Editors' Note: Using TrueCrypt is not secure as it may contain unfixed security issues. The development of TrueCrypt was ended in 5/2014 after Microsoft terminated.
I have been using TrueCrypt for a long time now. However, someone pointed me to a link that described the problems with the license. IANAL and so it really didn't.
The ultimate freeware encryption program, TrueCrypt is loaded with powerful features that users concerned with protecting data from prying eyes will find robust and comprehensive. It offers 11 algorithms for encrypting your private files in a password-protected volume. You can store your encrypted data in files (containers) or partitions (devices). TrueCrypt works hard to offer powerful data protection, recommending complex passwords, explaining the benefits of hidden volumes, and erasing telltale signs of the encryption process, including mouse movements and keystrokes. Though the interface may not be immediately intuitive, its powerful, on-the-fly encryption for no cost still earns the freeware security tool a top rating. The useful tips in the extensive help manual and volume-creation wizard provide excellent guidance. In fact, they're required reading, as TrueCrypt lacks any considerable in-program help. For instance, the tutorial explains the entire concept beyond "hidden" volumes, but it doesn't quite explain how to mount them. One obvious downside of any strong encryption program is if you happen to forget your lengthy, secure password, you should consider any protected files as good as gone. However, once files are mounted to a local drive with your password or key, they conveniently behave just like any normal files, allowing you to easily open, copy, delete, or other modify them another way. Dismount the volume, and voila--your previously accessible files are now safely secure from prying eyes. The apps newer features include hardware acceleration for some Intel chips, auto-mounting, and convenience improvements for when you "favorite" an encrypted volume have improved both performance and usability. Users can even create a hidden operating system, encrypted away from nosy busybodies, but make no mistake--TrueCrypt is not for the casual encryption explorer. Be sure to thoroughly understand what you're doing with the program before you do something regrettable. TrueCrypt is a software system for establishing and maintaining an on-the-fly-encrypted volume (data storage device). On-the-fly encryption means that data is automatically encrypted or decrypted right before it is loaded or saved, without any user intervention. No data stored on an encrypted volume can be read (decrypted) without using the correct password/keyfile(s) or correct encryption keys. Entire file system is encrypted (e.g., file names, folder names, contents of every file, free space, meta data, etc). Pros On lion 10.7.4 after I install the package and run the application it immediately crashes, every single time. I have since moved the app to the trash and waiting for an alternative to truecrypt. Might I ask the developer to update the software to funciton on the new OSX Lion. Thanks. Pros Give?s me a place to put stuff that are important not necessarily dangerous for prying eye?s to follow. Cons Like mentioned by someone (come to think of it) yeah, it can be deleted by anyone. It?s also quite (what should I say) ?elaborate? I guess for personal use (maybe better for business) but hey ?it?s free? Summary The way it works: You open up the program and get like a data box (okay so far) - then there is this list of sixty four (let?s say) pre made folders sitting in this data box, they call volumes (you scroll through them). You get to pick any one of them to open up your ?encrypted" folder sitting where ever you initially created it, right? But then it?s gotta be mounted (which seems to be just another step in opening it) then, finally you open it, see? It?s like a few extra steps of just open, open, open - but what do I know, I?m sure there is some ?security? reason why it works like this etc... So I think I guess from all these sixty four, they call volumes (like empty folders) you can open up more and more encrypted folders keeping them all gathered in this initial ?data box? area, making things all centralized (I think is the game plan)? In closing, it most certainly works (I don?t know about the encryption end of the deal, how good it?s encryption is etc) and like I said, all this open, open, open stuff seems to be a little on the ?elaborate? side of the fence at least for single user type of thing, but hey... its free :) I wonder if there is any ability to send something encrypted through email? I know it?s possible but with this one I don?t know. Reply to this review Was this review helpful? (1) (0) Report this post Email this post Permalink to this post Summary I need to be able to use a 16GB USB thumb drive on Macs and PCs and I have set this up with 4 encrypted "containers" of just under 4GB each, and an unencrypted area just over 100MB. The latter houses TrueCrypt for PC which I can run from the thumb drive when I am at a PC. There are plenty of choices of encryption, including triple encryption to make sure that no-one gets their hands on your data. Just make the passphrase long and complex, and most of all, keep it to yourself. This is an application that I would not be without. Reply to this review Was this review helpful? (0) (0) Report this post Email this post Permalink to this post','url':'http://download.cnet.com/TrueCrypt/3000-2092_4-10806076.html','og_descr':'The ultimate freeware encryption program, TrueCrypt is loaded with powerful features that users concerned with protecting data from prying eyes will find robust and comprehensive
So opens the short editorial I wrote this morning and placed at the top of GRC's new TrueCrypt Final Version Repository page. The impetus for the editorial was the.
There is a third, very likely possibility - TrueCrypt may have been issued a National Security Letter and ordered to divulge any potential weaknesses in.
From TrueCrypt Foundation: TrueCrypt is a software system for establishing and maintaining an on-the-fly-encrypted volume (data storage device).