- VeraCrypt encrypts containers and entire drives with AES, Serpent, or Twofish and works on Windows, macOS, and Linux.
- The key flow: create volume, set password/key file/PIM, choose file system and mount to use.
- Advanced options: hidden volumes, pre-boot system encryption, and rescue disk.
- Alternatives: BitLocker for the entire disk, 7-Zip for individual folders, and LUKS on Ubuntu.
If you carry sensitive information on a USB, Encrypt the USB flash drive with VeraCrypt It's one of those decisions that saves you a lot of trouble. In a matter of minutes, you can turn your memory into a safe: without the key, no one can read anything, even if your device is lost or stolen.
VeraCrypt stands out for being free, open source and cross-platform (Windows, macOS, and Linux). It also supports top-tier algorithms like AES, Serpent, and Twofish, and has earned the trust of professionals and individuals alike for its transparency and constant evolution.
Why use VeraCrypt for your flash drive?
For years, TrueCrypt was the reference for encrypting disks and USBs, but its development was halted in 2014Since then, VeraCrypt has taken over as a fork of the original project, fixing issues, incorporating security improvements, and maintaining the open source spirit.
With VeraCrypt you can create encrypted volumes on files (containers), encrypt partitions, or even the system disk with pre-boot authentication. Anyone who doesn't have your password (and, if you want, your key and PIM file), does not access the data.
Its real-time “on the fly” encryption support means that use is transparent and automatic: You copy/open files on a mounted drive and VeraCrypt takes care of the encryption/decryption without you having to struggle with extra steps.
In addition to security, there is performance: if you use AES and your CPU supports AES-NIYou'll notice very high read/write speeds. This also works on computers without AES-NI, but performance will be lower.

What exactly can you do?
VeraCrypt offers several key features that cover almost any encryption need on USB and disks. These are its main functionalities:
- Create encrypted container: a file that acts as a password-protected virtual disk (and other options).
- Encrypt secondary partition/drive: ideal for fully encrypt a USB flash drive or an external disk.
- Encrypt system partition/drive: Full protection with pre-boot authentication.
- Rescue disk: utilities for recovery in critical scenarios.
Additionally, it allows you to create a hidden volume within another volume, a useful technique in situations of duress: you can reveal a password that opens the “outer” volume without exposing the hidden one.
Before you start: download, language, and portable version
Download VeraCrypt from your official website and install it. After opening it, you can set it to Spanish by going to "Settings" > "Language" > "Spanish." The learning curve is easy, and the interface guides you through the steps quite well.
There is a portable version which allows you to use VeraCrypt without formally installing it on your computer (very useful if you move the USB between computers). However, you will need administrator permission to mount volumes, as drivers are loaded.
Note: if you are going to completely encrypt the pendrive (not just create a container), the process will format the drive. Make a copy or empty it first. If you only create one container on the USB, the rest won't be erased.
Current versions cited in the sources: 1.26.24 for Windows and macOS, with the latest content review in July 2025. Always check if a stable update is available.
Create an encrypted container on your flash drive
The container is the most flexible option: an encrypted file that you mount as a disk and where you save whatever you want. You can move or copy it like any normal file.
- Open VeraCrypt and press «Create a volume» to start the wizard.
- Choose «Create an encrypted container file» and continues with “Next”.
- Choose VeraCrypt Standard Volume (or "Common VeraCrypt Volume"). Under "Location," tap "Select File", navigate to your USB and type in a meaningful file name (don't choose an existing file). Then, "Save".
- In "Encryption Options" you can keep BEA By default, it offers plenty of security and great performance. Click "Next."
- Define the volume size: the size of the container file. "Next".
- Establish a strong password. Optionally add key file (image, MP3, etc.) with “Key Files…” and activate if you want the PIM (a secret number that makes access even more difficult). Remember: the longer and more random, the better.
- Choose File System: FAT for compatibility and files smaller than 4 GB; if you are going to save large files, choose exFAT or NTFS. Press “Format” when everything is ready.
- Move the mouse randomly around the window until the entropy bar turns green. VeraCrypt uses these moves to generate high-quality keys.
- When finished, confirm with "Accept" and close with "Go out"You now have your container ready.
You can generate a key file completely random: VeraCrypt records the mouse movements for ~30 seconds to create unique cryptographic material. Take care of it as much as the password.
Mount and use your encrypted volume
To access the content, you must mount the volume (VeraCrypt calls this mounting or integrating.) It's a quick process:
- In the main window, click "Archive…" and select the USB container.
- Choose one drive letter available on the list.
- press "Mount" (or “Integrate”), enter the password, add the key file and PIM if you use them, and confirm.
- The volume will appear as new CD on your system. You can now copy, read, and edit files normally.
- To close, press "Disassemble" (or "Unmount All"). You can also "Log Out" from the VeraCrypt button itself.
Remember that while your USB drive is mounted with VeraCrypt, the content is managed "on the fly": real-time encryption/decryption without additional steps.
Encrypt the entire USB flash drive
If you prefer the entire pendrive to be encrypted (no containers), VeraCrypt allows you to convert the drive into a fully protected device. Keep in mind that the operating system will see the USB as unformatted until you mount it with VeraCrypt.
- Insert the USB and open «Create Volume».
- Choose «Encrypt secondary partition/drive».
- Choose Common VeraCrypt Volume (or the hidden one if you need that extra layer).
- Mark the partition of the pendrive (for example, E:) and accept.
- The wizard offers two options:
- Create encrypted volume and format it: erases the drive and is faster.
- Encrypt partition while preserving data: keeps the information, but takes much longer.
- Configure encryption (AES is a great choice) and hashing (default SHA-512 or, if you prefer greater agility, SHA-256 (It is also excellent).
- define your password (and, if you want, a key and PIM file). The more complex, the better.
- Move the mouse to increase the entropy and press "Format" (or start in-place encryption if you chose to preserve data).
When finished, Windows will still display the original letter (e.g., E:), but it won't be able to open it. To use it, go to VeraCrypt > Select devices, choose the partition, mount with your key and you will see another letter (for example, F:) which is the encrypted drive ready to work.

Hidden Volumes: Protection Against Coercion
Encrypting a pendrive with VeraCrypt allows you to create a hidden volume within another volume. This is useful if someone forces you to reveal a password: you can give the password for the outer volume, which will have “filler” data, while the internal volume with your critical files remains invisible.
Summary process: first you create the external volume (encryption, hash, size, format, password). Then, in the same wizard, you create the hidden volume (with its own password, encryption and size), which takes up space inside the external.
Important: leave space marginIf you fill the external volume too much, you could overwrite the internal one. VeraCrypt warns, but it's best to be cautious.
You can mount one or the other by inserting the corresponding password. With the external key, the external volume is mounted; with the internal key, the hidden volume is mounted. It's impossible for an attacker to prove that this second volume exists.
Encrypt full Windows with preboot
In addition to pendrives, VeraCrypt encrypts the partition or complete system unitIt's a delicate process: make a full backup first.
- Go to “Create Volume” > «Encrypt the entire system partition/drive».
- Choose mode Normal (o Hidden if you need a covert system) and decide whether to encrypt only the Windows partition or the entire disk.
- If you are using multiboot, select the appropriate option; otherwise, Simple start.
- Configure encryption (AES recommended), hash (SHA-512 or SHA-256), and your authentication method.
- Create the rescue disk following the wizard.
- Optional: define policy secure erase for deleted files.
- Test, confirm and restart: the system will ask for the key before starting.
If you forget your password or it's corrupted, the rescue disk can save you. Still, don't neglect your backups.
When is it worth encrypting?
If you share documents in the cloud, a security breach can leave you exposed. Before uploading, encrypt with VeraCrypt and you will have an additional layer against unauthorized access.
On shared computers, whether at home or at work, you don't always have control over who watches what. Keep your projects and personal data under lock and key with encrypted volumes.
Ante malware or intrusions (Trojans, ransomware, unauthorized access), encryption adds a layer of defense: even if they get in, they will not read the content without the keys.
If your accounts are compromised and someone gets hold of your files, have them encryption reduces the impactPassword hygiene and cryptographic material management are key.
In professional environments, regulations require the protection of sensitive information. The LOPD and other frameworks establish encryption and key management requirements, especially when high-level personal data, trade secrets or money laundering prevention are involved.
Advantages and disadvantages to consider
Encrypting a pendrive with VeraCrypt is for free. The process is carried out using robust, multi-platform algorithms. It combines security and transparency, and its portable mode is extremely convenient for USB flash drives.
In return, it requires a minimum learning, and encrypting/decrypting is resource intensive (even more so if your CPU doesn't have AES-NI). For single files, you may find 7-Zip more convenient.
In addition, we must think about the compatibility Between systems: A container opens where VeraCrypt is present; a fully encrypted device will appear unreadable until mounted with the tool.
The biggest risk is lose the password (or the key/PIM file): without that, it's over. Keep backups and a serious policy for your credentials.
Like any container, if it becomes corrupted it can affect all its contents. Minimize risks with copies, proper closures and reliable hardware.
With all of the above, you have the perfect plan to protect your USB drives: encrypt a USB flash drive with VeraCrypt, from a simple and fast encrypted container to full device encryption, including hidden volumes, combined keys, and advanced options for Windows, macOS, Linux, and Ubuntu. If you add a couple of good practices and a good password strategy, Your VeraCrypt pendrive will be safe from prying eyes..
Editor specialized in technology and internet issues with more than ten years of experience in different digital media. I have worked as an editor and content creator for e-commerce, communication, online marketing and advertising companies. I have also written on economics, finance and other sectors websites. My work is also my passion. Now, through my articles in Tecnobits, I try to explore all the news and new opportunities that the world of technology offers us every day to improve our lives.
