VeraCrypt & The Demo that will BLOW YOUR MIND!

Поділитися
Вставка
  • Опубліковано 18 січ 2025

КОМЕНТАРІ • 148

  • @flicksonj
    @flicksonj 3 роки тому +9

    i didnt skip a bit. nice narration + explanation. no boring

  • @justincase5272
    @justincase5272 Рік тому +10

    Gotcha beat:
    - Store part of your VeraCrypt password in a password manager
    - Store the other part of your VeraCrypt password in memory.
    - Store one keyfile in your password manager
    - Store the other keyfile on your hard drive.

    • @Baumhauskrampf
      @Baumhauskrampf 2 місяці тому +1

      And still you are absolute vulnerable to clipboard snoopers and keyloggers.
      A simple keylogger would reveal the memory part of your password and the other part, as well as the keyfiles, can be obtained via clipboard access (because you need to copy them at a certain point or they will be added to the temp. board via windows itself when deleting). Unfortunately Windows provides great API access to the clipboard and this isnt even hard to do.
      The only way to prevent this is to have MULTIPLE momery parts (like 'l4s3r' AND 'S3v3n') and to put these memory parts INSIDE the password at a memorized point (like 5 chars after the first and the other 5 chars before the last) because you cant retrace where inside the password you've clicked with your mouse to insert this part.

    • @Malc4dead
      @Malc4dead 6 днів тому

      @@Baumhauskrampf Nothing is totally secure, but we can do our best. Run it on Tails Linux off a usb for example - that should prevent malware, keyloggers etc. Even use an offline machine. Then for ultra paranoia, store the usb in a small lead safe. Put safe up butt. Done.

    • @Baumhauskrampf
      @Baumhauskrampf 6 днів тому

      ​@@Malc4dead yeah but if it's to complicated and time consuming to retrieve any password it's not worth it anymore

  • @T-marie-N
    @T-marie-N 2 роки тому +6

    Thank you for this. I'm new to encryption so l learned a lot here. I really appreciate that you answer questions in the comments--so many don't and it's very frustrating when a viewer has questions.

    • @AndyMaloneMVP
      @AndyMaloneMVP  2 роки тому

      You’re very welcome and thanks for your kind comment. Did you see my three-part series on cryptography on my channel? I think you’ll find it very useful. Have a great day and thanks for dropping by.

    • @AndyMaloneMVP
      @AndyMaloneMVP  2 роки тому +1

      @@T-marie-N Hehe no worries. Just be careful :-)

  • @jasonsignor7237
    @jasonsignor7237 2 роки тому +9

    Having no experience with this, I really appreciate your video! And your passion about this. Fun stuff!

    • @AndyMaloneMVP
      @AndyMaloneMVP  2 роки тому

      Thank you so much and I’m delighted to hear that you found it useful.

  • @NoEgg4u
    @NoEgg4u Рік тому +4

    If you create a hidden volume, then that hidden volume's survival is at the mercy of the outer volume.
    Explanation follows. But first understand that the hidden volume's size must be less than the outer volume's size, because the hidden volume is contained within the outer volume.
    Now, if your outer volume is 500 MB, and your hidden volume is 450 MB, then you have only 50 MB of safe, usable space to use in your outer volume.
    However, your outer volume will allow you to use all 500 MB of space. Otherwise, it would reveal that you have a hidden volume.
    So, in our example, where your outer volume is 500 MB and your hidden volume is 450 MB, then if you use 51 MB in your outer volume, you will overwrite something in your hidden volume.
    So once you create a hidden volume, you should avoid using your outer volume (specifically, avoid writing to your outer volume).
    And in case you did not connect the dots when our host set a password (or pass phrase) for the outer volume and for the hidden volume...
    ...be sure that the two volumes use different passwords.
    When you tell VeraCrypt to mount your volume, it will not ask you which one. Again, doing so would reveal that you have a hidden volume.
    So if you put in the outer volume's password, then VeraCrypt will mount the outer volume.
    If you put in the hidden volume's password, then VeraCrypt will mount the hidden volume.
    Lastly, if you use a weak password, then no matter how good the encryption is (and VeraCrypt's encryption is as good as it gets), then you are defeating the purpose of using encryption.
    To be sure that no one can brute force your password, use at least 12 character (and even that is a bit risky, if a well funded attacker (like a 3-letter government agency) tries to break your password. And if your password is in the dictionary, or you simply added a symbol or a number somewhere, that will not really protect you. And as computers increase in speed, so will the need for the length of your password to contain more characters.
    I recommend using two or three words (one being uncommon) to make up a phrase, and add at least two special characters somewhere, for a total of at least 16 characters.
    And the three words should not go together in spoken language. For example, "sch%ool bottle pl$asMa" would be a very strong pass phrase, 99.99999999% impossible to crack by any organization, and is easy to remember.

  • @IvoryOut
    @IvoryOut 2 роки тому +4

    thank you good sir! I looked for 30 minutes for a decent explanation of how to hide the volume AND how to FIND it. I appreciate it very much.

    • @AndyMaloneMVP
      @AndyMaloneMVP  2 роки тому

      You’re welcome and thank you 👍😀

  • @stevenc3500
    @stevenc3500 3 роки тому +7

    Great video, thanks, straight to the point and well explained.

  • @paullabossiere5239
    @paullabossiere5239 2 роки тому +1

    at 4:43 you say that: "standard encryption tools" can break it. Does that include long passwords? I struggle with remembering my passwords and don't really want to onion up. but I also don't want the cops going through my data. I was really hoping I could just do an encrypted drive or partition and call it good.

    • @AndyMaloneMVP
      @AndyMaloneMVP  2 роки тому +1

      Modern GPUs can break simple passwords in less than 1 second. If you must use a password. Use a pass phrase like I love the Orville. This will help, however most forensic tools would eventually crack this in time.

  • @kinggizzard8499
    @kinggizzard8499 11 місяців тому

    Nice video. It's definitely worth going over the PIM feature - this makes brute force attacks practically impossible as well as being a 2nd factor along with your password. Brilliant design

  • @innertruth4206
    @innertruth4206 2 роки тому +1

    Excellent, I use it to encrypt all my external volumes.

  • @d-fault6268
    @d-fault6268 2 роки тому +3

    I've read from faq page, that:
    "In encrypted data, one corrupted bit usually corrupts the whole ciphertext block in which it occurred. The ciphertext block size used by VeraCrypt is 16 bytes (i.e., 128 bits). The mode of operation used by VeraCrypt ensures that if data corruption occurs within a block, the remaining blocks are not affected."
    Is that mean if I full encrypt partition, and then someday bad sector occur in that partition, I still can open/mount the partition and backup uncorrupted files inside it?
    I ask this because there's a lot of opinion in forums that if bad sector occur, than we cant open it at all, and all data lost. But the others say that we still can open and save uncorrupted files as long we have header backup.
    So which one is true? I confused.

    • @AndyMaloneMVP
      @AndyMaloneMVP  2 роки тому +7

      Thanks for your question. As I am an enthusiast of cryptography I would not be qualified to provide you with a 100% technical answer here. However, I do know that modern algorithms have defences against corruption built in. Unlike early versions of the data encryption standard. A very good friend of mine called Gideon Samid is an excellent source of knowledge in this area. He has a great UA-cam channel as well. You may want to reach out to him. He is a professor of cryptography. Anyway I’m delighted that you found my channel and I appreciate the question.

    • @d-fault6268
      @d-fault6268 2 роки тому +1

      @@AndyMaloneMVP Great, thanks for the information

    • @AndyMaloneMVP
      @AndyMaloneMVP  2 роки тому +1

      @@d-fault6268 You’re very welcome

    • @DarkLink606
      @DarkLink606 Рік тому +1

      Both Veracrypt and Bitlocker use AES in XTS mode, which is suitable for encrypting whole disks and particitions, and won't corrupt a full volume because of a few corrupted sectors .
      Veracrypt offers other choices of ciphers, not only AES, I don't know if the same applies to these.

  • @cokezero1
    @cokezero1 3 роки тому +1

    Is susceptible to the same BitLocker attack where the recovery key is stored in Ram

    • @AndyMaloneMVP
      @AndyMaloneMVP  3 роки тому

      Is what susceptible?

    • @cokezero1
      @cokezero1 3 роки тому +1

      ​@@AndyMaloneMVP I was just wondering if it's vulnerable to the same Ram attack as BitLocker is. Because I read an article by Elcomsoft article entitled Breaking VeraCrypt Obtaining and Extracting On-The-Fly Encryption Keys

  • @notmyname4379
    @notmyname4379 2 роки тому +2

    What about comparing file sizes? If the mp4 is 500 GB and you open the outer volume, can someone tell a hidden volume exists based on the used space or something like that?

  • @giantpurplebrain
    @giantpurplebrain 2 роки тому +1

    I know how to create a hidden volume within a volume. However I cannot find any way to create a "volume within a volume within a volume". If I try to create a hidden volume within a hidden volume Veracrypt doesn't allow it.

    • @juggler24960
      @juggler24960 4 місяці тому

      If, as the man says, you create a hidden volume you can then mount a virtual machine inside it and then go through the process again, and again, and again.
      Personally speaking, I don't have anything that would require that (insane) amount of protection!

  • @emporiumdao2222
    @emporiumdao2222 Рік тому +1

    can you make a video on windows10 on a usb hidden partition

  • @jonbrys
    @jonbrys Рік тому +1

    can you give me your opinion on veracrypt vs cryptomator
    and for whole disk what do you think about bitlocker, veracrypt, and mac's filevault? I know that's a lot but it would be very helpful to people new to encryption. what's strongest that has aes 256bit

    • @AndyMaloneMVP
      @AndyMaloneMVP  Рік тому +2

      Thanks for your question, I’ll be honest I’m not familiar with cryptonator so I wouldn’t like to give an opinion. Apples file vault is a tried and tested technology and works very well. Also Microsoft a bit locker has been going through a number of changes recently, especially with the windows 11 so if you need an encryption technology for domestic use, and this is great. Other than that you probably want to look for a more professional solution. The best of luck and thanks again

  • @stryker1992
    @stryker1992 2 роки тому +1

    thanks for this stuff, very well explanations

  • @Ijustreadthisagain
    @Ijustreadthisagain 7 місяців тому

    Thank you for sharing this informative tutorial. One step closer to being able to hide my really good stuff.

  • @danielbowman7226
    @danielbowman7226 Рік тому

    Excellent presentation, Sir.
    Does it mean, that I can upload the mp4 to Google Drive on my HDD , have it sync with cloud (to back it up) and any changes done to it locally will sync no problem? Considering it does not re-encrypt i.e. change the whole 1GB file but just a portion of it, which I modified ? So the syncing is not 1GB every time little change is done to it ?

  • @spectraldenouement
    @spectraldenouement 2 роки тому +2

    Hi i'm a neewbie to this but found your video very helpful. Does encrypting an SSD shorten its lifespan? And is there any point in wiping a portable SSD before installing Veracrypt or will encrypting the drive make it impossible to recover files that have been deleted off it in the past?

    • @AndyMaloneMVP
      @AndyMaloneMVP  2 роки тому +3

      No it doesn’t shorten the lifespan. And yes it’s fine to go ahead and install. You may want to consider self encrypting drives that actually come built into the hardware these days. They’re pretty good. Thanks again and all the best👍😊

  • @vargasbj
    @vargasbj 7 місяців тому

    Hello Andy,
    Greetings from Costa Rica and this is just hilarios presentation !!!!
    Thank you and please keep making really valuable content like this.

  • @dristang
    @dristang 2 роки тому +1

    Hello. I have another question.
    If I create a 10GB Hidden volume, how to set the size for that hidden volume?
    Should I put like 2GB for the Outer volume and then 8GB for the Hidden volume OR vice versa?
    I'm confused with this.
    Thanks

    • @AndyMaloneMVP
      @AndyMaloneMVP  2 роки тому +3

      My friend seriously the best advice I can give you is to read the support pages on the Veracrypt website. This is how I learn and I’m sure you will learn as well👍😊

  • @hihello-ie1lo
    @hihello-ie1lo 3 роки тому +1

    what do you mean when you say a standard volume most forensic tools would be able to capture that and break it at 4:40 ? do you mean bruteforce? i thought that if you had a good password you cant break encryption?

    • @AndyMaloneMVP
      @AndyMaloneMVP  3 роки тому +2

      A Brute force attack attempts to break passwords by trying every combination of letters and numbers. Most western based crypto algorithms have a recovery key (key escrow) Password based crypto is generally quite weak and can be easily broken.

    • @hihello-ie1lo
      @hihello-ie1lo 3 роки тому

      @@AndyMaloneMVP so why is a standard volume easy to break?

    • @AndyMaloneMVP
      @AndyMaloneMVP  3 роки тому +2

      Take a look at the veracrypt support pages. Key escrow is built into most modern crypto systems. Plenty of reading on the web around this topic. Do some research 😊

  • @Zero-ii6if
    @Zero-ii6if 2 роки тому

    Really cool stuff! You talked about inserting VM into the folder, do you like put there the disk or the VM installer and all including?

    • @AndyMaloneMVP
      @AndyMaloneMVP  2 роки тому

      Why not its just a volume. Create the volume, put a VM inside and then extend the onion further by installing VeraCrypt and keep going :-)

  • @nakarmi0205
    @nakarmi0205 3 роки тому +1

    What happens to locked files if .mp4 file or volume gets deleted? Great vid love it.

    • @AndyMaloneMVP
      @AndyMaloneMVP  3 роки тому +2

      You loose it. Encryption does not protect you against deletion unfortunately.

    • @nakarmi0205
      @nakarmi0205 3 роки тому +2

      @@AndyMaloneMVP guess i ll have hide it after encrypting. Thank u fr ur quick reply. 😊

    • @AndyMaloneMVP
      @AndyMaloneMVP  3 роки тому +1

      Yes

  • @cwm125
    @cwm125 Рік тому

    I feel like an idiot. I always believed that a drive, or SD card that was encrypted using Disk Utility on my Mac was secure. I had no idea that a forensic expert could break into and have access to my material. So am I correct in my understanding that encryption only works outside of a government expert? Thank you very much.

  • @zomalfa4363
    @zomalfa4363 Рік тому

    How do you get past the S mode in Windows???

  • @rretro2042
    @rretro2042 11 місяців тому

    is there a performance penalty to doing this

  • @hanshazlitt4535
    @hanshazlitt4535 2 роки тому

    Andy, at 4:40 you made the claim that "forensic tools can break it". What did you mean by this exactly? Can you provide evidence (eg, a video link) or another source to prove this?

    • @AndyMaloneMVP
      @AndyMaloneMVP  2 роки тому

      I make no claims and no guarantees. However, Passware forensic is a well known tool that can break single layer encryption. Details via there website.support.passware.com/hc/en-us/articles/115002145727-How-to-decrypt-Full-Disk-Encryption

    • @hanshazlitt4535
      @hanshazlitt4535 2 роки тому +1

      @@AndyMaloneMVP Thank you for the timely response. It appears these are not flaws in Veracrypt, but other attacks entirely

  • @samehm2841
    @samehm2841 3 роки тому +1

    Thank you for this video 😍

  • @fergalkendall7080
    @fergalkendall7080 5 місяців тому

    Can you please demo how to do this on Mac OS?

  • @ProProboscis
    @ProProboscis 8 місяців тому

    Hello,
    I don't remember which exact cloud service I've used to back up my veracrypt container (probably Sync) but the file ended up getting corrupted once the cloud service synchronized it. Any idea why that happened? Regards.

    • @AndyMaloneMVP
      @AndyMaloneMVP  8 місяців тому

      No sorry

    • @ProProboscis
      @ProProboscis 8 місяців тому

      @@AndyMaloneMVP Thanks anyway, have a nice weekend.

  • @RC-gk1tm
    @RC-gk1tm 9 місяців тому

    is VeraCrypt free to use?

  • @philrose7716
    @philrose7716 Рік тому

    Can you get the same objective with Android?

    • @AndyMaloneMVP
      @AndyMaloneMVP  Рік тому

      I don’t know

    • @philrose7716
      @philrose7716 Рік тому

      Can we try? I've seen a few videos however you are the only one who goes step by step and really explains it well. Please

    • @AndyMaloneMVP
      @AndyMaloneMVP  Рік тому

      @@philrose7716 I appreciate the request, I really do. I’m really a Microsoft 365 guy, and to be honest, this video was recorded quite some time ago. I’m not really an android person as you can probably tell. I use mostly Apple. But thanks for the request and again my apologies for not being able to assist. I hope you’re enjoying the rest of my content though 👍

  • @markusaurelius1190
    @markusaurelius1190 3 роки тому

    Hi I have a full drive with data. If I use Vera Crypt can I encrypt it - after the fact?

  • @seakyle8320
    @seakyle8320 2 роки тому +1

    Outer Volume: 500 mb Inner volume 400 mb. What happens if you put 200mb data to the outer volume= Would it override the inner volume?

    • @AndyMaloneMVP
      @AndyMaloneMVP  2 роки тому +1

      No they are treated a separate volumes

    • @supernovaw39
      @supernovaw39 2 роки тому +2

      @@AndyMaloneMVP I think you gave this person bad advice. The VeraCrypt manuals clearly say and warn you that unless you use safe mode (which is when VeraCrypt detects the "safe" writing area after you put BOTH passwords and only allows writing to it), putting too much data inside the outer volume WILL overwrite and corrupt data inside the hidden volume, because the whole point of it is to be indistinguishable from random useless noise, VeraCrypt can't know if the outer volume is 100% safe to write to or it has hidden data within the 400 out of 500 MB and it must not overwrite it. Thankfully VeraCrypt has a lot of warnings to minimise such human error.

    • @AndyMaloneMVP
      @AndyMaloneMVP  2 роки тому +1

      @@supernovaw39 thanks so much for the feedback I really appreciate it. This is the reason why I don’t offer personal technical support and clearly recommend that you contact the vendor. This was simply meant to be a demo which was done done in a demo environment.

    • @AndyMaloneMVP
      @AndyMaloneMVP  2 роки тому

      @@supernovaw39 thanks so much for the feedback I really appreciate it. This is the reason why I don’t offer personal technical support and clearly recommend that you contact the vendor. This was simply meant to be a demo which was done done in a demo environment.

  • @amla3333
    @amla3333 2 роки тому

    Thank you! What if my computer needs to be wiped clean/reset to factory settings? Will I lose my VeraCrypt files if it’s deleted? When I take my laptop to be serviced, they always ask if anything is on it that I don’t want to lose in case it has to be reset. Is there a way to avoid losing the VeraCrypt files?

    • @AndyMaloneMVP
      @AndyMaloneMVP  2 роки тому +1

      Encryption cannot protect you from deletion. I highly recommend that you back up your data before servicing your laptop.

  • @christianrabe7984
    @christianrabe7984 Рік тому

    Great video, thanks! Well explained

  • @dristang
    @dristang 2 роки тому +1

    Hello Dear Sir,
    I've really enjoyed your tutorial!
    I have a couple of questions.
    1) Is it compulsory to take backup of the .mp4 volume?
    If the mp4 volume is deleted, will I loose access to the encrypted data?
    2) I would be able to access my encrypted data on any device, Only if I use this exact volume right?
    So I have to download Veracrypt. Then mount my .mp4 or whatever volume. IS this correct?
    3) When I choose the disk space, it will allocate the disk space from my computer Hard drives right?
    So will it automatically choose from disk C in windows? Can I change this option to another disk?
    Thanks in advance.

    • @AndyMaloneMVP
      @AndyMaloneMVP  2 роки тому +1

      Thanks for the comments. Q1 The MP4 volume is just an example. You can give the file any name you like. Good practice to always make backups. 2, Vera crypt would need to be installed on every machine that you want to access the volume. 3, Correct. 4, No

    • @dristang
      @dristang 2 роки тому

      @@AndyMaloneMVP Thank you for the replies.

  • @JoelLiDotCom
    @JoelLiDotCom Рік тому

    Thank you for the guide

  • @mer_meh
    @mer_meh 2 роки тому +1

    An FBI whistleblower recently admitted to uploading illegal content into Keith Raniere's computer to make it easier to convict him for life. Is it possible to prevent this situation through encryption?

    • @AndyMaloneMVP
      @AndyMaloneMVP  2 роки тому

      I haven’t heard about that, that sounds very unethical to me, and I’m surprised the judge convicted somebody based on the evidence. Encryption would help, but may not necessarily fix everything as law-enforcement have a forensic tools that could potentially access your data.

    • @pleaseunshadowbanme
      @pleaseunshadowbanme Рік тому

      considering how corrupt the fbi and the level of sickness Raniere was up to it wouldnt be surprising if the FBI themselves did that to help him. Dont forget how the deep state tried to use that NXIVM sex cult and that stormy daniels whore that had their brand on her hip to attack President Trump.

  • @EdKrisiak
    @EdKrisiak 2 роки тому

    Great video !! Thanks Andy :)

  • @rebeccametivier9869
    @rebeccametivier9869 2 роки тому

    I formatted and partitioned my new WD external hard drive to work for both Mac and PC, and I'm wondering what the proper process is to encrypt it with Veracrypt? I also wanted to know how to set it up so I can access the drive on any device whether it has the Veracrypt software downloaded on the computer of not. Is that possible? Or is the only way to unlock the drive via pre-downloaded software on the computer?

    • @AndyMaloneMVP
      @AndyMaloneMVP  2 роки тому

      I will say to you what I say to everyone. Use caution when using encryption software. Remember your password, key in order to access your data later. And always have a back up just in case. All the best, Andy

  • @musclechaser4408
    @musclechaser4408 Рік тому

    i know the password i used, but it keep giving me error messages, anyway to fix this?

    • @AndyMaloneMVP
      @AndyMaloneMVP  Рік тому

      No I’d check the support pages and forums😊

  • @19071940
    @19071940 Рік тому

    Way above my head. But what a pleasure to listen without having to try and drown out the music. do you do a simple version for people with simple minds IE., me😀

    • @AndyMaloneMVP
      @AndyMaloneMVP  Рік тому

      What are kind compliment, thanks so much. 👍

  • @jackyseah6869
    @jackyseah6869 3 роки тому

    Amazing video and very helpful info

    • @AndyMaloneMVP
      @AndyMaloneMVP  3 роки тому

      You’re very welcome and thanks for reaching out

  • @ashikvega
    @ashikvega 2 роки тому

    You are a genius, man!

  • @1724nine
    @1724nine Рік тому

    Amazing video. Way over my head but I love the concepts you presented. Video and audio were perfect compared to police interrogation videos 😂😂😂 It's actually pretty decent regardless.

  • @skippy284
    @skippy284 Рік тому

    Can you do A video on how to use a Yubikey 5 NFC with veracrypt I gues you have to use the PKCS #11 Libary

    • @AndyMaloneMVP
      @AndyMaloneMVP  Рік тому

      I’d love to, but I’m a Mac user and no longer use these products.

    • @skippy284
      @skippy284 Рік тому

      @@AndyMaloneMVP I can find plenty of videos on veracrypt and on yubikey but not one to use them together. What do you use for encryption

  • @SamAssadi
    @SamAssadi Рік тому

    I'm sorry I have to ask, why do you have Edge on a mac? you willingly installed microsoft edge? that's a first 😅

    • @AndyMaloneMVP
      @AndyMaloneMVP  Рік тому

      Why are you sorry🤪 It’s a dam good browser

  • @grover5056
    @grover5056 11 місяців тому

    You create a 500bm external volume, and a 450 mb internal volume, so when you log into the external volume it shows only 50 vb of free space, but when all volumes are closed, the file shows the full 500 mb, this is very suspicious for those who want to know more about you).
    And actually this is the problem of all encryption programs, they (files) cannot be hidden in your OS and can be found in every part of it. So why do developers create this illusion of information security? Why can't they create an operating system where there is no chance of tracking hidden files within each OS...? is the big question, but I think we know the real answer.....

  • @bingomutant1
    @bingomutant1 3 роки тому

    wow very interesting thanks for demo

  • @johnsantos2360
    @johnsantos2360 2 роки тому

    thank you

  • @FaMaSh4
    @FaMaSh4 2 роки тому

    OMG my MIND got BLOWED! ;)

  • @__SKYNET__
    @__SKYNET__ Рік тому

    I mean they could beat you to a pulp to get the inner volume password....I guess you can put in stuff that is meant to be just secret enough to make them think that they hit the true secrets

    • @neoroger510
      @neoroger510 Рік тому

      That's exactly the idea! It should all be deception: imagine the outer volume full of files (for example thousands of mp3 songs) and the inner volume disguised as one of them. Good luck figuring that out!

  • @tjd110
    @tjd110 9 місяців тому

    Great video! Although struck me as funny that an esteemed Microsoft professional uses a Mac (and not Linux pc which is obviously better)

  • @andreww.6507
    @andreww.6507 2 роки тому

    I was kinda excited to see something veracrypt can do that will blow my mind. But what you showed is something I figured out when I was 13 or 14 😅

    • @AndyMaloneMVP
      @AndyMaloneMVP  2 роки тому +1

      Clearly you’re a genius then 😉

    • @andreww.6507
      @andreww.6507 2 роки тому +1

      @@AndyMaloneMVP not at all. but cryptography is fun

  • @geraldcabinatan7567
    @geraldcabinatan7567 2 роки тому

    excellent video. im surprise this only has less than 3,000 views?

    • @AndyMaloneMVP
      @AndyMaloneMVP  2 роки тому

      To be fair I’ve only been doing this for about a year in earnest. So I’m just trying to build up my channel, but I really appreciate your comments and your visit.😊👍

  • @vocaloidsrock6987
    @vocaloidsrock6987 4 місяці тому

    I am just hiding hentai on my computer with Veracrypt. That is all.

    • @iewauhedoc9970
      @iewauhedoc9970 4 місяці тому

      Don't ever give any information away, I used to work as a repair technician in a simple mom and pop shop and had guessed logon passwords a few times when the user forgot to supply them.

  • @Tom-kt8lu
    @Tom-kt8lu Рік тому

    No known forensic tool opens a VeraCrypt volume. And if you use non-AES, you're a mug.

  • @MrDeviousdom
    @MrDeviousdom Рік тому

    I would honestly say that if you are serious about security, you need to stop using windows!

    • @AndyMaloneMVP
      @AndyMaloneMVP  Рік тому

      Not necessarily. The fact is that Windows is by far the most popular operating system out there for desktop computers. Over the years it has gone through significant security improvements and upgrades. To a point where it is now pretty secure. Witness is now generally come through social engineering, or weak applications. But if you secure the workstation in a secure way, and if you follow a solid defence in depth approach, things are pretty good.

    • @MrDeviousdom
      @MrDeviousdom Рік тому

      @@AndyMaloneMVP windows is closed source and considering it's manufacturers history of spying, you should not trust it as far as you can throw it. Also, because it is the most commonly used OS, you can be sure that government agencies have direct access to it. Plus, you've got all of those easily implemented, data logging "viruses" on every corner.
      Granted, no one is going to really care about Grandma's encrypted recipes, but if you are serious about security, choose a different platform!

  • @andreww.6507
    @andreww.6507 2 роки тому

    Broken? 🤭

  • @grover5056
    @grover5056 11 місяців тому

    Russian algorithm?🥴🫣 Communists are around you😂

  • @njpme
    @njpme 2 роки тому +2

    Plausible deniability

    • @AndyMaloneMVP
      @AndyMaloneMVP  2 роки тому

      Ok

    • @JohnBrown-z2u
      @JohnBrown-z2u 2 роки тому +1

      @@AndyMaloneMVP I think he means that you have plausible deniability as an added layer of protection when you use a hidden volume.

    • @AndyMaloneMVP
      @AndyMaloneMVP  2 роки тому

      @@JohnBrown-z2u I think you’re right

  • @MikeHunt-rw4gf
    @MikeHunt-rw4gf 3 роки тому

    Algorithm.

    • @AndyMaloneMVP
      @AndyMaloneMVP  3 роки тому +3

      Sorry one word comments mean little too me. Are you asking a question or making a statement.

    • @MikeHunt-rw4gf
      @MikeHunt-rw4gf 3 роки тому +1

      @@AndyMaloneMVP All Three.