SlideShare una empresa de Scribd logo
1 de 28
Secure Your Digital Life
Part 1 – Create a safe place on your
computer
Contents
Concepts
Install TrueCrypt
Create a secure container
Place dummy files in decoy container
Start using the secure container
Contents
Concepts
Install TrueCrypt
Create a secure container
Place dummy files in decoy container
Start using the secure container
Concepts
Context
• Recently there have been court cases where e.g. pornographic material found on the
defendants’ laptops has been used to implicate the defendant, which stresses the
importance of taking data security seriously
Goal
• In the case of somebody gaining access to our computer (e.g. in case of theft, somebody
snooping around or by a court order) we want to ensure that our personal data remains
that way. Personal and secure.
• We want a password-protected safe place to put our collection of sensitive data. This
data could be anything from top secret documents, our emails (especially relevant for
people who use off-line e-mail clients), or simply our beloved collection of movies with
cute kittens.
• Also, we want a decoy, so that if we are somehow forced to reveal our password, we
can give a fake password that will activate the decoy instead of revealing our real data
Method
• We will use a program called TrueCrypt to create a special file on our computer. This
special file will contain all of our sensitive data in an encrypted format, and we will be able
to access our data, as if it was placed on a hard drive of its own. Also the special file will
contain the decoy files, that will be shown if the decoy password is entered instead of the
real password
Contents
Concepts
Install TrueCrypt
Create a secure container
Place dummy files in decoy container
Start using the secure container
Install TrueCrypt
• Download and install the program: TrueCrypt
- www.truecrypt.org
• For the rest of this guide, we
will assume that TrueCrypt
has been installed.
• To create a safe place to store
your data, Open TrueCrypt
and click on “Create Volume”
Contents
Concepts
Install TrueCrypt
Create a secure container
Place dummy files in decoy container
Start using the secure container
Create a secure container
• Select “Create an encrypted file
container” and click Next
• Select “Hidden TrueCrypt volume”
and click Next
Create a secure container
• Select “Normal mode” and click Next
• [1] Choose a folder to store the file
to use for our container (e.g. select
“Local Disk (C:)”) and [2] write a
name for the file (e.g. “x”) and click
Save
Create a secure container
• Confirm the location of the file and
click Next
• Click Next again…
• …and again (to confirm “Outer
Volume options”)
Create a secure container
• Now we have to select a size for our
container. This of course depends on how
much data you want to store in the
container (e.g. movies take up a lot of
space) and how much space you have
available on your hard drive. For this
example we will use 10 GB, which is
enough to store e.g. a lot of documents
and a decent collection of video material.
• Then we need to create a password for
the Outer Volume – this password is NOT
your real password, but simply a
password that seems plausible and that
you can afford to give up, in case
anybody is trying to extort you.
Create a secure container
• Select “No” to keep large files and
click Next
• Keep the standard options and click
Format to begin preparing the hard
drive for your data.
Create a secure container
• Now the Outer Volume has been
created. Click Next to continue
creating the real secret container.
• …and click Next again
Create a secure container
• Click Next to continue with the
standard options…
• Now we have to define the size of
our hidden container. This depends
on the size we chose for our Outer
Volume earlier and how much space
we want in the outer container. In
this case we will select 9500 MB as
the size we want.
Create a secure container
• Accept the warning telling us we
are using almost all of the space in
the outer container.
• Now create a password for the
hidden volume. This password
should be long, difficult to guess
and only known to you.
Create a secure container
• If you want to store files larger than
4 GB select “Yes”. However, if you
don’t need to store large files or are
using an external drive that you will
also use with Mac or Linux, select
“No”
• Click Next to continue with the
standard options…
Create a secure container
• Congratulations! Now we have created both a decoy container and our real
container to use for sensitive data.
Contents
Concepts
Install TrueCrypt
Create a secure container
Place dummy files in decoy container
Start using the secure container
Place dummy files in decoy container
• To be able to use our secure
containers, we need to first “mount”
them as a drive. Whether it will be
our “real” secure container or the
dummy container, that will be
mounted depends only on the
password that we enter.
• So, to mount the container, first [1]
select the drive letter you want (e.g.
“X:”) then [2] select our file (e.g.
“c:x”) and [3] click “Mount”
Place dummy files in decoy container
• Because we want to access our
decoy container (and put some
plausible dummy content there) we
enter our dummy password.
IMPORTANT: Then [2] click “Mount
options”
• In Mount options, put a checkmark
[1] in “Protect hidden volume…” and
[2] type in the real password. Then
[3] press OK, and OK again to
mount the drive. Finally click OK
again to the information pop-up.
Place dummy files in decoy container
• Now the decoy container has been
mounted as drive “X:” (notice the
“Outer” keyword signifying that is
our decoy)
• Then we can open the drive by
opening “Computer” and go to
Local Disk (X:).
Place dummy files in decoy container
• Of course the folder is now
empty, so we would like to create
some folders and also put some
innocent files and documents on
the drive (just to make it seem
plausible)
• For instance we can create some
folders such as
“Downloads”, “Documents”, “Pictur
es”, and “Videos” (make sure to
create these folders, as we will use
them in a later guide on how to
secure Windows)
Place dummy files in decoy container
• When we are finished putting dummy
content in the decoy container, we
will dismount it, so that we are ready
to mount our real secret container.
• To Dismount simply select the drive
in TrueCrypt and click Dismount
Contents
Concepts
Install TrueCrypt
Create a secure container
Place dummy files in decoy container
Start using the secure container
Start using the secure container
• Again: To be able to use our secure
containers, we need to first “mount”
them as a drive. Whether it will be
our “real” secure container or the
dummy container, that will be
mounted depends only on the
password that we enter.
• So, to mount the container, first [1]
select the drive letter you want (e.g.
“X:”) then [2] select our file (e.g.
“c:x”) and [3] click “Mount”
Start using the secure container
• Now enter the password you
created for the real secret
container and click OK.
• That’s it! Now you can store
your sensitive files on drive X:
(notice the “Hidden” label)
Start using the secure container
• To make it easier to use your new
secure location for data, you can add it
as a “favourite” in TrueCrypt, but first
selecting the drive “X:” and then go to
the menu “Favorites” and select “Add
Mounted Volume to Favorites…”
• Then you can give it a label [1] (e.g.
“personal”) and put a checkmark in [2]
“Mount selected volume upon
logon”, to make the secure drive X:
available every time the computer
starts. (it will then prompt you for a
password every time you restart your
computer. Notice that you can input
either your real password to access
your secure data, or the dummy
password if you are in a pickle and just
want to show some plausible data)
Thank you!

Más contenido relacionado

Destacado

Cambio en la presentación de conocimientos
Cambio en la presentación de conocimientosCambio en la presentación de conocimientos
Cambio en la presentación de conocimientosjulio martínez
 
Bringing the BBC to your iPod: copyright challenges in a global educational c...
Bringing the BBC to your iPod: copyright challenges in a global educational c...Bringing the BBC to your iPod: copyright challenges in a global educational c...
Bringing the BBC to your iPod: copyright challenges in a global educational c...Spoken Word
 
Learn Data Science
Learn Data ScienceLearn Data Science
Learn Data ScienceRyan
 
Set a password for a power point presentation
Set a password for a power point presentationSet a password for a power point presentation
Set a password for a power point presentationRavi Kumar Lanke
 
Kvalita života z pohledu novin (a GIS)
Kvalita života z pohledu novin (a GIS)Kvalita života z pohledu novin (a GIS)
Kvalita života z pohledu novin (a GIS)Jan Cibulka
 
What’s our stack: process, technology, community and ideas for the future of RTI
What’s our stack: process, technology, community and ideas for the future of RTIWhat’s our stack: process, technology, community and ideas for the future of RTI
What’s our stack: process, technology, community and ideas for the future of RTIDavid Eaves
 
Usage Factor: Final Report & Next Steps
Usage Factor: Final Report & Next StepsUsage Factor: Final Report & Next Steps
Usage Factor: Final Report & Next StepsJohn McDonald
 
Datová žurnalistika na koleně
Datová žurnalistika na koleněDatová žurnalistika na koleně
Datová žurnalistika na koleněJan Cibulka
 
Nonprofit Mapping at Net2DC Meetup
Nonprofit Mapping at Net2DC MeetupNonprofit Mapping at Net2DC Meetup
Nonprofit Mapping at Net2DC MeetupDevelopment Seed
 
20 APIer på 20 minuter
20 APIer på 20 minuter20 APIer på 20 minuter
20 APIer på 20 minuterAndreas Krohn
 

Destacado (13)

Cambio en la presentación de conocimientos
Cambio en la presentación de conocimientosCambio en la presentación de conocimientos
Cambio en la presentación de conocimientos
 
Open Government Primer
Open Government PrimerOpen Government Primer
Open Government Primer
 
Bringing the BBC to your iPod: copyright challenges in a global educational c...
Bringing the BBC to your iPod: copyright challenges in a global educational c...Bringing the BBC to your iPod: copyright challenges in a global educational c...
Bringing the BBC to your iPod: copyright challenges in a global educational c...
 
eDamis System
eDamis SystemeDamis System
eDamis System
 
Learn Data Science
Learn Data ScienceLearn Data Science
Learn Data Science
 
Set a password for a power point presentation
Set a password for a power point presentationSet a password for a power point presentation
Set a password for a power point presentation
 
Countdown 2011
Countdown 2011Countdown 2011
Countdown 2011
 
Kvalita života z pohledu novin (a GIS)
Kvalita života z pohledu novin (a GIS)Kvalita života z pohledu novin (a GIS)
Kvalita života z pohledu novin (a GIS)
 
What’s our stack: process, technology, community and ideas for the future of RTI
What’s our stack: process, technology, community and ideas for the future of RTIWhat’s our stack: process, technology, community and ideas for the future of RTI
What’s our stack: process, technology, community and ideas for the future of RTI
 
Usage Factor: Final Report & Next Steps
Usage Factor: Final Report & Next StepsUsage Factor: Final Report & Next Steps
Usage Factor: Final Report & Next Steps
 
Datová žurnalistika na koleně
Datová žurnalistika na koleněDatová žurnalistika na koleně
Datová žurnalistika na koleně
 
Nonprofit Mapping at Net2DC Meetup
Nonprofit Mapping at Net2DC MeetupNonprofit Mapping at Net2DC Meetup
Nonprofit Mapping at Net2DC Meetup
 
20 APIer på 20 minuter
20 APIer på 20 minuter20 APIer på 20 minuter
20 APIer på 20 minuter
 

Similar a Secure your digital life - Part 1

How to Encrypt Your Laptop with TrueCrypt
How to Encrypt Your Laptop with TrueCryptHow to Encrypt Your Laptop with TrueCrypt
How to Encrypt Your Laptop with TrueCryptbrianlawlor
 
Webinar: Ransomware - Five Reasons You’re Not As Protected As You Think
Webinar: Ransomware - Five Reasons You’re Not As Protected As You ThinkWebinar: Ransomware - Five Reasons You’re Not As Protected As You Think
Webinar: Ransomware - Five Reasons You’re Not As Protected As You ThinkStorage Switzerland
 
Zoolz Business Cloud Backup with Cold Storage Technology
Zoolz Business Cloud Backup with Cold Storage TechnologyZoolz Business Cloud Backup with Cold Storage Technology
Zoolz Business Cloud Backup with Cold Storage TechnologyZoolz
 
How to Password Protect a Folder in Windows10
How to Password Protect a Folder in Windows10How to Password Protect a Folder in Windows10
How to Password Protect a Folder in Windows10moli he
 
How to Password Protect USB Drive in Windows 10 & 11
How to Password Protect USB Drive in Windows 10 & 11How to Password Protect USB Drive in Windows 10 & 11
How to Password Protect USB Drive in Windows 10 & 11Muhammad Arsalan
 
18IF004_CNS.docx
18IF004_CNS.docx18IF004_CNS.docx
18IF004_CNS.docxRajAmbere1
 
The best defense is a good offense (April 2013 Presentation to Atlantic HTCIA...
The best defense is a good offense (April 2013 Presentation to Atlantic HTCIA...The best defense is a good offense (April 2013 Presentation to Atlantic HTCIA...
The best defense is a good offense (April 2013 Presentation to Atlantic HTCIA...Andrew Kozma
 
Start using elephant drive
Start using elephant driveStart using elephant drive
Start using elephant drivemin jay
 
Folder Lock without using software-for Windows(Desktop), Pendrive, Harddisk.
Folder Lock without using software-for Windows(Desktop), Pendrive, Harddisk.Folder Lock without using software-for Windows(Desktop), Pendrive, Harddisk.
Folder Lock without using software-for Windows(Desktop), Pendrive, Harddisk.Siyaram Kasat
 
Secure Yourself, Practice what we preach - BSides Austin 2015
Secure Yourself, Practice what we preach - BSides Austin 2015Secure Yourself, Practice what we preach - BSides Austin 2015
Secure Yourself, Practice what we preach - BSides Austin 2015Michael Gough
 
Cloudtrust 091204053223 Phpapp01
Cloudtrust 091204053223 Phpapp01Cloudtrust 091204053223 Phpapp01
Cloudtrust 091204053223 Phpapp01mcguireb
 
FIWARE Tech Summit - FIWARE Lab Cloud
FIWARE Tech Summit - FIWARE Lab CloudFIWARE Tech Summit - FIWARE Lab Cloud
FIWARE Tech Summit - FIWARE Lab CloudFIWARE
 

Similar a Secure your digital life - Part 1 (20)

Truecrypt
TruecryptTruecrypt
Truecrypt
 
Steganography
SteganographySteganography
Steganography
 
How to Encrypt Your Laptop with TrueCrypt
How to Encrypt Your Laptop with TrueCryptHow to Encrypt Your Laptop with TrueCrypt
How to Encrypt Your Laptop with TrueCrypt
 
Webinar: Ransomware - Five Reasons You’re Not As Protected As You Think
Webinar: Ransomware - Five Reasons You’re Not As Protected As You ThinkWebinar: Ransomware - Five Reasons You’re Not As Protected As You Think
Webinar: Ransomware - Five Reasons You’re Not As Protected As You Think
 
Zoolz Business Cloud Backup with Cold Storage Technology
Zoolz Business Cloud Backup with Cold Storage TechnologyZoolz Business Cloud Backup with Cold Storage Technology
Zoolz Business Cloud Backup with Cold Storage Technology
 
How to Password Protect a Folder in Windows10
How to Password Protect a Folder in Windows10How to Password Protect a Folder in Windows10
How to Password Protect a Folder in Windows10
 
How to Password Protect USB Drive in Windows 10 & 11
How to Password Protect USB Drive in Windows 10 & 11How to Password Protect USB Drive in Windows 10 & 11
How to Password Protect USB Drive in Windows 10 & 11
 
Login from home
Login from homeLogin from home
Login from home
 
L5 keoj
L5 keojL5 keoj
L5 keoj
 
Comodo presentation
Comodo presentationComodo presentation
Comodo presentation
 
Aircrack windows web
Aircrack windows webAircrack windows web
Aircrack windows web
 
18IF004_CNS.docx
18IF004_CNS.docx18IF004_CNS.docx
18IF004_CNS.docx
 
The best defense is a good offense (April 2013 Presentation to Atlantic HTCIA...
The best defense is a good offense (April 2013 Presentation to Atlantic HTCIA...The best defense is a good offense (April 2013 Presentation to Atlantic HTCIA...
The best defense is a good offense (April 2013 Presentation to Atlantic HTCIA...
 
Start using elephant drive
Start using elephant driveStart using elephant drive
Start using elephant drive
 
Folder Lock without using software-for Windows(Desktop), Pendrive, Harddisk.
Folder Lock without using software-for Windows(Desktop), Pendrive, Harddisk.Folder Lock without using software-for Windows(Desktop), Pendrive, Harddisk.
Folder Lock without using software-for Windows(Desktop), Pendrive, Harddisk.
 
Secure Yourself, Practice what we preach - BSides Austin 2015
Secure Yourself, Practice what we preach - BSides Austin 2015Secure Yourself, Practice what we preach - BSides Austin 2015
Secure Yourself, Practice what we preach - BSides Austin 2015
 
Cloud trust
Cloud trustCloud trust
Cloud trust
 
In Cloud We Trust
In Cloud We TrustIn Cloud We Trust
In Cloud We Trust
 
Cloudtrust 091204053223 Phpapp01
Cloudtrust 091204053223 Phpapp01Cloudtrust 091204053223 Phpapp01
Cloudtrust 091204053223 Phpapp01
 
FIWARE Tech Summit - FIWARE Lab Cloud
FIWARE Tech Summit - FIWARE Lab CloudFIWARE Tech Summit - FIWARE Lab Cloud
FIWARE Tech Summit - FIWARE Lab Cloud
 

Último

labradorite energetic gems for well beings.pdf
labradorite energetic gems for well beings.pdflabradorite energetic gems for well beings.pdf
labradorite energetic gems for well beings.pdfAkrati jewels inc
 
'the Spring 2024- popular Fashion trends
'the Spring 2024- popular Fashion trends'the Spring 2024- popular Fashion trends
'the Spring 2024- popular Fashion trendsTangledThoughtsCO
 
《QUT毕业文凭网-认证昆士兰科技大学毕业证成绩单》
《QUT毕业文凭网-认证昆士兰科技大学毕业证成绩单》《QUT毕业文凭网-认证昆士兰科技大学毕业证成绩单》
《QUT毕业文凭网-认证昆士兰科技大学毕业证成绩单》rnrncn29
 
8 Easy Ways to Keep Your Heart Healthy this Summer | Amit Kakkar Healthyway
8 Easy Ways to Keep Your Heart Healthy this Summer | Amit Kakkar Healthyway8 Easy Ways to Keep Your Heart Healthy this Summer | Amit Kakkar Healthyway
8 Easy Ways to Keep Your Heart Healthy this Summer | Amit Kakkar HealthywayAmit Kakkar Healthyway
 
Call In girls Delhi Safdarjung Enclave/WhatsApp 🔝 97111⇛⇛47426
Call In girls Delhi Safdarjung Enclave/WhatsApp 🔝  97111⇛⇛47426Call In girls Delhi Safdarjung Enclave/WhatsApp 🔝  97111⇛⇛47426
Call In girls Delhi Safdarjung Enclave/WhatsApp 🔝 97111⇛⇛47426jennyeacort
 
BOOK NIGHT-Call Girls In Noida City Centre Delhi ☎️ 8377877756
BOOK NIGHT-Call Girls In Noida City Centre Delhi ☎️ 8377877756BOOK NIGHT-Call Girls In Noida City Centre Delhi ☎️ 8377877756
BOOK NIGHT-Call Girls In Noida City Centre Delhi ☎️ 8377877756dollysharma2066
 
Uttoxeter & Cheadle Voice, Issue 122.pdf
Uttoxeter & Cheadle Voice, Issue 122.pdfUttoxeter & Cheadle Voice, Issue 122.pdf
Uttoxeter & Cheadle Voice, Issue 122.pdfNoel Sergeant
 
83778-876O7, Cash On Delivery Call Girls In South- EX-(Delhi) Escorts Service...
83778-876O7, Cash On Delivery Call Girls In South- EX-(Delhi) Escorts Service...83778-876O7, Cash On Delivery Call Girls In South- EX-(Delhi) Escorts Service...
83778-876O7, Cash On Delivery Call Girls In South- EX-(Delhi) Escorts Service...dollysharma2066
 
8377877756 Full Enjoy @24/7 Call Girls In Mayur Vihar Delhi Ncr
8377877756 Full Enjoy @24/7 Call Girls In Mayur Vihar Delhi Ncr8377877756 Full Enjoy @24/7 Call Girls In Mayur Vihar Delhi Ncr
8377877756 Full Enjoy @24/7 Call Girls In Mayur Vihar Delhi Ncrdollysharma2066
 
Virat Kohli Centuries In Career Age Awards and Facts.pdf
Virat Kohli Centuries In Career Age Awards and Facts.pdfVirat Kohli Centuries In Career Age Awards and Facts.pdf
Virat Kohli Centuries In Career Age Awards and Facts.pdfkigaya33
 

Último (11)

labradorite energetic gems for well beings.pdf
labradorite energetic gems for well beings.pdflabradorite energetic gems for well beings.pdf
labradorite energetic gems for well beings.pdf
 
'the Spring 2024- popular Fashion trends
'the Spring 2024- popular Fashion trends'the Spring 2024- popular Fashion trends
'the Spring 2024- popular Fashion trends
 
《QUT毕业文凭网-认证昆士兰科技大学毕业证成绩单》
《QUT毕业文凭网-认证昆士兰科技大学毕业证成绩单》《QUT毕业文凭网-认证昆士兰科技大学毕业证成绩单》
《QUT毕业文凭网-认证昆士兰科技大学毕业证成绩单》
 
8 Easy Ways to Keep Your Heart Healthy this Summer | Amit Kakkar Healthyway
8 Easy Ways to Keep Your Heart Healthy this Summer | Amit Kakkar Healthyway8 Easy Ways to Keep Your Heart Healthy this Summer | Amit Kakkar Healthyway
8 Easy Ways to Keep Your Heart Healthy this Summer | Amit Kakkar Healthyway
 
Call In girls Delhi Safdarjung Enclave/WhatsApp 🔝 97111⇛⇛47426
Call In girls Delhi Safdarjung Enclave/WhatsApp 🔝  97111⇛⇛47426Call In girls Delhi Safdarjung Enclave/WhatsApp 🔝  97111⇛⇛47426
Call In girls Delhi Safdarjung Enclave/WhatsApp 🔝 97111⇛⇛47426
 
BOOK NIGHT-Call Girls In Noida City Centre Delhi ☎️ 8377877756
BOOK NIGHT-Call Girls In Noida City Centre Delhi ☎️ 8377877756BOOK NIGHT-Call Girls In Noida City Centre Delhi ☎️ 8377877756
BOOK NIGHT-Call Girls In Noida City Centre Delhi ☎️ 8377877756
 
Call Girls 9953525677 Call Girls In Delhi Call Girls 9953525677 Call Girls In...
Call Girls 9953525677 Call Girls In Delhi Call Girls 9953525677 Call Girls In...Call Girls 9953525677 Call Girls In Delhi Call Girls 9953525677 Call Girls In...
Call Girls 9953525677 Call Girls In Delhi Call Girls 9953525677 Call Girls In...
 
Uttoxeter & Cheadle Voice, Issue 122.pdf
Uttoxeter & Cheadle Voice, Issue 122.pdfUttoxeter & Cheadle Voice, Issue 122.pdf
Uttoxeter & Cheadle Voice, Issue 122.pdf
 
83778-876O7, Cash On Delivery Call Girls In South- EX-(Delhi) Escorts Service...
83778-876O7, Cash On Delivery Call Girls In South- EX-(Delhi) Escorts Service...83778-876O7, Cash On Delivery Call Girls In South- EX-(Delhi) Escorts Service...
83778-876O7, Cash On Delivery Call Girls In South- EX-(Delhi) Escorts Service...
 
8377877756 Full Enjoy @24/7 Call Girls In Mayur Vihar Delhi Ncr
8377877756 Full Enjoy @24/7 Call Girls In Mayur Vihar Delhi Ncr8377877756 Full Enjoy @24/7 Call Girls In Mayur Vihar Delhi Ncr
8377877756 Full Enjoy @24/7 Call Girls In Mayur Vihar Delhi Ncr
 
Virat Kohli Centuries In Career Age Awards and Facts.pdf
Virat Kohli Centuries In Career Age Awards and Facts.pdfVirat Kohli Centuries In Career Age Awards and Facts.pdf
Virat Kohli Centuries In Career Age Awards and Facts.pdf
 

Secure your digital life - Part 1

  • 1. Secure Your Digital Life Part 1 – Create a safe place on your computer
  • 2. Contents Concepts Install TrueCrypt Create a secure container Place dummy files in decoy container Start using the secure container
  • 3. Contents Concepts Install TrueCrypt Create a secure container Place dummy files in decoy container Start using the secure container
  • 4. Concepts Context • Recently there have been court cases where e.g. pornographic material found on the defendants’ laptops has been used to implicate the defendant, which stresses the importance of taking data security seriously Goal • In the case of somebody gaining access to our computer (e.g. in case of theft, somebody snooping around or by a court order) we want to ensure that our personal data remains that way. Personal and secure. • We want a password-protected safe place to put our collection of sensitive data. This data could be anything from top secret documents, our emails (especially relevant for people who use off-line e-mail clients), or simply our beloved collection of movies with cute kittens. • Also, we want a decoy, so that if we are somehow forced to reveal our password, we can give a fake password that will activate the decoy instead of revealing our real data Method • We will use a program called TrueCrypt to create a special file on our computer. This special file will contain all of our sensitive data in an encrypted format, and we will be able to access our data, as if it was placed on a hard drive of its own. Also the special file will contain the decoy files, that will be shown if the decoy password is entered instead of the real password
  • 5. Contents Concepts Install TrueCrypt Create a secure container Place dummy files in decoy container Start using the secure container
  • 6. Install TrueCrypt • Download and install the program: TrueCrypt - www.truecrypt.org • For the rest of this guide, we will assume that TrueCrypt has been installed. • To create a safe place to store your data, Open TrueCrypt and click on “Create Volume”
  • 7. Contents Concepts Install TrueCrypt Create a secure container Place dummy files in decoy container Start using the secure container
  • 8. Create a secure container • Select “Create an encrypted file container” and click Next • Select “Hidden TrueCrypt volume” and click Next
  • 9. Create a secure container • Select “Normal mode” and click Next • [1] Choose a folder to store the file to use for our container (e.g. select “Local Disk (C:)”) and [2] write a name for the file (e.g. “x”) and click Save
  • 10. Create a secure container • Confirm the location of the file and click Next • Click Next again… • …and again (to confirm “Outer Volume options”)
  • 11. Create a secure container • Now we have to select a size for our container. This of course depends on how much data you want to store in the container (e.g. movies take up a lot of space) and how much space you have available on your hard drive. For this example we will use 10 GB, which is enough to store e.g. a lot of documents and a decent collection of video material. • Then we need to create a password for the Outer Volume – this password is NOT your real password, but simply a password that seems plausible and that you can afford to give up, in case anybody is trying to extort you.
  • 12. Create a secure container • Select “No” to keep large files and click Next • Keep the standard options and click Format to begin preparing the hard drive for your data.
  • 13. Create a secure container • Now the Outer Volume has been created. Click Next to continue creating the real secret container. • …and click Next again
  • 14. Create a secure container • Click Next to continue with the standard options… • Now we have to define the size of our hidden container. This depends on the size we chose for our Outer Volume earlier and how much space we want in the outer container. In this case we will select 9500 MB as the size we want.
  • 15. Create a secure container • Accept the warning telling us we are using almost all of the space in the outer container. • Now create a password for the hidden volume. This password should be long, difficult to guess and only known to you.
  • 16. Create a secure container • If you want to store files larger than 4 GB select “Yes”. However, if you don’t need to store large files or are using an external drive that you will also use with Mac or Linux, select “No” • Click Next to continue with the standard options…
  • 17. Create a secure container • Congratulations! Now we have created both a decoy container and our real container to use for sensitive data.
  • 18. Contents Concepts Install TrueCrypt Create a secure container Place dummy files in decoy container Start using the secure container
  • 19. Place dummy files in decoy container • To be able to use our secure containers, we need to first “mount” them as a drive. Whether it will be our “real” secure container or the dummy container, that will be mounted depends only on the password that we enter. • So, to mount the container, first [1] select the drive letter you want (e.g. “X:”) then [2] select our file (e.g. “c:x”) and [3] click “Mount”
  • 20. Place dummy files in decoy container • Because we want to access our decoy container (and put some plausible dummy content there) we enter our dummy password. IMPORTANT: Then [2] click “Mount options” • In Mount options, put a checkmark [1] in “Protect hidden volume…” and [2] type in the real password. Then [3] press OK, and OK again to mount the drive. Finally click OK again to the information pop-up.
  • 21. Place dummy files in decoy container • Now the decoy container has been mounted as drive “X:” (notice the “Outer” keyword signifying that is our decoy) • Then we can open the drive by opening “Computer” and go to Local Disk (X:).
  • 22. Place dummy files in decoy container • Of course the folder is now empty, so we would like to create some folders and also put some innocent files and documents on the drive (just to make it seem plausible) • For instance we can create some folders such as “Downloads”, “Documents”, “Pictur es”, and “Videos” (make sure to create these folders, as we will use them in a later guide on how to secure Windows)
  • 23. Place dummy files in decoy container • When we are finished putting dummy content in the decoy container, we will dismount it, so that we are ready to mount our real secret container. • To Dismount simply select the drive in TrueCrypt and click Dismount
  • 24. Contents Concepts Install TrueCrypt Create a secure container Place dummy files in decoy container Start using the secure container
  • 25. Start using the secure container • Again: To be able to use our secure containers, we need to first “mount” them as a drive. Whether it will be our “real” secure container or the dummy container, that will be mounted depends only on the password that we enter. • So, to mount the container, first [1] select the drive letter you want (e.g. “X:”) then [2] select our file (e.g. “c:x”) and [3] click “Mount”
  • 26. Start using the secure container • Now enter the password you created for the real secret container and click OK. • That’s it! Now you can store your sensitive files on drive X: (notice the “Hidden” label)
  • 27. Start using the secure container • To make it easier to use your new secure location for data, you can add it as a “favourite” in TrueCrypt, but first selecting the drive “X:” and then go to the menu “Favorites” and select “Add Mounted Volume to Favorites…” • Then you can give it a label [1] (e.g. “personal”) and put a checkmark in [2] “Mount selected volume upon logon”, to make the secure drive X: available every time the computer starts. (it will then prompt you for a password every time you restart your computer. Notice that you can input either your real password to access your secure data, or the dummy password if you are in a pickle and just want to show some plausible data)