![]() ![]() Since the closure of the TrueCrypt project in 2014, VeraCrypt has remained its most popular fork, which not only repeats the capabilities of the original, but also fixes a number of TrueCrypt vulnerabilities, and also brings additional functionality that was missing before. If you are looking for encryption instructions, read: This is the first of five articles in our blog dedicated to VeraCrypt, it discusses the differences between VeraCrypt and its ancestor TrueCrypt, where to download VeraCrypt, portable installation and Russification. Tell us which program do you prefer and why? Symantec Encryption Desktop ProfessionalĪnd now you: are there other alternatives not mentioned here? Share them with everyone in the comments.Try it, post your results in the comments. But if you want to continue research in this direction, then here is another list of data protection programs for you. Of course, it will not be possible to cover all programs in one note. The project website lacks information about the ciphers and encryption algorithms used.Īvailable for Linux only. This program can be used to encrypt individual files, directories or drives on Windows. The Cloudfogger project has been stopped, Cloudfogger is not available anymore.Ĭurrent Cloudfogger users should re-encrypt their files with a new solution as we will also turn off our keyservers in the following weeks.Ĭan be used to synchronize encrypted copies of files on a cloud service.Īnother program if you want to encrypt on the cloud. The website has the following inscription: The service has stopped working ( Sophie Hunt- thanks for the info). It uses 256bit and will detect supported providers automatically upon installation. Specially designed to protect the data you sync with cloud services, such as Google Drive, OneDrive or Dropbox. (as well as Boxcryptor, CryptSync and Viivo from PKWare) ![]() Claims that Bitlocker has a built-in backdoor for law enforcement and other services has never been proven, but it does have key recovery functionality that can be used to decrypt disks protected by this program, which may be located on Microsoft servers, and not locally. It only supports file encryption, it only means that you can click right click by file and encrypt or decrypt it.īitlocker is part of Windows only in the Enterprise and Ultimate and Pro editions on Windows 8. The program uses the AES 128-bit encryption algorithm and also supports key files.Īvailable for Windows, Mac, Linux and mobile operating systems. Although not a complete alternative to TrueCrypt, it can be used to encrypt important files on the system. This program cannot encrypt sections, only individual files. It allows only authorized programs to make changes to the data on the encrypted drive. Of the interesting features - file manager(Disk Firewall) which protects data from illegal copying, viruses. This program officially declares that it does not contain backdoors, bookmarks, because it is located in a country whose legislation cannot force it to do so. In terms of functionality, this program is closest to TrueCrypt.Īllows you to create encrypted containers. DiskCryptor supports multiple encryption algorithms and their combinations, AES hardware acceleration if supported by the system, and full support for external drives. This program can encrypt system partition and non-system partitions, supports all latest versions Windows OS, third-party bootloaders and much more. This is acceptable to the true owners, but it makes it very difficult for attackers to gain access to encrypted data. These security enhancements only add some latency to opening partitions, with no loss of performance during the use phase. For example, when encrypted system partition, TrueCrypt uses PBKDF2-RIPEMD160 with 1000 iterations, while VeraCrypt uses 327661! And for standard containers and other partitions, TrueCrypt uses no more than 2000 iterations, while VeraCrypt uses 655331 for RIPEMD100 iterations for SHA-2 and Whirlpool. It increases the security of the algorithms used to encrypt the system and partitions, making them immune to new developments in brute-force attacks. VeraCrypt is a free encryption program from IDRIX ( There are many such products, we will consider some of them. The main advantage is that they retain all the functionality of TrueCrypt. It is also good as the first option, while there is hope for updating the program and adding new functions and algorithms. Possibly when changing operating systems to more recent ones, there may be compatibility issues with TrueCrypt in the future. This a good option actions, because TrueCrypt has established itself as an excellent and reliable program in every sense. Continue to use TrueCrypt, because even despite a serious analysis, it did not reveal any security problems.TrueCrypt analogues and alternatives Features of VeraCrypt and differences from TrueCrypt Programs for encrypting individual files or entire disks. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |