How to Back Up Securely ................................................................................................................ 101
Non-System Volumes ............................................................................................................ 101
System Partitions .................................................................................................................... 101
General Notes ......................................................................................................................... 103
Miscellaneous .................................................................................................................................... 104
Using VeraCrypt Without Administrator Privileges .............................................................. 104
Sharing over Network ............................................................................................................ 105
VeraCrypt Background Task .................................................................................................. 101
Volume Mounted as Removable Medium .............................................................................. 102
VeraCrypt System Files & Application Data ......................................................................... 103
How to Remove Encryption ................................................................................................... 105
Uninstalling VeraCrypt .......................................................................................................... 106
Digital Signatures ................................................................................................................... 107
Troubleshooting ................................................................................................................................ 109
Incompatibilities ............................................................................................................................... 118
Known Issues & Limitations ........................................................................................................... 119
Known Issues ......................................................................................................................... 119
Limitations ............................................................................................................................. 119
Frequently Asked Questions ............................................................................................................ 122
Technical Details ............................................................................................................................... 136
Notation ....................................................................................................................................................... 136
Encryption Scheme ..................................................................................................................................... 137
Modes of Operation ..................................................................................................................................... 139
Header Key Derivation, Salt, and Iteration Count ..................................................................................... 140
Random Number Generator ....................................................................................................................... 141
Keyfiles ......................................................................................................................................................... 143
PIM .............................................................................................................................................................. 145
PIM Usage.............................................................................................................................. 145
Changing/clearing the PIM .................................................................................................... 146
VeraCrypt Volume Format Specification ................................................................................................... 149
Compliance with Standards and Specifications .......................................................................................... 151
Source Code ................................................................................................................................................. 151
Contact .............................................................................................................................................. 152
Legal Information ............................................................................................................................ 152
Version History ................................................................................................................................. 153
Acknowledgements ........................................................................................................................... 156
References ......................................................................................................................................... 157