Enigm Of course you would have to set the master keys to be identical. You could prove that Truecrypt was correctly implementing AES and that...
This is an interesting question. Truecrypt is open source so lots of people have taken a look at the code. The question is, how many methodical...
I have been trying to follow this thread but really can't figure out what it is about. I think the OP is trying to make One Time Pad encryption...
If you send email to anyone, there is a chance that the recipient will forward it to someone else and it will end up on a spam list. Often the...
Some people keep secret data on an external hard disk that is fully encrypted. To make plausible deniability, keep 3 or more disks. One disk is...
Bitlocker is designed to address the needs of corporate IT, not individual users. Bitlocker is great for IT because it can be managed with domain...
"Peace of mind about no factory backdoors included". Just how does he get this peace of mind anyway? If they say there are no backdoors, it must...
SirDrexl, thanks for checking on specific sites. Most of the worst offenders for me have been banks. I did a bit of checking myself and was...
Common phrases should be avoided for obvious reasons. Instead, use a nonsense phrase that you construct to be memorable. I also find it...
So white noise is sound that contains an even distribution of all audible frequencies. For just about any "bug" the result of playing white noise...
For clarification, remember that when OTFE software such as Truecrypt is used, the encrypted data is only secure when the system is powered off....
I would say your data is safe. Without the password, your data can't be DE-crypted. Not sure what your BIOS is trying to do but your greatest...
If you subtract the time required to set up a brute force routine and the time and cost of traveling to whatever GPS coordinates.., $2,000 just...
There is no difference between a video camera mounted on your property and a camera in a vehicle parked on the street. There is no law against...
I would not be concerned about an encrypted container such as a flash drive. It's getting the data into the container that is not secure with...
You can't simply check the compiled code against the compiled Windows executable downloaded from TC website. Digitally signed, undocumented...
Truecrypt Foundation has chosen to speak of only two developers but, as with any complex coding project, many more people contribute than are...
Future development: -Command line options for volume creation -'Raw' CD/DVD volumes History: No important changes since V7.0 (July 2010)...
I too have had an uneasy feeling about the secret identities of the developers. At first there was a plausible explanation: Many restrictive...
Of course any security solution should first be analysed in context of the threat you are protecting agents. In the case of the guy swallowing...
Burning is good but not very practical. If you have an electric stove you could could put it on the spiral heating element on top and turn to...
Interesting. The article doesn't say but the picture implies they used a cross cut shredder. At my last company, confidential document...
Yes and No. If the manufacturer of the flash drive specifically provides a low level format tool you may be able to fully wipe the drive. At...
Yes, a reformatted Flash memory device can still contain data. The reasons is because many flash drives implement something called "wear...
Please do read the Truecrypt documentation. Your odds of having problems with Truecrypt decrease dramatically if you understand how it works and...
Separate names with a comma.