path: root/wiki/src/doc/encryption_and_privacy/encrypted_volumes.mdwn
diff options
Diffstat (limited to 'wiki/src/doc/encryption_and_privacy/encrypted_volumes.mdwn')
1 files changed, 25 insertions, 16 deletions
diff --git a/wiki/src/doc/encryption_and_privacy/encrypted_volumes.mdwn b/wiki/src/doc/encryption_and_privacy/encrypted_volumes.mdwn
index 48f9494..c3ec20f 100644
--- a/wiki/src/doc/encryption_and_privacy/encrypted_volumes.mdwn
+++ b/wiki/src/doc/encryption_and_privacy/encrypted_volumes.mdwn
@@ -1,23 +1,37 @@
-[[!meta title="Create and use encrypted volumes"]]
+[[!meta title="Create and use LUKS encrypted volumes"]]
-The simplest way to carry around the documents you want to use with Tails and
-make sure that they haven't been accessed or modified is to store them in an
-encrypted volume: a dedicated partition on a USB stick or external hard-disk.
+[[!toc levels=2]]
+Introduction to <span class="application">LUKS</span>
+<div class="tip">
+<p>The simplest way to carry around the documents that you want to use
+with Tails encrypted is to use the [[encrypted persistent
-Tails comes with utilities for LUKS, a standard for disk-encryption under Linux.
+You can create other encrypted volumes using
+<span class="application">LUKS</span> to encrypt, for example, another
+USB stick or an external hard disk.
+<span class="application">LUKS</span> is the standard for disk
+encryption in Linux.
- <span class="application">GNOME Disks</span> allows you to
create encrypted volumes.
- The GNOME desktop allows you to open encrypted volumes.
-<div class="tip">
-<p>To store encrypted files on a Tails USB stick, it is recommended to create a
-[[persistent volume|first_steps/persistence]] instead.</p>
+Comparison between <span class="application">LUKS</span> and <span class="application">VeraCrypt</span>
+You can also open <span class="application">VeraCrypt</span> encrypted
+volumes in Tails. <span class="application">VeraCrypt</span> is a disk
+encryption tool for Windows, macOS, and Linux. [[See our documentation
+about <span class="application">VeraCrypt</span>.|veracrypt]]
-[[!toc levels=2]]
+[[!inline pages="doc/encryption_and_privacy/luks_vs_veracrypt.inline" raw="yes" sort="age"]]
Create an encrypted partition
@@ -139,11 +153,6 @@ automatically but you can do so from the file browser.
1. Enter the passphrase of the partition in the password prompt and
click <span class="button">Unlock</span>.
- If you choose the option <span class="guilabel">Remember Password</span> and have
- the <span class="guilabel">[[GNOME Keyring|first_steps/persistence/configure#gnome_keyring]]</span>
- persistence feature activated, the password is stored in the persistent storage and remembered across multiple
- working sessions.
1. After opening the partition with the file browser, you can also access it
from the <span class="guimenu">Places</span> menu.