Provides two levels of plausible deniability, in case an adversary forces you to reveal the password:ġ) Hidden volume (steganography – more information may be found here).Ģ) No TrueCrypt volume can be identified (volumes cannot be distinguished from random data).Įncryption algorithms: AES-256, Serpent, and Twofish. Further information regarding features of the software may be found in the documentation. Support for hibernation on computers where the system partition is encrypted (previous versions of TrueCrypt prevented the system from hibernating when the system partition was encrypted). (Windows Vista/XP/2008/2003)Ībility to mount a partition that is within the key scope of system encryption without pre-boot authentication (for example, a partition located on the encrypted system drive of another operating system that is not running). when there is a need to back up or repair an operating system encrypted by TrueCrypt (from within another operating system).Ĭommand line options for creating new volumes. Increased speed of AES encryption/decryption (depending on the hardware platform, by 30-90%). (Windows)įaster booting when the system partition is encrypted. When the system partition/drive is encrypted, the TrueCrypt Boot Loader is now stored in a compressed form and is, therefore, smaller.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |