I doubt if you could find a better disk encryption application either OSS or Commercially. The features, and the paranoia involved in producing those features, included in TrueCrypt are unbeatable and the fact that it is opensource is a big bonus.
TrueCrypt is only disk encryption however, if you wish individual file or email encryption you will need to use other apps.
TrueCrypt can create a 'container' that is like an encrypted drive where you can put files into. There is also a full disk encryption option that is able to encrypt a complete disk. On top of that theres the option to encrypt a whole operating system.
TrueCrypt is a very powerful tool and one of the few disadvantages ly in the fact that to use it you need administrator rights because of it needs to add a driveletter to the encrypted information. And indeed, encrypting a single file is not (yet?) supported.
Professional products like the Maxtor OneTouch use TrueCrypt as the system to encrypt their portable harddrives.
Working with a commercial FDE software here at work I was paranoid about TC5 with its one header location. With TC6, it has a backup header section at the end of the archive. With this auto failover built in, I have entrusted it with encrypting my hard drives completely. Another bonus of using TC6 as a FDE (Full Disk Encryption) is that during the install and prior to encryption, TC forces you to burn a recovery CD just in case your drive gets hosed for the encryption you can still decrypt your data and attempt to recover it.
I wholeheartedly recommend TC6 for anyone.
You have the right to remain silent. Anything you do or say will be exaggerated or mis-quoted and used against you.
Thank you for the clarification. Pardon my ignorance, but i could not find that gem of information in the link provided. To me it reads as any volume created with TC6. Which includes containers and partitions. I could be mistaken but if you could bplease be so kind as to point to and or copy a reference to the particular section, this would be greatly appreciated to overcome this minor disagreement.
You have the right to remain silent. Anything you do or say will be exaggerated or mis-quoted and used against you.
Sure. There's a lot of little print on that page In the table about the format spec -
Backup header (encrypted with a different header key derived
using a different salt). For system encryption, this item is
omitted.†† See bytes 0–65535.
Backup header for hidden volume (encrypted with a different
header key derived using a different salt). If there is no hidden
volume within the volume, this area contains random data.**
For system encryption, this item is omitted.†† See bytes
0–65535.
Gotcha. I could have sworn that the backup header applied to all TC6 encrypted volumes... Oh well. It was that one thought that I decided to go ahead and try out TC on my main system at home and thusly recommend it to many other people as well.
Thanx for the clarification!
You have the right to remain silent. Anything you do or say will be exaggerated or mis-quoted and used against you.
I'm using TrueCrypt for years, it's great, however, I've used only the file container-type encryption, not WDE (Whole Disk Encryption). Works just fine, fast, with no or small overhead only.
Don't forget when you use TC's FDE (Full Disk Encryption) you'll also use PBA (Pre-Boot Authentication) which they fixed in the latest version.
When/if they add file/folder encryption and token-based authentication it'll be even more impressive. The "Holy Grail" for TC is to implement those two things along with some sort of admin console for enterprise management like the commercial products have.
I'm researching DAR (Data At Rest) encryption solutions for my various projects at work so I've learned a ton in the last few weeks on this topic. I've been running TC's FDE with PBA on a Panasonic Toughbook CF-18 at work for the last few months and it's been great so far. The only downside to FDE is, when you make a disk image, it'll be the same size as the encrypted partition even if you try to compress it since it's all random data to the imaging software. Making an image of a "live" system may yield different results, but I use Bart's PE with DriveImageXML from a boot CD.
Cancer Survivors -- Remember the fight, celebrate the victory!
Help control the rugrat population -- have yourself spayed or neutered!
That statement needs some clarification. If you can convince an administrator that TrueCrypt is a valuable product, and they install the driver on the machine, then TrueCrypt can be very useful without administrative privileges. Once that driver is installed on the machine, TrueCrypt will run quite well with a user level account. In a school or kiosk type of situation this is not likely. In a workplace, your mileage may vary.
Also note that many of the mods of the portableApps menu have built in methods of loading TrueCrypt volumes.
I doubt if you could find a better disk encryption application either OSS or Commercially. The features, and the paranoia involved in producing those features, included in TrueCrypt are unbeatable and the fact that it is opensource is a big bonus.
TrueCrypt is only disk encryption however, if you wish individual file or email encryption you will need to use other apps.
Small clarification.
TrueCrypt can create a 'container' that is like an encrypted drive where you can put files into. There is also a full disk encryption option that is able to encrypt a complete disk. On top of that theres the option to encrypt a whole operating system.
TrueCrypt is a very powerful tool and one of the few disadvantages ly in the fact that to use it you need administrator rights because of it needs to add a driveletter to the encrypted information. And indeed, encrypting a single file is not (yet?) supported.
Professional products like the Maxtor OneTouch use TrueCrypt as the system to encrypt their portable harddrives.
Working with a commercial FDE software here at work I was paranoid about TC5 with its one header location. With TC6, it has a backup header section at the end of the archive. With this auto failover built in, I have entrusted it with encrypting my hard drives completely. Another bonus of using TC6 as a FDE (Full Disk Encryption) is that during the install and prior to encryption, TC forces you to burn a recovery CD just in case your drive gets hosed for the encryption you can still decrypt your data and attempt to recover it.
I wholeheartedly recommend TC6 for anyone.
You have the right to remain silent. Anything you do or say will be exaggerated or mis-quoted and used against you.
One clarification here. The backup header in TC6 is for containers only. It is omitted when using System Encryption.
http://www.truecrypt.org/docs/volume-format-specification.php
Thank you for the clarification. Pardon my ignorance, but i could not find that gem of information in the link provided. To me it reads as any volume created with TC6. Which includes containers and partitions. I could be mistaken but if you could bplease be so kind as to point to and or copy a reference to the particular section, this would be greatly appreciated to overcome this minor disagreement.
You have the right to remain silent. Anything you do or say will be exaggerated or mis-quoted and used against you.
Sure. There's a lot of little print on that page
In the table about the format spec -
Gotcha. I could have sworn that the backup header applied to all TC6 encrypted volumes... Oh well. It was that one thought that I decided to go ahead and try out TC on my main system at home and thusly recommend it to many other people as well.
Thanx for the clarification!
You have the right to remain silent. Anything you do or say will be exaggerated or mis-quoted and used against you.
I'm using TrueCrypt for years, it's great, however, I've used only the file container-type encryption, not WDE (Whole Disk Encryption). Works just fine, fast, with no or small overhead only.
Don't forget when you use TC's FDE (Full Disk Encryption) you'll also use PBA (Pre-Boot Authentication) which they fixed in the latest version.
When/if they add file/folder encryption and token-based authentication it'll be even more impressive. The "Holy Grail" for TC is to implement those two things along with some sort of admin console for enterprise management like the commercial products have.
I'm researching DAR (Data At Rest) encryption solutions for my various projects at work so I've learned a ton in the last few weeks on this topic.
I've been running TC's FDE with PBA on a Panasonic Toughbook CF-18 at work for the last few months and it's been great so far. The only downside to FDE is, when you make a disk image, it'll be the same size as the encrypted partition even if you try to compress it since it's all random data to the imaging software. Making an image of a "live" system may yield different results, but I use Bart's PE with DriveImageXML from a boot CD.
Cancer Survivors -- Remember the fight, celebrate the victory!
Help control the rugrat population -- have yourself spayed or neutered!
. . . if you're trying to use it on a machine that you don't have administrative privileges.
But great for laptops in case they were stolen or lost for example.
That statement needs some clarification. If you can convince an administrator that TrueCrypt is a valuable product, and they install the driver on the machine, then TrueCrypt can be very useful without administrative privileges. Once that driver is installed on the machine, TrueCrypt will run quite well with a user level account. In a school or kiosk type of situation this is not likely. In a workplace, your mileage may vary.
Also note that many of the mods of the portableApps menu have built in methods of loading TrueCrypt volumes.