It would be nice to have a condensed list of the common mistakes users make when when using Truecrypt. A paragraph form separated by a line would make it easier to read. Any thoughts? *EDIT* List so far, some paragraphs may overlap: 1. disk repartitioning (which is NEVER a good idea in the presence of an encrypted partition), 2. reinstalling or upgrading the OS while an encrypted partition is present or connected, 3. deleting a container file by mistake, 4. formatting the wrong partition by mistake, 5. allowing Windows to format an encrypted partition or initialize an encrypted disk (which under certain conditions can occur even without prompting), 6. accidentally overwriting or otherwise losing the partition table, 7. forgetting their password, 8. changing keyboards or keyboard layouts and then discovering that their password doesn't work anymore, 9. failure to back up their headers, 10. failure to back up their data, 11. editing or deleting their keyfile (if used) 12. failure to back up their keyfile (if used), 13. failure to back up their keyfile path (if used) or even understand the difference between a keypath and a keyfile, 14. altering any files or folders in the keyfile path, 15. failure to back up their rescue disk (for system encryption only), 16. failure to recognize that encrypted data is more vulnerable than plaintext data, and finally, 17.behaving cluelessly. (Yes, "behaving cluelessly" in the presence of encrypted data is a good way to lose it.) 18. Not having/making a reliable backup BEFORE using TrueCrypt. This actually applies to any use of a computer. Numerous threads screaming of data loss when a simple and reliable backup would have solved the problem easily. 19. Not RETAINING a volume header backup on removable media. Screaming threads one after another because the user didn't make a backup header (also rescue disk for system encrytion) and actually keep it where they could use it. Its a little 128K file but its a life saver. 20. If you're using the hidden volume feature then a comparison of two or more different copies of the same volume could possibly reveal that. 21. comparison would also most likely show that your volume is actually in use, negating any false claims on your part that it is merely "random data from a disk wipe" or something of the sort. 22. (only for users with very high threat models): Being able to compare the differences between the two containers would theoretically aid cryptanalysis (although I've never heard of anybody actually succeeding in breaking into a volume that way).