{"id":5902,"date":"2014-07-09T10:00:15","date_gmt":"2014-07-09T14:00:15","guid":{"rendered":"http:\/\/blog.nccomputertech.com\/?p=5902"},"modified":"2014-07-09T10:00:15","modified_gmt":"2014-07-09T14:00:15","slug":"so-long-truecrypt-5-alternative-encryption-tools-that-can-lock-down-your-data","status":"publish","type":"post","link":"https:\/\/nccomputertech.com\/techtalk\/2014\/07\/09\/so-long-truecrypt-5-alternative-encryption-tools-that-can-lock-down-your-data\/","title":{"rendered":"So long, TrueCrypt: 5 alternative encryption tools that can lock down your data"},"content":{"rendered":"<p style=\"text-align:center;\"><a href=\"http:\/\/www.pcworld.com\/article\/2304851\/so-long-truecrypt-5-encryption-alternatives-that-can-lock-down-your-data.html\"><img data-recalc-dims=\"1\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/nccomputertech.com\/techtalk\/wp-content\/uploads\/2014\/07\/0905-truecrypt-100051195-large.jpg\" alt=\"\" \/><\/a><\/p>\n<p>Open-source legend TrueCrypt may be gone, but the usefulness of full disk encryption carries on. So what&#8217;s a crypto fan to do now for their encryption needs?<\/p>\n<p>Well, you could continue to use older versions of TrueCrypt if you already have it installed. While the security community was shocked earlier this week when the anonymous team behind the open source encryption tool seemingly shut down the project, leaving a neutered version 7.2 build of the tool that&#8217;s only good for decrypting existing TrueCrypt volumes, a public audit of the TrueCrypt source code for version 7.1 was already underway and that effort will continue, according to the Open Crypto Audit Project.<\/p>\n<p>The first phase of the TrueCrypt audit found no serious problems with the Windows build of TrueCrypt. If TrueCrypt 7.1 gets a clean bill of health it would continue to be a viable encryption option, though it&#8217;s not clear if the encryption tool&#8217;s development can or will continue under new management.<\/p>\n<p>But if the brouhaha has you feeling skittish, or if you want to move on to encryption software that&#8217;s actively being developed, options abound. As popular as it is (was?), TrueCrypt is far from the only encryption tool around. In fact, many mainstream operating systems already come with an encryption tool built-in.<\/p>\n<p>Here&#8217;s a look at a few full disk encryption options that can take the sting out of TrueCrypt&#8217;s sudden disappearance.<\/p>\n<p>Windows encryption tools<\/p>\n<p>bitlockericonhero<\/p>\n<p>BitLocker is built into select versions of Windows.<\/p>\n<p>The most obvious alternative for Windows users is Microsoft&#8217;s built-in utility, BitLocker. The encryption program is included in Windows 8 and 8.1 Pro editions, which means anyone who switched to Windows 8 during the $40 upgrade deal has BitLocker on their PC. BitLocker is also available on Windows Vista and 7 PCs running the Ultimate or Enterprise editions.<\/p>\n<p>Check out our tutorial on BitLocker to get started with Microsoft&#8217;s encryption tool.<\/p>\n<p>If you don&#8217;t have the right flavor of Windows, another choice is Symantec Drive Encryption. While this program is just as closed-source as BitLocker, it implements PGP, a well known encryption method.<\/p>\n<p>If you need further reassurances, security expert Bruce Schneier recently told The Register that Symantec&#8217;s tool is what he&#8217;s going to use post-TrueCrypt. That&#8217;s good enough for me. SDE costs $110 for a single user license.<\/p>\n<p>TrueCrypt was free and worked with all flavors of Windows, though. If you&#8217;re looking for an encryption tool that can match those prerequisites, check out DiskCryptor. We have a review of the free software and a guide to locking down your files with DiskCryptor available, as well.<\/p>\n<p>Mac encryption options<\/p>\n<p>For OS X users, Apple provides FileVault.<\/p>\n<p>OS X also has its own built-in encryption tool called FileVault 2 for users of OS X 10.7 (Lion) or later. Apple&#8217;s solution is another closed source program, but we do know it uses the XTS-AES 128-bit cipher\u2014and the National Security Agency recommends using it for their own employees using Macs. So unless you&#8217;re really into conspiracy theories, FileVault is probably a good choice.<\/p>\n<p>For more tips on how the NSA locks down its OS X machines check out &#8220;How the NSA snoop-proofs its Macs.&#8221;<\/p>\n<p>Linux encryption options<\/p>\n<p>For Linux users, the best choice is to use a distribution with a built-in Linux Unified Key Setup (LUKS) implementation. Ubuntu uses LUKS, and the various distributions based on Ubuntu should all have full disk encryption options available during installation. Here&#8217;s how to get started with Ubuntu&#8217;s full-disk encryption, courtesy of Ubuntu&#8217;s community help documentation.<\/p>\n<p>It&#8217;s a sad day if TrueCrypt has truly disappeared, but at least there are a number of alternatives open to users who need or want to continue encrypting their stuff.<\/p>\n<p>via <a href=\"http:\/\/www.pcworld.com\/article\/2304851\/so-long-truecrypt-5-encryption-alternatives-that-can-lock-down-your-data.html\" target=\"_blank\">So long, TrueCrypt: 5 alternative encryption tools that can lock down your data | PCWorld<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Open-source legend TrueCrypt may be gone, but the usefulness of full disk encryption carries on. So what&#8217;s a crypto fan [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[7,10],"tags":[325,998],"class_list":["post-5902","post","type-post","status-publish","format-standard","hentry","category-security","category-technology","tag-encryption","tag-software-2"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/papNkV-1xc","jetpack-related-posts":[{"id":9452,"url":"https:\/\/nccomputertech.com\/techtalk\/2018\/11\/19\/internal-bug-discovery-security-now-693\/","url_meta":{"origin":5902,"position":0},"title":"Internal Bug Discovery &#8211; Security Now 693","author":"NCCT","date":"November 19, 2018","format":false,"excerpt":"https:\/\/youtu.be\/ClVI9PMQGCY Australia vs Encryption, Google+ Bugs Hasten its Demise -- Australia's recently passed anti-encryption legislation -- Details of a couple more mega-breaches including a bit of Marriott follow-up -- A welcome call for legislation from Microsoft -- A new twist on online advertising click fraud -- The DHS is interested\u2026","rel":"","context":"In &quot;Microsoft&quot;","block_context":{"text":"Microsoft","link":"https:\/\/nccomputertech.com\/techtalk\/category\/microsoft\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/ClVI9PMQGCY\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":9335,"url":"https:\/\/nccomputertech.com\/techtalk\/2018\/04\/29\/this-week-in-tech-664-warm-tushie-tech\/","url_meta":{"origin":5902,"position":1},"title":"This Week in Tech 664: Warm Tushie Tech","author":"NCCT","date":"April 29, 2018","format":false,"excerpt":"https:\/\/youtu.be\/ImbCQ9LqcAo Sprint and T-Mobile make it official. Amazon, Google, and Facebook all have amazing quarterly earnings reports. Amazon's home robot and the battle for smart home supremacy. Facebook's community guidelines. Golden Gate Killer found with open source DNA site. Who wants Snap's second generation Spectacles? Apple's rumored AR\/VR headset. What\u2026","rel":"","context":"In &quot;Apple&quot;","block_context":{"text":"Apple","link":"https:\/\/nccomputertech.com\/techtalk\/category\/apple\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/ImbCQ9LqcAo\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":9366,"url":"https:\/\/nccomputertech.com\/techtalk\/2018\/06\/10\/this-week-in-tech-670-go-theranos-or-go-home\/","url_meta":{"origin":5902,"position":2},"title":"This Week in Tech 670: Go Theranos or Go Home","author":"NCCT","date":"June 10, 2018","format":false,"excerpt":"https:\/\/youtu.be\/jCxygSzkfL4 --A New Tech Manifesto by Baratunde: how to reinvent social media to improve all our lives. --Apple's WWDC announcements: Screen Time restores balance to your life, memojis avoid the uncanny valley, ARKit 2 might (might) actually have usefull apps, Siri Shortcuts might (might) make Siri useful, macOS Mojave makes\u2026","rel":"","context":"In &quot;Apple&quot;","block_context":{"text":"Apple","link":"https:\/\/nccomputertech.com\/techtalk\/category\/apple\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/jCxygSzkfL4\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":9938,"url":"https:\/\/nccomputertech.com\/techtalk\/2025\/05\/16\/google-antitrust-ruling-breakdown-what-this-means-for-chrome-and-search\/","url_meta":{"origin":5902,"position":3},"title":"Google Antitrust Ruling Breakdown &#8211; What This Means for Chrome and Search","author":"NCCT","date":"May 16, 2025","format":false,"excerpt":"https:\/\/youtu.be\/ELXjmrnN1uM The panel breaks down the antitrust ruling that could force Google to sell Chrome, stop paying Apple billions for default search placement, and fundamentally reshape the internet. This is just one explosive topic from This Week in Tech - we also discuss AI's environmental impact and the government's security\u2026","rel":"","context":"In &quot;Apple&quot;","block_context":{"text":"Apple","link":"https:\/\/nccomputertech.com\/techtalk\/category\/apple\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/ELXjmrnN1uM\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":9393,"url":"https:\/\/nccomputertech.com\/techtalk\/2018\/08\/19\/this-week-in-tech-680-hacky-hack-hack\/","url_meta":{"origin":5902,"position":4},"title":"This Week in Tech 680: Hacky Hack Hack","author":"NCCT","date":"August 19, 2018","format":false,"excerpt":"https:\/\/youtu.be\/7ClMz3MkTJk This Week in Tech Elon's Twitter addiction, $1200 iPhone XS+, Movie Pass Fail, Pai's lie, and more. --Leave Elon alone! Tesla tumbles after Musk laments his \"most difficult and painful year.\" --Google employees revolt over China rumors; town hall meeting shut down due to \"kerfuffle\" tweets. --Apple thinks that\u2026","rel":"","context":"In &quot;Technology&quot;","block_context":{"text":"Technology","link":"https:\/\/nccomputertech.com\/techtalk\/category\/technology\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/7ClMz3MkTJk\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":9934,"url":"https:\/\/nccomputertech.com\/techtalk\/2025\/05\/16\/8000-disaster-prebuilt-pc-corsair-origin-fail-again\/","url_meta":{"origin":5902,"position":5},"title":"$8000* Disaster Prebuilt PC &#8211; Corsair &#038; Origin Fail Again","author":"NCCT","date":"May 16, 2025","format":false,"excerpt":"https:\/\/youtu.be\/mW5WQY7Ym0I In this review of the Corsair \/ Origin Genesis Pre-Built Gaming PC with an RTX 5090, we're tearing down the computer, running a cost comparison, benchmarking thermals, acoustics, power, and frequency, and looking at the overall build quality. Unfortunately for Origin and Corsair (which owns Origin), this build is\u2026","rel":"","context":"In &quot;Hardware&quot;","block_context":{"text":"Hardware","link":"https:\/\/nccomputertech.com\/techtalk\/category\/hardware\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/mW5WQY7Ym0I\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]}],"_links":{"self":[{"href":"https:\/\/nccomputertech.com\/techtalk\/wp-json\/wp\/v2\/posts\/5902","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nccomputertech.com\/techtalk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nccomputertech.com\/techtalk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nccomputertech.com\/techtalk\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/nccomputertech.com\/techtalk\/wp-json\/wp\/v2\/comments?post=5902"}],"version-history":[{"count":0,"href":"https:\/\/nccomputertech.com\/techtalk\/wp-json\/wp\/v2\/posts\/5902\/revisions"}],"wp:attachment":[{"href":"https:\/\/nccomputertech.com\/techtalk\/wp-json\/wp\/v2\/media?parent=5902"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nccomputertech.com\/techtalk\/wp-json\/wp\/v2\/categories?post=5902"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nccomputertech.com\/techtalk\/wp-json\/wp\/v2\/tags?post=5902"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}