Jump to content
Sign in to follow this  

TrueCrypt 5.0

Recommended Posts

TrueCrypt 5.0 released (February 5, 2008).

TrueCrypt allows you to created virtual encrypted hidden volumes on your hard disk.

The volumes are hidden (steganography) and not identifiable (volumes cannot be distinguished from random data), and you can have several hidden volumes (one real, one fake) to get plausible deniability.

You can also encrypt the whole system partition (where Windows is located), so every single file on the computer is encrypted.

TrueCrypt is free open source software (released under the terms of the TrueCrypt Collective License Version 1.3). Versions available for Windows, Mac OS X and Linux. The program is digitally signed by the TrueCrypt Foundation. You can also install it as portable application.

With TrueCrypt you can hide your private pictures and movies, your warez, porno, satellite uplink codes, corporate business secrets, source code, world domination projects, cryptographic keys, leaked government documents, etc from your family, friends, boss, government, RIAA/MPAA/BSA, thieves/burglars, spies, infiltrators, etc.

It allows you to unmount/dismount all encrypted volumes on a hotkey-press.

The encryption is automatic real-time (on-the-fly) and transparent. It can encrypt an entire hard disk partition or storage device such as USB flash drive.

It has AES-256, Serpent, and Twofish encryption algorithms and XTS mode of operation.



Share this post

Link to post
Share on other sites

TrueCrypt is best accompanied by 7-Zip (using AES-256 encryption) and a 12-gauge shotgun.

AES gives you 3.4 x 10^38 possible 128-bit keys. In comparison, the Digital Encryption Standard (DES) keys are a mere 56 bits long, which means there are approximately 7.2 x 10^16 possible DES keys. Thus, there are on the order of 1021 times more possible AES 128-bit keys than DES 56-bit keys. Assuming that one could build a machine that could recover a DES key in a second, it would take that machine approximately 149 trillion years to crack a 128-bit AES key.


If what Apple says is true about AES-128, then just imagine AES-256.

Share this post

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
Sign in to follow this