The next screen is going to ask you to move your mouse as randomly as possible within the window.
#Ubuntu veracrypt password
How you create your password is up to you, but remember that the strength of the encryption is absolutely irrelevant if your password is “password123†or something simple! There are various methods for creating and actually remembering passwords like that to be found on the internet. Your password should be 20+ characters, with no words or repeated phrases or numbers.Īn example of a secure password is: $kl% ^kAsmxFC^75$ When asked about creating a password it is absolutely crucial that your password is secure. Simply put, FAT is fine as a filesystem, unless you plan to put files that are larger than 4GB themselves into the container, then you’ll want to select a different format (Although if you selected that option, VeraCrypt will pick one for you!) The next couple screens are fairly self explanatory, selecting the size of the container you wish to make, and the filesystem used. Now, for the paranoid minded, yes, I did say made by the NSA, however there is no evidence of any backdoor to SHA-512. SHA-512 was designed by the NSA and is widely considered one of the more secure algorithms for password hashes while maintaining great speed. Twofish is even more powerful and complex, albeit a little slower to decode, and Serpent is the grandaddy of slow but beefy encryption.†This suite means that IF an adversary somehow managed to break the AES encryption or find a way past it, they still have Twofish and Serpent in their way, making it extremely unlikely (as long as the rest of this setup is done properly) that anyone will EVER access this file by force.įor my Hash Algorithm, I use SHA-512 or Whirlpool typically. I’m not going to get into a huge explanation about these, but the general point to get across to you is, “AES is what your SSL and TLS certificates typically use, and is the industry standard military grade encryption. I personally am on the viewpoint of, “I’d rather it be as secure as possible.†After all, why am I going through all this trouble, just to make my container something that can be broken into.? So, for my own container I chose a cascade suite of cyphers AES first, Twofish next and then finishing with Serpent. Once that’s finished, it’s time to select the Algorithm we want to use.
![ubuntu veracrypt ubuntu veracrypt](https://www.solvetic.com/uploads/tutorials/monthly_11_2020/f4f09dd2deb4835fae423e0ca2108583.png)
I tend to make mine usually just gibberish names, like “dmbe7363†or something personally but ultimately you could name it, “Top secret files I want to hide from the government†if you wanted to as well.
![ubuntu veracrypt ubuntu veracrypt](https://pinguin.gws2.de/px/design/hardware/prev_ubuntu_veracrypt15.jpg)
Next, we want to click Volumes > Create New Volume.įrom there, select that you wish to create a container, and make it standard not hidden on the next screen as well.Īt this point it’s time to create the file you wish to use as a container.
![ubuntu veracrypt ubuntu veracrypt](https://storage.googleapis.com/static.configserverfirewall.com/images/ubuntu/veracrypt/mount-veracrypt-volume.jpg)
Pop open your applications menu and find VeraCrypt, usually under “Accessoriesâ€.