TrueCrypt 5.0 Released, Now Encrypts Entire Drive 330
A funny little man writes "The popular open source privacy tool, TrueCrypt, has just received a major update. The most exciting new feature provides the ability to encrypt an entire drive, prompting the user for a password during boot up; this makes TrueCrypt the perfect tool for non-technical laptop users (the kind who are likely to lose all of that sensitive customer data). The Linux version receives a GUI and independence from the kernel internals, and a Mac version is at last available too."
Independence from Kernel Internals? (Score:2, Insightful)
Re:Slashdotted (Score:5, Insightful)
I've been looking forward to the Linux GUI since I read about it, checking back, checking back etc.
Then today, suddenly the entire site is virtually inaccessible.
On the actual release, I think it is going to be good. After all, we see a new MacOS version, a Linux GUI and a few other nice little tools which most people might not even notice.
On the actual software, I love TrueCrypt, I use it both in Windows (where it, simply, is so easy to use), and in Linux (command-line, mehs all around, plus you have to go and delete history if you don't want to save the fact that your using it (or perhaps the fact that a specific file/partition is a container)).
The hidden-partition feature is the bees knees, especially for those extra secret documents, just hide them behind some porn, financial data or something else which you access and make changes to regularly (to hide if you are making changes to the hidden volume).
The ability to back-up headers makes this software great for businesses or governments (can restore a password if a user loses it), and this new encrypt the entire system thing, simply swell (though it doesn't work on Linux/MacOS I don't think).
Anyway, as always, check out the Wikipedia article for more info. http://en.wikipedia.org/wiki/TrueCrypt [wikipedia.org]
Re:The final excuse. (Score:5, Insightful)
Re:One thing annoys me: (Score:4, Insightful)
If you want something encrypted, you put it on a truecrypt drive; you can move it from the original drive to the truecrypt drive, then juggle the drive letters if you use windows, the mount points otherwise. The only thing that can't get this treatment is the boot drive, therefore (uniquely) you have an absolute need for a way to encrypt that while it is running.
Re:One thing annoys me: (Score:2, Insightful)
Re:The final excuse. (Score:3, Insightful)
A reasonable compromise would be to encrypt only the "interesting" data — such as the /home partition and, maybe, the /var/log (or simply make sure the particular log-files you wish to protect — such as maillog — reside on the encrypted /home).
Whoever tries to crack your laptop is unlikely to be interested in the standard-issue binaries you may have installed...
Re:The final excuse. (Score:1, Insightful)
Re:The final excuse. (Score:1, Insightful)
Re:The final excuse. (Score:4, Insightful)
Re:Independence from Kernel Internals? (Score:3, Insightful)
Re:Recovery CD (Score:2, Insightful)
Re:What about wake up? (Score:2, Insightful)