![]() ![]() Encryption algorithms: AES-256, Serpent, and Twofish.Hidden volume (steganography) and hidden operating system.Provides plausible deniability, in case an adversary forces you to reveal the password:.Parallelization and pipelining allow data to be read and written as fast as if the drive was not encrypted. ![]() Encryption is automatic, real-time (on-the-fly) and transparent.Encrypts a partition or drive where Windows is installed (pre-boot authentication).Encrypts an entire partition or storage device such as USB flash drive or hard drive.Creates a virtual encrypted disk within a file and mounts it as a real disk.Similarly, files that are being written or copied to the TrueCrypt volume are automatically being encrypted on-the-fly (right before they are written to the disk) in RAM. Files are automatically being decrypted on-the-fly (in memory/RAM) while they are being read or copied from an encrypted TrueCrypt volume. Files can be copied to and from a mounted TrueCrypt volume just like they are copied to/from any normal disk (for example, by simple drag-and-drop operations). Entire file system is encrypted (e.g., file names, folder names, contents of every file, free space, meta data, etc). TrueCrypt is a software program that creates an encrypted file on your computer and lets you access the encrypted file using a drive letter. No data stored on an encrypted volume can be read (decrypted) without using the correct password/keyfile(s) or correct encryption keys. On-the-fly encryption means that data are automatically encrypted or decrypted right before they are loaded or saved, without any user intervention. ![]() TrueCrypt is a software system for establishing and maintaining an on-the-fly-encrypted volume (data storage device). ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |