and select ‘Format’. The actual
volume contents will be lost. However, the whole volume will remain encrypted. If you format a
VeraCrypt-encrypted partition when the VeraCrypt volume that the partition hosts is not mounted,
then the volume will be destroyed, and the partition will not be encrypted anymore (it will be
empty).
Is it possible to mount a VeraCrypt container that is stored on a CD or DVD?
Yes. However, if you need to mount a VeraCrypt volume that is stored on a read-only medium
(such as a CD or DVD) under Windows 2000, the file system within the VeraCrypt volume must be
FAT (Windows 2000 cannot mount an NTFS file system on read-only media).
Is it possible to change the password for a hidden volume?
Yes, the password change dialog works both for standard and hidden volumes. Just type the
password for the hidden volume in the ‘Current Password’ field of the ‘Volume Password Change’
dialog.
Remark: VeraCrypt first attempts to decrypt the standard volume header and if it fails, it attempts to decrypt
the area within the volume where the hidden volume header may be stored (if there is a hidden volume
within). In case it is successful, the password change applies to the hidden volume. (Both attempts use the
password typed in the ‘Current Password’ field.)