• If you are citizen of an European Union member nation, you may not use this service unless you are at least 16 years old.

  • Stop wasting time looking for files and revisions. Connect your Gmail, DriveDropbox, and Slack accounts and in less than 2 minutes, Dokkio will automatically organize all your file attachments. Learn more and claim your free account.



Security Now! recommends TrueCrypt

audioblog by Steve Gibson and Leo Laporte, May 2006


Notes from Clif

I always try to keep up with Steve and Leo's podcast, Security Now. Last week, they talked about all the cool features of an open source encryption program called TrueCrypt. If you've ever had anything you need to hide on your PC and you've never heard of this program, just click on this link to our review of it.


check out TrueCrypt


Quote from Steve Gibson on the Security Now! podcast

It’s like a bunch of guys over a long period of time who were not in a big hurry just worked out the most perfectly feature-packed, like, right set of things with no agenda. They were not trying to force anything on anyone ... this is what open source and the whole open source community can produce when it really works well ...



listen to the Security Now! podcast

or go to the website to read the transcript


Quote from truecrypt.org

Free open-source disk encryption software for Windows XP/2000/2003 and Linux

Main Features:


  • Creates a virtual encrypted disk within a file and mounts it as a real disk.
  • Encrypts an entire hard disk partition or a device, such as USB flash drive.
  • Encryption is automatic, real-time (on-the-fly) and transparent.
  • Provides two levels of plausible deniability, in case an adversary forces you to reveal the password:
    • Hidden volume (steganography – more information may be found here.
    • No TrueCrypt volume can be identified (volumes cannot be distinguished from random data.
  • Encryption algorithms: AES-256, Blowfish (448-bit key), CAST5, Serpent, Triple DES, and Twofish.
  • Mode of operation: LRW (CBC supported as legacy).
  • Based on Encryption for the Masses (E4M) 2.02a, conceived in 1997.