How to install a hidden Windows 7 Operating System with VeraCrypt

  • Post category:VeraCrypt

We have just posted our Windows 7 hidden operating system guide on YouTube here: https://www.youtube.com/watch?v=BFfl-YGsOGA In this guide, we show you how to create a VeraCrypt Windows 7 hidden operating system. This enables you to hide your operating system within an encrypted partition, creating data assurance for your OS and…

Continue Reading How to install a hidden Windows 7 Operating System with VeraCrypt

The VeraCrypt Audit Results

VeraCrypt 1.18 and its bootloaders were evaluated. This release included a number of new features including non-western developed encryption options, a boot loader that supports UEFI (modern BIOSes), and more. QuarksLab found: 8 Critical Vulnerabilities 3 Medium Vulnerabilities 15 Low or Informational Vulnerabilities / Concerns This public disclosure of these vulnerabilities coincides with the release of VeraCrypt 1.19…

Continue Reading The VeraCrypt Audit Results

OSTIF + QuarksLab Audit of VeraCrypt Completed – Phase II Begins

OSTIF + QuarksLab Audit of VeraCrypt Completed - Phase II Begins The audit of VeraCrypt has been completed, and the final report is being created over the coming days. The VeraCrypt developers have the preliminary results and we are working with both VeraCrypt and QuarksLab on the timetable for releasing…

Continue Reading OSTIF + QuarksLab Audit of VeraCrypt Completed – Phase II Begins

We Have Come to an Agreement to Get VeraCrypt Audited

OSTIF is proud to announce that we have come to an agreement to fully fund an audit of VeraCrypt. Using funds that were donated by DuckDuckGo and VikingVPN, we plan to hire QuarksLab to go over the code and search for vulnerabilities and backdoors. VeraCrypt is a crucial piece of…

Continue Reading We Have Come to an Agreement to Get VeraCrypt Audited

TrueCrypt Critical Flaw Highlights the Need for OSTIF Support for VeraCrypt

TrueCrypt - The venerable full disk and container encryption software that was abandoned by its developers in 2014, was believed to be secure, despite the development of the software ending. This was the consensus among the security community because the software had been audited by iSec (a subsidiary of NCC).…

Continue Reading TrueCrypt Critical Flaw Highlights the Need for OSTIF Support for VeraCrypt