![]() ![]() Third-party Android and iOS apps allow you to open and access data stored VeraCrypt containers. VeraCrypt is a fork of TrueCrypt and its direct successor – so don't be put off by the minor branding changes. Its front-end looks the same and functions identically to TrueCrypt. Its code has been fully audited, and the uncovered problems fixed. In fact, VeraCrypt is still under active developmentĪs such, VeraCrypt is widely regarded in the security world as the go-to open-source full-disk encryption program. It allows you to create a virtual encrypted disk (volume) which you can mount and use just like a real disk. Or it can even be used to encrypt an entire disk partition or storage device (e.g. a hard drive or USB stick), including the drive your Operating System boots from.īy default, VeraCrypt encrypts all data stored in a volume with an AES-256 cipher, although when creating a volume you can specify an alternative cipher. The NIST averse, for example, can opt to use a Twofish, Serpent, or Camellia cipher. Data is then authenticated using SHA-512 by default, but again, users can select an entirely different hashing algorithm depending on their preference.Ī notable feature of VeraCrypt is that any file, for example, an innocent-looking photo file, can be used as the container for a VeraCrypt volume. Even more notable is its hidden volume feature, which provides plausible deniability. It does this by hiding an encrypted volume inside another VeraCrypt volume in such a way that, if the correct precautions are taken, it is impossible to prove the second hidden volume exists.ĭata stored in VeraCrypt containers can be securely synced across devices by storing a volume in (and mounting it from) a cloud storage sync folder. VeraCrypt can be used in this way to store data securely on otherwise insecure platforms such as Dropbox. It is not an ideal tool for this job, however. Volume sizes can be large and are of a fixed size, which you must specify when creating them. And when any data inside a volume is changed, the entire volume must be re-uploaded. Of all the software discussed in this article, VeraCrypt is by far the most thoroughly audited open-source encryption solution available. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |