What is VeraCrypt
You can protect your sensitive data (e.g., your coin map) by encrypting it with VeraCrypt. Once you encrypt your sensitive data, nobody will be able to read it without knowing your password for decryption.
VeraCrypt is a free open-source disk encryption software available for all major operating systems (Windows, Mac OSX and Linux) and uses the best and most secure encryption algorithms currently known (AES and Twofish).
Learn How to Use VeraCrypt (for Free)
1. Download VeraCrypt for Free
Download VeraCrypt from the official website.
You can use the standard installer, or you can download a portable version that does not require any installation and can be run from a USB stick.
2. Create Encrypted Container
To create a new encrypted container, start by clicking “Volumes – Create New Volume…” in the main menu.
Select “Create an encrypted file container” and click “Next >”.
Select “Standard VeraCrypt volume” and click “Next >”.
Select path and “File Name” where the encrypted file container will be stored and click “Save”.
Check the path and file name, and click “Next >” to continue.
Because AES encryption algorithm is considered to be the best and most secure option currently available, you can leave it and click “Next >” to continue.
Enter required “Volume Size” (e.g. 1 MB) and click “Next >”.
Now you need to enter a strong password for your encrypted file container.
By checking the “Display password” checkbox, you can read your entered password and make sure it is correct. Then continue by clicking “Next >”.
The password we will use in this demo is MY-PASSWORD-123.
Next you need to move your mouse to increase the encryption until the full green box appears as below. Then click “Format”.
Once formatted, you can click “OK” and close VeraCrypt.
3. Open Encrypted Container
You can open the VeraCrypt container by righting click on a free drive letter (e.g., G:) and clicking “Select File and Mount…”.
Select the container you’ve just created.
Enter the password MY-PASSWORD-123 which we used when creating the encrypted container.
After a while, your container will be mounted.
You can see that the new disk G: appears as depicted below.
You can use G: drive like a real disk.
Any file you copy on it will be automatically encrypted.