# # Truecrypt on-the-fly encryption
APLawrence.com -  Resources for Unix and Linux Systems, Bloggers and the self-employed

truecrypt

I've removed advertising from most of this site and will eventually clean up the few pages where it remains.

While not terribly expensive to maintain, this does cost me something. If I don't get enough donations to cover that expense, I will be shutting the site down in early 2020.

If you found something useful today, please consider a small donation.



Some material is very old and may be incorrect today

© May 2005 Tony Lawrence
2005/05/20

TrueCrypt is on-the-fly encryption for Windows/Mac hard drives and files. One of its cute features is the ability to create a false volume that will pop up if you use a different password than that of your real encrypted data. The documentation says:



 It may happen that you are forced by somebody to reveal the
 password to an encrypted volume. There are many situations
 where you cannot refuse to reveal the password (for example,
 when the adversary uses violence). Using a so-called hidden
 volume allows you to solve such situations in a diplomatic
 manner without revealing the password to your volume.
 

Very cloak and dagger, spy vs. spy, isn't it? Brings to mind images of James Bond being tortured to reveal the password to his laptop. How far can we take this? Does the hidden volume reveal the passwords to yet other machines hidden volumes? Do those hidden volumes in turn contain secret plans for devices that will backfire on the usurpers? Ahh, the intrigue of espionage, thrust, counter-thrust, a web of deception.. coming soon to a theatre near you!

To disguise your secrets even more, you can create a "traveler disk" (a CD or USB stick) that contains the TrueCrypt application so that it isn't even installed on the actual machine where encrypted data is kept. The docs say that "TrueCrypt volumes cannot be distinguished from random data", so I presume you'd also want to scatter some random data about.. not that most of us don't have enough of that already. TrueCrypt fills unused volume space with random bytes also.

What's the encryption method? Just about anything, apparently; AES, Blowfish, Triple DES and various combinations where blocks are encrypted cascade style with two or three different encryption methods.

Many of us have no need for such secrecy and protection, though some folks just seem to want to encrypt on general principle: it's my private business, and therefore I encrypt it. While I don't do that myself, I do understand the philosophy behind it.

You will want to read Protecting your laptop with True Crypt and Basic TrueCrypt Usage. However, you don't necessarily need to buy anything: Linux and have built in tools for basic encryption.


If you found something useful today, please consider a small donation.



Got something to add? Send me email.





(OLDER)    <- More Stuff -> (NEWER)    (NEWEST)   

Printer Friendly Version

->
-> Truecrypt on-the-fly encryption


Inexpensive and informative Apple related e-books:

Sierra: A Take Control Crash Course

Digital Sharing Crash Course

Take Control of Automating Your Mac

Photos for Mac: A Take Control Crash Course

Take Control of Apple Mail, Third Edition





More Articles by © Tony Lawrence





Printer Friendly Version

Have you tried Searching this site?

This is a Unix/Linux resource website. It contains technical articles about Unix, Linux and general computing related subjects, opinion, news, help files, how-to's, tutorials and more.

Contact us


Printer Friendly Version





People who are more than casually interested in computers should have at least some idea of what the underlying hardware is like. Otherwise the programs they write will be pretty weird. (Donald Knuth)




Linux posts

Troubleshooting posts


This post tagged:

Cryptography

Laptops

Microsoft

Security



Unix/Linux Consultants

Skills Tests

Unix/Linux Book Reviews

My Unix/Linux Troubleshooting Book

This site runs on Linode