Get a Pentest and security assessment of your IT network.

Cyber Security

Backup TrueCrypt Hidden Volumes

TL;DR

TrueCrypt hidden volumes need special attention when backing up. Standard backups of the outer volume won’t include the hidden one. This guide explains how to safely back them up using a combination of mounting, copying, and dismounting.

Backing Up TrueCrypt Hidden Volumes

  1. Understand the Risk: Backing up only the outer volume leaves your hidden data vulnerable if the outer volume is compromised. You must back up both volumes separately.
  2. Mount the Outer Volume: Open TrueCrypt and mount your standard, outer encrypted volume as you normally would. Enter your password to access it.
  3. Mount the Hidden Volume: This is the crucial step. Within TrueCrypt:
    • Select the outer volume from the list of mounted volumes.
    • Click ‘Hidden Container’ (or similar, depending on your TrueCrypt version).
    • Enter the hidden volume password when prompted. Do not confuse this with the outer volume password!
  4. Verify Both Volumes are Mounted: You should now see both the outer and hidden volumes listed as mounted drives in TrueCrypt, and accessible through your operating system (e.g., File Explorer on Windows, Finder on macOS).
  5. Copy the Contents of Each Volume Separately:
    • Outer Volume: Copy all files and folders from the mounted outer volume to a safe backup location.
    • Hidden Volume: Similarly, copy all files and folders from the mounted hidden volume to a different safe backup location. It’s important these are stored separately.
  6. Dismount Volumes in the Correct Order: This is very important to prevent data corruption.
    • First, dismount the hidden volume. Right-click on it within TrueCrypt and select ‘Dismount’.
    • Then, dismount the outer volume. Right-click and select ‘Dismount’.
  7. Verify Backup Integrity (Optional but Recommended):
    • After backing up, create new empty volumes with the same sizes as your original outer and hidden volumes.
    • Mount these newly created volumes.
    • Copy the backed-up data back into them.
    • Dismount and remount to ensure everything works correctly. This confirms your backup process is sound.
  8. Secure Backup Storage: Store your backups in a secure location, preferably encrypted (e.g., using VeraCrypt or another full-disk encryption solution). Consider offsite storage for disaster recovery.

Important Notes:

  • Always dismount volumes properly before shutting down your computer.
  • Keep your TrueCrypt passwords secure and do not store them in plain text.
  • Consider using VeraCrypt instead of TrueCrypt, as it is actively maintained and addresses security vulnerabilities found in TrueCrypt. The process for backing up VeraCrypt hidden volumes is identical.
Related posts
Cyber Security

Zip Codes & PII: Are They Personal Data?

Cyber Security

Zero-Day Vulnerabilities: User Defence Guide

Cyber Security

Zero Knowledge Voting with Trusted Server

Cyber Security

ZeroNet: 51% Attack Risks & Mitigation