True Crypt – How to Encrypt Your Files Linus Tech Tips


Reading 1 Minute

File encryption is a great way to keep files safe from nosy folks or potential thieves.

Read about this and join our forum: Link Coming Soon

Buy storage devices at :

47 Replies to “True Crypt – How to Encrypt Your Files Linus Tech Tips”

  1. only way around it is the password but if you make a hidden volume theres no way to say if that was made by truecrypt and therefore they cant ask for the password as they cant prove its encrypted if they do see its encrypted and ask for the password by law you can give them the password to the hidden volume where they would find nothing while you still complied with the law most countries are against encryption and have laws around it despite conflicting laws with self incrimination

  2. okay but the password for the encrypted volume has to be stored somewhere on the device right? either in the encrypted volume or in the files of the program your using to encrypt, So couldn't someone just find the password in the new volume or in the true crypts system files???

    Also if you can access the encryption key by using a password, doesn't that mean the encryption key is as strong as the password? meaning that the encryption key is only secure as the password is? and if that's the case, what's there to stop someone from brute force trying password at like a million a minute? or stripping the password?

  3. Google "TrueCrypt Version 7.1a" second one down ( website, it's a university website) for reliable and safe links for Windows, Linux and Mac OS's.

    DO NOT USE VERSION 7.2 as all you can do with it is access already existing volumes. The creators have abandoned truecrypt and have released a crippled version as the final version despite on going tests no security holes have been found with the software and there is no back door built in. Version 7.1a is fully functional and is still the best available option for securing sensitive data.

  4. Paul Calder Le Roux (born December 24, 1972 in Bulawayo, Rhodesia, now Zimbabwe) is a former programmer, former criminal cartel boss and informant to the US Drug Enforcement Administration (DEA).

    He created E4M, an open-source free Windows disk encryption software program, in 1999, and is a suspected creator of the open-source TrueCrypt, which is based on E4M's code.[5] Le Roux is currently in US custody for ordering the assassinations of six people,

  5. It's secure enough for in house usage! Reliable, even in windows 10! Much better and simpler than bitlocker (at least for file container, not for drive encription)! Never let me down from windows 7 till today! it's a pity that the developer has dropped developing this.