![]() ![]() VeraCrypt is based on TrueCrypt, another open-source encryption utility that has been widely applied until 2014 but is no longer maintained due to certain safety concerns. ![]() Additional protection can also be achieved by using a key file or PIM along with the password. ![]() Among the utilized ciphers are AES, Serpent, Twofish, Camellia, and Kuznyechik. As an alternative, VeraCrypt can be used to encrypt entire system drives, external storage devices or specific partitions. A mounted container can be accessed in the OS like a regular volume. Their decryption is possible only when the container is mounted with the correct password. All files that are saved to it get encrypted on-the-fly. The container itself has a pre-defined size and can also be made hidden. The software allows protecting sensitive data by moving it into a secured file container (a virtual disk represented by an encrypted file in the system). VeraCrypt is an open-source encryption tool available for the Windows, macOS, and Linux platforms. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |