Reallocated Sectors..................................................................................................................97
Defragmenting..........................................................................................................................98
Journaling File Systems............................................................................................................98
Volume Clones..........................................................................................................................99
Additional Security Requirements and Precautions.................................................................99
How to Back Up Securely................................................................................................................100
Non-System Volumes.............................................................................................................100
System Partitions....................................................................................................................100
General Notes.........................................................................................................................102
Miscellaneous....................................................................................................................................103
Using VeraCrypt Without Administrator Privileges...............................................................103
Sharing over Network............................................................................................................104
VeraCrypt Background Task...................................................................................................104
Volume Mounted as Removable Medium..............................................................................106
VeraCrypt System Files & Application Data..........................................................................107
How to Remove Encryption...................................................................................................109
Uninstalling VeraCrypt...........................................................................................................110
Digital Signatures...................................................................................................................111
Troubleshooting................................................................................................................................113
Incompatibilities...............................................................................................................................122
Known Issues & Limitations...........................................................................................................123
Known Issues.........................................................................................................................123
Limitations..............................................................................................................................123
Frequently Asked Questions............................................................................................................126
Technical Details...............................................................................................................................140
Notation.....................................................................................................................................................140
Encryption Scheme...................................................................................................................................141
Modes of Operation...................................................................................................................................143
Header Key Derivation, Salt, and Iteration Count...................................................................................144
Random Number Generator.....................................................................................................................145
Keyfiles......................................................................................................................................................147
PIM............................................................................................................................................................149
PIM Usage..............................................................................................................................149
Changing/clearing the PIM....................................................................................................150
VeraCrypt Volume Format Specification..................................................................................................154
Compliance with Standards and Specifications........................................................................................157
Source Code..............................................................................................................................................157
Contact..............................................................................................................................................158
Legal Information.............................................................................................................................158
Version History.................................................................................................................................159
Acknowledgements...........................................................................................................................167
References.........................................................................................................................................168
4