![]() The program uses the AES 128-bit encryption algorithm and also supports the keys.Īvailable for Windows, Mac, Linux and mobile operating systems. Albeit without being a complete alternative to TrueCrypt, it can be used to encrypt important files in the system. ![]() This program cannot encrypt partitions, only individual files. ![]() It allows only permitted programs to make changes to the data on an encrypted disk. From interesting features - File Manager (Disk Firewall) which protects data from illegal copying, viruses. This program officially announces that it does not contain backdrops, bookmarks, since it is located in the country whose legislation cannot force it to do this. By functionality, this program was closest to TrueCrypt.Īllows you to create encrypted containers. DiskCryptor supports multiple encryption algorithms and combinations, hardware acceleration AES, if it is supported by the system and full support for external disks. This program can encrypt the system partition and not system partitions, supports all the latest version of Windows, third-party boot logartes and many other. This is acceptable for true owners, but it greatly complicates attacking access to encrypted data. These security gains add only some delay when opening sections, without loss of performance at the use stage. For example, when the system partition is encrypted, TrueCrypt uses PBKDF2-RIPEMD160 with 1000 iterations, while VERACRYPT uses 327661! And for standard containers and other TrueCrypt sections use no more than 2,000 iterations, and VeraCrypt uses 655331 for RIPEMD100 iteration for SHA-2 and Whirlpool. It increases the safety of the systems used to encrypt the system and sections of algorithms, making them immune to new developments in the selection attacks. Veracrypt is a free encryption program from IDRIX ( There are many such products, some of them we will look at. The main advantage - they have the entire TrueCrypt functionality. Also good as the first option, while there is hope for updating the program and adding new features and algorithms. It is possible when changing operating systems on more recently, in the future there may be compatibility issues with TrueCrypt. ![]() This is a good option of action, because TrueCrypt has established itself as excellent and reliable in every sense program.
0 Comments
Leave a Reply. |