You are correct that encryption is a complicated thing. Truecrypt makes the process fairly easy but, if something goes wrong it is possible you...
The answer precisely depends on the type of threat you are trying to protect against as Palancar said. If you store the backup on an external...
If you try to encrypt windows 8 with TC system encryption and your system boots with UEFI, TC will not be able to encrypt it. TC will install on...
Sadly, the last comment in the anandtech link is 100% true. You can never be sure that a SSD is completely erased. Your only option is to...
Should be no problem to add Truecrypt to a hardware encrypted flash drive. May be a performance hit but probably not. Truecrypt is a great...
Don't know about Kanguru but have you looked at Ironkey? Great if you can afford it but encrypting a standard flash drive is just as good and may...
You can remove the drive letter from your D: drive. Go to disk management, right click on your D: drive, select change drive letter and paths,...
With Truecrypt system encryption, you cannot use keyfiles. There is a workaround with something called a Yubikey. This is a USB device that...
Click the Truecrypt icon in the taskbar. Select: System / Permanently Decrypt System Partition
Which is better? This a subject of much debate. AES is good because there are numerous published papers from teams that have tried to find a...
I think the idea behind the OP of this thread was that some time in the near future, your government would enact laws to restrict anonymity. Fear...
System encryption and hidden volumes should be locked out or hidden in some way. A noob should only be working with file containers. Hopefully...
Ah! missed the part about timing statistics. Still very tricky. How would one separate deliberate timing jitter from the random jitter of normal...
This covert channel (AKA stenography) has bandwidth limitations. In general, you are limited to about 1% of the size of the covering data. If...
Truecrypt is a powerful tool but by itself, is not a complete security solution. It all comes back to assessing your level of threat. Protection...
It certainly depends on your adversary but if you are faced with a police officer or FBI agent and you enter a destruct password, you better be...
The real issue is that not to many years from now there will be few places you can go that are not covered by some sort of camera. Facial and...
Re: Seeking list of common mistakes when using Trucrypt Rendering your system unbootable will only happen if using system encryption. If you...
The only things that make a Truecrypt volume unique are: All TrueCrypt files have a size that is a multiple of 512. Data appears completely...
Expanded password dictionary? I understand the Diceware concept but I think it would be too cumbersome for daily use. The Myphrase concept seems...
TC also collects random data from other sources. In Windows, network statistics and various state variables are collected and added to the random...
I think this is the same thing as the double transposition cipher? http://www.pbs.org/wgbh/nova/decoding/doubtrans.html This encryption method...
I believe what you are asking is for is a way to make your data accessible to you but appear encrypted to anyone that may be "hacking" in while...
Maybe these strength meters are good but you should never use a password you type into them. Probably every password typed into these are copied...
I was just giving one example. Bypassing the encryption is so much easier than breaking it. Torture, threats, cameras, keyloggers, whatever......
Separate names with a comma.