veracrypt – How do I force my system to see my hard drive as a 4096-byte?

I want to create a VeraCrypt volume on my external 4TB hard drive with 50GB of external volume and keep the rest hidden. However, during the setup process, the following error message appears: Error Image

I do not want to divide it into two partitions, so I checked it sudo fdisk -l / dev / sdc to find out how big the sector is:

Plate / dev / sdc: 3.7 TiB, 4000787029504 bytes, 7814037167 sectors
Units: sectors of 1 * 512 = 512 bytes
Sector size (logical / physical): 512 bytes / 4096 bytes
I / O Size (Minimum / Optimal): 4096 bytes / 33553920 bytes
Disklabel type: gpt
Plate Identification: 57DF69GQ-C896-R557-EE98-54GF68GF7898

End type of the device start types
/ dev / sdc1 2048 7814035455 7814033408 3.7T Linux file system

How do I force my system to see the hard drive as 4096?

truecrypt – Veracrypt system encryption on SSD. Do I have to crop the hard drive right after quitting? As?

I want to encrypt my operating system, which resides on SSD (Windows 7, X64, Mbr partition style).
From what I know, veracrypt will encrypt the entire hard drive, not just the actual data.
not only! The empty space (inside the decrypted disk) is "filled" with random data to allow hidden OS / containers.
This means that the SSD thinks that the SSD is full and wear is limited, which reduces the life and speed of the SSD.
Can a solution be written to the encrypted disk, a very large file that fills in the hard disk and then erases it for trimming and most hard disks to be marked as empty again? Will there be a trim operation, or probably many, many trim operations (one per sector) that could fill the trim buffer and fail?
Will defragmenting windoes 7 also realign the hard drive by sending the trim operations at slow speed for the hard drive to handle?
or I do not have to do anything and veracrypt will find that it is a ssd and only encrypted data and not the entire disk?
Can someone show me a solution in the veracrypt manual?

Command line – Mount the veracrypt partition at boot

I want to automatically mount a veracrypt partition at startup. But the problem is that I can not mount it from the command line because I entered this command:

# veracrypt -t --non-interactive -p any-password / dev / sdaX / media / veracrypt1 /

I get the following output:

The operation failed because of one or more of the following actions:
- Wrong password.
- Wrong volume PIM number.
- Wrong PRF (hash).
- No valid issue.

Enter the password for / dev / sdaX: 

and I have to enter the password again, but this time the partition hangs.

So I have to mount it from the command line, so I can set a script to be automatically mounted at startup.

Encryption – Can the government recover data from an encrypted ssd (veracrypt) that has been deleted?

Some of your previous answers have not been well received and you run the risk of being blocked from answering.

Please note the following notes exactly:

  • Please be sure answer the question, Enter details and share your research!

But avoid

  • Ask for help, clarification or answering other answers.
  • Make statements based on opinions; secure them with references or personal experiences.

For more information, see our tips for writing great answers.

Encryption – When is Veracrypt an acceptable solution?

To effectively manage security risks, a nonprofit organization must meet the following high standards.

  • Limit access to authorized personnel.
  • Sensitive data is only accessible to authorized employees.
  • Data integrity must be maintained.
  • Access to data must be verifiable.

Because some people work outside, it is important to securely store data both on the device being used and on data media such as DVDs and USB flash drives / drives.

In the past, the devices used TrueCrypt's full disk encryption. While the devices are withdrawn and renewed (donations), it is possible to inform the choice and the solution to protect the devices.

The employees are switched to Microsoft Windows 10 and OpenSUSE. The deployment of Windows 10 devices is limited for budgetary reasons. Not all devices support TPM. There are about 50 devices, the majority of which are non-Windows. In addition, the editions of Microsoft Windows are either Home or Professional.

In addition to Veracrypt, you can use Microsoft Bitlocker and LUKS. When searching online (for example, full disk options), the use cases for which the options are most appropriate do not appear to be clear.

For example;

  1. Should Veracrypt be limited to encrypting removable media?
  2. When should LUKS be considered?

Linux – How can I back up a Veracrypt file container?

I have a Veracrypt file with a capacity of about 100 GB on an external hard drive. I often change the contents of this container and want to know how to quickly save the updated file to a second external hard drive.

I'm aware that once I'm done with the work, I can copy the file directly to the second drive, but it will take a while for it to be big. Is there a way to update changed parts of the file with rsync, for example? I understand that the file is encrypted, which is not very useful given the comparison methods of copying.

How else can I do that?

Encryption – Brute enforces the Veracrypt header with THC Hydra

Some of your previous answers have not been well received and you run the risk of being blocked from answering.

Please note the following notes exactly:

  • Please be sure answer the question, Enter details and share your research!

But avoid

  • Ask for help, clarification or answering other answers.
  • Make statements based on opinions; secure them with references or personal experiences.

For more information, see our tips for writing great answers.

full disk encryption – Is forensics possible with FDEs like LUKS or Veracrypt?

Is forensics possible for full disk encrypted drives?

I know, because we do not pad our drives with zeros when we delete a file, or the file system leaves a trail, which is usually a forensics, like restoring a deleted file or detecting that the file exists.

Is this also true for full disk encrypted drives?