Multiple Feature Requests

Topics: Feature Requests
Apr 20, 2015 at 7:54 PM
Edited Apr 20, 2015 at 7:55 PM
I have 3 suggestions for features to add to VeraCrypt.
  1. Limited Access Password
    • Have a password that gives you Limited access to a single folder instead of the entire thing. This folder can be viewed with the main password but not removed. The Limited access password will allow you to store a few files you want to give certain people access too.
      Say you have your passwords in there and you want your family to be able to access those in case of emergency but they shouldn't have access to the private company stuff you have in there as well. Instead of creating multiple storage spaces you could use the same space for it and allow them access to those passwords with another password you could write down and put in your safe.
  2. Destruction keys
    In case something happens and you are forced to give out keys while the contents should remain hidden from the company you should be able to set one or multiple keys yourself.
    If you enter one of these passwords, The entire volume is destroyed permanently. If possible, ensure that this can't be recovered by hard disc recovery software. We want our private information safe
  3. Anti Brute Force option
    Allowing the option to destroy volume in case of too many wrong password attempts would greatly help secure everything. If you can set it to 1 or 100 attempts that would be a huge help allowing you to set how 'secure' you want it to be.
Apr 20, 2015 at 9:17 PM
Edited Apr 21, 2015 at 5:19 PM
Hello Niels1189,

Here are some limitations to your proposals that will defeat attempting to use them.

Regarding number 2. There is already a feature request for panic button that you can view and vote-up if you desire this option.

https://veracrypt.codeplex.com/workitem/26

An adversary is not going to let you touch the original disks if they are requesting you provide your passwords. In fact, entering a password that destroys the headers will result in criminal persecution for the destruction of evidence depending on your country's laws.

Regarding number 3.

The software and hardware used to brute force a volume will not be using the VeraCrypt code. Even if the person is using VeraCrypt, they can download the source code to modify it to remove the anti-brute force option and recompile the software.

Kind Regards.