Fixed typos and broken link

This commit is contained in:
Zesc 2024-08-24 16:01:33 +02:00
parent 6eb68f0270
commit dcf265743e
38 changed files with 88 additions and 88 deletions

View file

@ -120,12 +120,12 @@ The door is closed, the conversation remains between Alice and Bob, their conver
<div class="row">
<div class="col-lg-8 col-lg-offset-2">
<h2><b>Why is Plausible Deniability is Vital?</b></h2> </br> </br>
<p>From a legal standpoint, the only way to be protected against that scenario where you're forced to decrypt your harddrive <b>is to be able to deny the existance of said encrypted volume (Plausible Deniability)</b> . If the encrypted volume does not exist, there is no password to be given for it.</p>
<p>From a legal standpoint, the only way to be protected against that scenario where you're forced to decrypt your harddrive <b>is to be able to deny the existence of said encrypted volume (Plausible Deniability)</b> . If the encrypted volume does not exist, there is no password to be given for it.</p>
<p>So here we need a technology that can provide us Plausible Deniability. <b>That is what Veracrypt can do for us</b>.</p>
<img src="5.png" class="imgRz">
<p>In short, Veracrypt allows you to encrypt volumes, just like LUKS encryption does. <b>However it gives you the choice to hide another encrypted volume inside the same volume</b>, that is exactly what you can deny the existance of.</p>
<p>In short, Veracrypt allows you to encrypt volumes, just like LUKS encryption does. <b>However it gives you the choice to hide another encrypted volume inside the same volume</b>, that is exactly what you can deny the existence of.</p>
<p>So you can hide some random meaningless data inside the decoy volume, while the real data that needs protection sits inside the hidden volume.</p>
<p>This means, when Jack forces Bob to open the vercrypt volume, Bob types Password A to open the decoy volume, Then, when asked by Jack, <b>Bob declares that there is no Hidden volume, and Jack has no way to prove the existance the Hidden Volume</b>.</p>
<p>This means, when Jack forces Bob to open the vercrypt volume, Bob types Password A to open the decoy volume, Then, when asked by Jack, <b>Bob declares that there is no Hidden volume, and Jack has no way to prove the existence the Hidden Volume</b>.</p>
<p>To see how to implement Plausible Deniability protection with Veracrypt, check out this <a href="../veracrypt/index.html">tutorial</a>.</p>
</div>