How to find and delete Veracrypt containers?

Encrypted some stuff a few months ago for a gag, but now I'm taking a flight soon and need this shit off my machine.

I can't find anything online about this. How would I find my containers (I forgot which file/partition they're in) and delete them?

I've also forgotten my passwords and keyfiles.

If worst comes to worst, a full SSD wipe should clear everything, yes?

Other urls found in this thread:

ask8ball.net/
veracrypt.codeplex.com/wikipage?title=VeraCrypt Volume Format Specification
veracrypt.fr/en/VeraCrypt Volume Format Specification.html
veracrypt.fr/en/Random Number Generator.html
blog.cr.yp.to/20140205-entropy.html
twitter.com/NSFWRedditVideo

yes. no. maybe.

ask8ball.net/

>My sources say no
Atlast, I see.

what does flying have to do with getting rid of veracrypt containers?

U.S and Chinese customs. I'm not looking to waste any time getting waterboarded.

It's too late. NSA already knows you have installed veracrypt even if you delete it. Your anus will be inspected at the border.

veracrypt.codeplex.com/wikipage?title=VeraCrypt Volume Format Specification

don't worry about it, it looks like random data

If you can't find it, the customs won't find it either

veracrypt.fr/en/VeraCrypt Volume Format Specification.html

Thanks.
I don't mind getting my colon cleaned. I only mind starring in snuff porn for weeks on end.

Just make sure op doesnt have an empty, unformatted partition

>don't worry about it, it looks like random data
>ASCII string "VERA"

>If worst comes to worst, a full SSD wipe should clear everything, yes?
No.

Purge the SSD, it's the most reliable method.

>encrypted
im an retard

>it's encrypted

>Encrypted
Hurr durr

And you too.
That includes a spare unpartioned drive?
It just has gag files.
maybe

Yeah, they might suspect its a encrypted drive, format it, put some movies in it and call it a day

Aight

veracrypt.fr/en/Random Number Generator.html
>both /dev/random and/dev/urandom
wtf?

their whole csprng design is utter trash. just provide the user with a textarea and tell him to roll his face on the keyboard for 10 seconds. hash it and you a high quality seed with which you can seed your csprng.

It's just one part of the hash.
Mouse movements and keyboard inputs are included/mandatory.

The sad thing is that this is all far inferior to just pulling 320 bytes out of /dev/urandom.

blog.cr.yp.to/20140205-entropy.html
it is fucking retarded. user input is random enough. there is no need to mix it together with other shit.

>/dev/urandom/
>superior to user input
ok kiddo

>/dev/urandom/
>superior to user input
Far superior.

why?

This is why I'd never go to US or china

Its not like you could, fucking neet

lel working for two companies and got more then enough $$$
otherwise I couldn't smoke weed everyday

can you repeat the question?

Because /dev/urandom actually takes user input into account, incorporating the entropy that it actually has rather than the raw text (which has far, far less entropy than the ascii encoding), because the entropy of user input is far lower than you would naively expect, because /dev/urandom incorporates all sorts of other entropy sources as well besides user input, and because it contains a real entropy-seeded csprng rather than some ad-hoc mixing crap.

>rather than some ad-hoc mixing crap
do you not know how /dev/random works?
also read this: blog.cr.yp.to/20140205-entropy.html
mashing on the keyboard for 10 seconds generate more than enough entropy.

>Be me
>Pull up at UK C&E
>'We need to look at your laptop sir'
>'I see there is an encrypted partition sir. Please provide the password'
>'Err...I forgot it'
>'Come with us sir'
Several months in jail later...

>'Oh hi there. Have you remembered the password yet?'
>'Err..no'
Several years later...

>'Sir. The password'
>'p-please can I see my d-daughter?'

>"password"
>dead

>Americans