How is one supposed to choose between encryption algorithms/settings in VeraCrypt? [duplicate]

Every single time I install an new storage device, I’m faced with the same impossible task: how to determine what is the most secure encryption algorithm/settings?
Over the years, I have basically just picked a random one out of the choice… Continue reading How is one supposed to choose between encryption algorithms/settings in VeraCrypt? [duplicate]

How can BitLocker be considered safer, if it doesn’t asks for a key during boot?

I’ve been using VeraCrypt / TrueCrypt for years. Now, with a new computer (having Windows 10 Pro) I can consider BitLocker. But, either I am complete ignorant and don’t see something awfully obvious or I can’t understand how … Continue reading How can BitLocker be considered safer, if it doesn’t asks for a key during boot?

Is it sufficient to just change the password of a container after a leak?

Let’s assume, an attacker gains access to an encrypted container with a weak password. They start a brute-force attack and I assume they will succeed. To protect any content which has been added to the container after the leak, I decide to… Continue reading Is it sufficient to just change the password of a container after a leak?