{"id":162,"date":"2009-02-01T00:54:33","date_gmt":"2009-02-01T05:54:33","guid":{"rendered":"http:\/\/www.rgdot.com\/bl\/?p=162"},"modified":"2013-04-14T20:12:49","modified_gmt":"2013-04-15T01:12:49","slug":"encrypt-and-hide-files-with-truecrypt","status":"publish","type":"post","link":"https:\/\/www.rgdot.com\/bl\/2009\/02\/01\/encrypt-and-hide-files-with-truecrypt\/","title":{"rendered":"Encrypt And Hide Files With TrueCrypt"},"content":{"rendered":"<p><a title=\"truecrypt\" href=\"http:\/\/www.truecrypt.org\" target=\"_blank\">TrueCrypt<\/a> is described by its author as<\/p>\n<blockquote><p>Free open-source disk encryption software for Windows Vista\/XP, Mac OS X, and Linux<\/p><\/blockquote>\n<p>TrueCrypt is a feature rich, powerful and reliable software to secure any number of files, folders or even entire drives. It achieves this by creating a &#8216;virtual encrypted disk&#8217;. It is possible to hide most any thing in one &#8216;file&#8217; that is only accessible with TrueCrypt and via password and\/or <a title=\"TrueCrypt keyfiles\" href=\"http:\/\/www.truecrypt.org\/docs\/?s=keyfiles\" target=\"_blank\">keyfiles<\/a>. It is also possible to encrypt an entire partition or a USB key or flash drive. TrueCrypt supports three main methods of encryption, AES-256, Serpent, and Twofish, and depending on the data being encrypted one may not even need the most powerful but nevertheless it is also possible to generate strong password using TrueCrypt.<\/p>\n<p>Starting up the program and hiding, securing or encrypting requires a few steps. The user starts by pressing the &#8216;Create Volume&#8217; button which leads to the launch of the &#8216;TrueCrypt Volume Creation Wizard&#8217;. Once there one chooses to either encrypt by creating a virtual disk within a file, a non-system partition such as a USB key or a system partition which basically allows for the encryption of the operating system as a whole.  In one of the more typical uses, the &#8216;disk within a file&#8217;, the next step is to choose between a &#8216;normal&#8217;\u00a0 encrypted disk or a hidden volume which basically hides the encrypted data inside another area so as to make it possible to deny any data is encrypted at all, what is called <a title=\"plausible deniability\" href=\"http:\/\/www.truecrypt.org\/docs\/?s=plausible-deniability\" target=\"_blank\">plausible deniability<\/a>. Then the user chooses a location for the so-called file, the type of encryption, the size of the container or file, a password (and keyfiles if preferred) and finally between FAT or NTFS for the format of the volume.<a title=\"plausible deniability\" href=\"http:\/\/www.truecrypt.org\/docs\/?s=plausible-deniability\" target=\"_blank\"> <\/a><\/p>\n<p>When the program is launched the user will see something like the image below where the encrypted file becomes accessible as a drive.<\/p>\n<p><a href=\"http:\/\/www.rgdot.com\/bl\/wp-content\/uploads\/2009\/01\/truecrypt.jpg\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-thumbnail wp-image-165\" title=\"truecrypt\" src=\"http:\/\/www.rgdot.com\/bl\/wp-content\/uploads\/2009\/01\/truecrypt-150x150.jpg\" alt=\"truecrypt\" width=\"150\" height=\"150\" srcset=\"https:\/\/www.rgdot.com\/bl\/wp-content\/uploads\/2009\/01\/truecrypt-150x150.jpg 150w, https:\/\/www.rgdot.com\/bl\/wp-content\/uploads\/2009\/01\/truecrypt-160x160.jpg 160w, https:\/\/www.rgdot.com\/bl\/wp-content\/uploads\/2009\/01\/truecrypt-320x320.jpg 320w, https:\/\/www.rgdot.com\/bl\/wp-content\/uploads\/2009\/01\/truecrypt-96x96.jpg 96w, https:\/\/www.rgdot.com\/bl\/wp-content\/uploads\/2009\/01\/truecrypt-24x24.jpg 24w, https:\/\/www.rgdot.com\/bl\/wp-content\/uploads\/2009\/01\/truecrypt-36x36.jpg 36w, https:\/\/www.rgdot.com\/bl\/wp-content\/uploads\/2009\/01\/truecrypt-48x48.jpg 48w, https:\/\/www.rgdot.com\/bl\/wp-content\/uploads\/2009\/01\/truecrypt-64x64.jpg 64w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/a><\/p>\n<p>For increased security check &#8216;never save history&#8217; and keep &#8216;cache passwords and keyfiles in memory&#8217; unchecked (see image above).<\/p>\n<p>Many command line options that can ease the use of and for example automate mounting of encrypted drives plus many other explanations including a very easy to follow tutorial are all available at <a title=\"TrueCrypt\" href=\"http:\/\/www.truecrypt.org\/docs\/\" target=\"_blank\">www.truecrypt.org\/docs<\/a>. TrueCrypt is currently at version 6.1a and supported by a good community and a detailed site.<a title=\"TrueCrypt\" href=\"http:\/\/www.truecrypt.org\/docs\/\" target=\"_blank\"><br \/>\n<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>TrueCrypt is described by its author as Free open-source disk encryption software for Windows Vista\/XP, Mac OS X, and Linux TrueCrypt is a feature rich, powerful and reliable software to secure any number of files, folders or even entire drives. It achieves this by creating a &#8216;virtual encrypted disk&#8217;. It is possible to hide most [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":165,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","footnotes":""},"categories":[3],"tags":[22,49],"class_list":["post-162","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-software-reviews","tag-encryption","tag-security"],"_links":{"self":[{"href":"https:\/\/www.rgdot.com\/bl\/wp-json\/wp\/v2\/posts\/162","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.rgdot.com\/bl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.rgdot.com\/bl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.rgdot.com\/bl\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.rgdot.com\/bl\/wp-json\/wp\/v2\/comments?post=162"}],"version-history":[{"count":18,"href":"https:\/\/www.rgdot.com\/bl\/wp-json\/wp\/v2\/posts\/162\/revisions"}],"predecessor-version":[{"id":1384,"href":"https:\/\/www.rgdot.com\/bl\/wp-json\/wp\/v2\/posts\/162\/revisions\/1384"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.rgdot.com\/bl\/wp-json\/wp\/v2\/media\/165"}],"wp:attachment":[{"href":"https:\/\/www.rgdot.com\/bl\/wp-json\/wp\/v2\/media?parent=162"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.rgdot.com\/bl\/wp-json\/wp\/v2\/categories?post=162"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.rgdot.com\/bl\/wp-json\/wp\/v2\/tags?post=162"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}