![]() All this time the names of the developers remained a mystery spurring the abundant rumors that special agencies were connected to the development of the application. Thus the 7 th version of TrueCrypt no longer has the encryption algorithms with the 64-bit block ciphers ( Triple DES, Blowfish, CAST5).įor 10 years TrueCrypt evolved and turned into fundamental data protection software. As a result, a range of protocols were no longer seen as secure. The advances in computer software spurred and enhanced the technologies designed for defeating encryption methods. Some encryption protocols became unavailable. Some functions were soon dropped: for instance, floppy disk support as this format became obsolete. ![]() TrueCrypt allowed to create an encrypted folder entering a password in the application and work with the encrypted file, encrypting and decrypting data automatically, or “on-the-fly”.įrom 2004 through 2014 TrueCrypt was regularly updated. What does “on-the-fly” mean? Common encryption programs, before you start working with encrypted files, require that you first decrypt a file or folder after performing a series of actions, create an encrypted copy of the file or folder and delete the unencrypted original copy. The first version of the software dates back to 2004, and at the time it was basically the only open-source on-the-fly encryption application. ![]() All because TrueCrypt is an almost perfect application for encryption of folders and files. Our reverence for TrueCrypt resembles that for the Holy Sepulcher for Christians and Caaba for Muslims. There’s hardly any information security expert left who hasn’t used the TrueCrypt software. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |