
Encryption is automatic, real-time (on-the-fly) and transparent.Encrypts a partition or drive where Windows is installed (pre-boot authentication).Encrypts an entire partition or storage device such as USB flash drive or hard drive.Creates a virtual encrypted disk within a file and mounts it as a real disk.Automatic, real-time and transparent encryption.The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. The cookie is used to store the user consent for the cookies in the category "Performance". This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". The cookie is used to store the user consent for the cookies in the category "Other. The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". The cookie is used to store the user consent for the cookies in the category "Analytics". These cookies ensure basic functionalities and security features of the website, anonymously. Necessary cookies are absolutely essential for the website to function properly.

#1 and #3 are possibly related since the NSA is considered in many quarters "a malicious actor."Īs Naked Security asks, "What's your theory?"ĭigital Forensics/Information Security/Information Technology

I find theories #2 and #4 improbable but any of the other three seem perfectly plausible in the current political environment. But are any of the conspiracy theories correct? No one has said. The coders have called "game over" on the project, and they've decided to take their ball and go home, by refusing permission for a fork.
#TRUECRYPT ALTERNATIVES CODE#
We know it is a "game over" scenario and that permission to fork the code has been refused.

#TRUECRYPT ALTERNATIVES SOFTWARE#
So why did TrueCrypt programmers shut the software down? The leading conspiracy theories are these: Read the post if that is mysterious to you. You could not, for example, "fork" the code. But it wasn't truly open source, since you couldn't then do what you liked with that source code. You could even get the source code for TrueCrypt, as a sort of implicit guarantee that there were no secrets or backdoors hidden in there.

It became popular for many reasons, notably that it was free, cross-platform and apparently untainted by association with governments or commercialism.
#TRUECRYPT ALTERNATIVES FOR FREE#
TrueCrypt is, or was, a long-running software project that claimed to provide strong encryption software that you could use for free on Windows, Linux and OS X. The Death of TrueCrypt: The Mystery DeepensĮveryone in the cybersecurity world would love to know definitively what happened to cause the demise of TrueCrypt but a Naked Security post suggests we are no closer to truly understanding that than we were before.
