TrueCrypt, the Glossary
TrueCrypt is a discontinued source-available freeware utility used for on-the-fly encryption (OTFE).[1]
Table of Contents
161 relations: Adobe Creative Suite, Adobe Inc., Adobe Photoshop, Advanced Encryption Standard, AES instruction set, Affidavit, Alexandria, Virginia, Arbitrary code execution, Ars Technica, Assembly language, Backward compatibility, BBC, BBC News Online, Berlin, Bit, BitLocker, Black Hat Briefings, Block cipher mode of operation, Boing Boing, Booting, Bootloader, Bruce Schneier, Bus mastering, C (programming language), C++, Child pornography, Cipher, Cold boot attack, Comparison of disk encryption software, Comparison of free and open-source software licenses, Computer forensics, Concordia University, Condé Nast, Cryptanalysis, Cryptographic hash function, Czech Republic, Daniel Dantas (entrepreneur), Data parallelism, Data recovery, Data storage, David Miranda (politician), Democracy Now!, Deniable encryption, Dictionary attack, Digital signature, Direct memory access, Disk encryption, Disk encryption software, Disk encryption theory, Disk partitioning, ... Expand index (111 more) »
- Disk encryption
Adobe Creative Suite
Adobe Creative Suite (CS) is a discontinued software suite of graphic design, video editing, and web development applications developed by Adobe Systems.
See TrueCrypt and Adobe Creative Suite
Adobe Inc.
Adobe Inc., formerly Adobe Systems Incorporated, is an American computer software company based in San Jose, California.
Adobe Photoshop
Adobe Photoshop is a raster graphics editor developed and published by Adobe for Windows and macOS.
See TrueCrypt and Adobe Photoshop
Advanced Encryption Standard
The Advanced Encryption Standard (AES), also known by its original name Rijndael, is a specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology (NIST) in 2001.
See TrueCrypt and Advanced Encryption Standard
AES instruction set
An AES (Advanced Encryption Standard) instruction set is a set of instructions that are specifically designed to perform AES encryption and decryption operations efficiently.
See TrueCrypt and AES instruction set
Affidavit
An italic (Medieval Latin for "he has declared under oath") is a written statement voluntarily made by an affiant or deponent under an oath or affirmation which is administered by a person who is authorized to do so by law.
Alexandria, Virginia
Alexandria is an independent city in the northern region of the Commonwealth of Virginia, United States.
See TrueCrypt and Alexandria, Virginia
Arbitrary code execution
In computer security, arbitrary code execution (ACE) is an attacker's ability to run any commands or code of the attacker's choice on a target machine or in a target process.
See TrueCrypt and Arbitrary code execution
Ars Technica
Ars Technica is a website covering news and opinions in technology, science, politics, and society, created by Ken Fisher and Jon Stokes in 1998.
See TrueCrypt and Ars Technica
Assembly language
In computer programming, assembly language (alternatively assembler language or symbolic machine code), often referred to simply as assembly and commonly abbreviated as ASM or asm, is any low-level programming language with a very strong correspondence between the instructions in the language and the architecture's machine code instructions.
See TrueCrypt and Assembly language
Backward compatibility
In telecommunications and computing, backward compatibility (or backwards compatibility) is a property of an operating system, software, real-world product, or technology that allows for interoperability with an older legacy system, or with input designed for such a system.
See TrueCrypt and Backward compatibility
BBC
The British Broadcasting Corporation (BBC) is a British public service broadcaster headquartered at Broadcasting House in London, England.
BBC News Online
BBC News Online is the website of BBC News, the division of the BBC responsible for newsgathering and production.
See TrueCrypt and BBC News Online
Berlin
Berlin is the capital and largest city of Germany, both by area and by population.
Bit
The bit is the most basic unit of information in computing and digital communication.
BitLocker
BitLocker is a full volume encryption feature included with Microsoft Windows versions starting with Windows Vista. TrueCrypt and BitLocker are cryptographic software and disk encryption.
Black Hat Briefings
Black Hat Briefings (commonly referred to as Black Hat) is a computer security conference that provides security consulting, training, and briefings to hackers, corporations, and government agencies around the world.
See TrueCrypt and Black Hat Briefings
Block cipher mode of operation
In cryptography, a block cipher mode of operation is an algorithm that uses a block cipher to provide information security such as confidentiality or authenticity.
See TrueCrypt and Block cipher mode of operation
Boing Boing
Boing Boing is a website, first established as a zine in 1988, later becoming a group blog.
Booting
In computing, booting is the process of starting a computer as initiated via hardware such as a button on the computer or by a software command.
Bootloader
A bootloader, also spelled as boot loader or called bootstrap loader, is a computer program that is responsible for booting a computer.
Bruce Schneier
Bruce Schneier (born January 15, 1963) is an American cryptographer, computer security professional, privacy specialist, and writer.
See TrueCrypt and Bruce Schneier
Bus mastering
In computing, bus mastering is a feature supported by many bus architectures that enables a device connected to the bus to initiate direct memory access (DMA) transactions.
See TrueCrypt and Bus mastering
C (programming language)
C (pronounced – like the letter c) is a general-purpose programming language. TrueCrypt and c (programming language) are Cross-platform software.
See TrueCrypt and C (programming language)
C++
C++ (pronounced "C plus plus" and sometimes abbreviated as CPP) is a high-level, general-purpose programming language created by Danish computer scientist Bjarne Stroustrup. TrueCrypt and C++ are Cross-platform software.
Child pornography
Child pornography (also called CP, child sexual abuse material, CSAM, child porn, kiddie porn) is erotic material that depicts persons under the designated age of majority.
See TrueCrypt and Child pornography
Cipher
In cryptography, a cipher (or cypher) is an algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as a procedure.
Cold boot attack
In computer security, a cold boot attack (or to a lesser extent, a platform reset attack) is a type of side channel attack in which an attacker with physical access to a computer performs a memory dump of a computer's random-access memory (RAM) by performing a hard reset of the target machine. TrueCrypt and cold boot attack are disk encryption.
See TrueCrypt and Cold boot attack
Comparison of disk encryption software
This is a technical feature comparison of different disk encryption software. TrueCrypt and comparison of disk encryption software are cryptographic software and disk encryption.
See TrueCrypt and Comparison of disk encryption software
Comparison of free and open-source software licenses
This comparison only covers software licenses which have a linked Wikipedia article for details and which are approved by at least one of the following expert groups: the Free Software Foundation, the Open Source Initiative, the Debian Project and the Fedora Project.
See TrueCrypt and Comparison of free and open-source software licenses
Computer forensics
Computer forensics (also known as computer forensic science) is a branch of digital forensic science pertaining to evidence found in computers and digital storage media.
See TrueCrypt and Computer forensics
Concordia University
Concordia University (Université Concordia) is a public English-language research university located in Montreal, Quebec, Canada.
See TrueCrypt and Concordia University
Condé Nast
Condé Nast is a global mass media company founded in 1909 by Condé Montrose Nast (1873–1942) and owned by Advance Publications.
Cryptanalysis
Cryptanalysis (from the Greek kryptós, "hidden", and analýein, "to analyze") refers to the process of analyzing information systems in order to understand hidden aspects of the systems.
See TrueCrypt and Cryptanalysis
Cryptographic hash function
A cryptographic hash function (CHF) is a hash algorithm (a map of an arbitrary binary string to a binary string with a fixed size of n bits) that has special properties desirable for a cryptographic application.
See TrueCrypt and Cryptographic hash function
Czech Republic
The Czech Republic, also known as Czechia, is a landlocked country in Central Europe.
See TrueCrypt and Czech Republic
Daniel Dantas (entrepreneur)
Daniel Valente Dantas is a Brazilian entrepreneur.
See TrueCrypt and Daniel Dantas (entrepreneur)
Data parallelism
Data parallelism is parallelization across multiple processors in parallel computing environments.
See TrueCrypt and Data parallelism
Data recovery
In computing, data recovery is a process of retrieving deleted, inaccessible, lost, corrupted, damaged, or formatted data from secondary storage, removable media or files, when the data stored in them cannot be accessed in a usual way.
See TrueCrypt and Data recovery
Data storage
Data storage is the recording (storing) of information (data) in a storage medium.
See TrueCrypt and Data storage
David Miranda (politician)
David Michael dos Santos Miranda (10 May 1985 – 9 May 2023) was a Brazilian politician.
See TrueCrypt and David Miranda (politician)
Democracy Now!
Democracy Now! is an hour-long TV, radio, and Internet news program based in Manhattan and hosted by journalists Amy Goodman (who also acts as the show's executive producer), Juan González, and Nermeen Shaikh.
See TrueCrypt and Democracy Now!
Deniable encryption
In cryptography and steganography, plausibly deniable encryption describes encryption techniques where the existence of an encrypted file or message is deniable in the sense that an adversary cannot prove that the plaintext data exists.
See TrueCrypt and Deniable encryption
Dictionary attack
In cryptanalysis and computer security, a dictionary attack is an attack using a restricted subset of a keyspace to defeat a cipher or authentication mechanism by trying to determine its decryption key or passphrase, sometimes trying thousands or millions of likely possibilities often obtained from lists of past security breaches.
See TrueCrypt and Dictionary attack
Digital signature
A digital signature is a mathematical scheme for verifying the authenticity of digital messages or documents.
See TrueCrypt and Digital signature
Direct memory access
Direct memory access (DMA) is a feature of computer systems that allows certain hardware subsystems to access main system memory independently of the central processing unit (CPU).
See TrueCrypt and Direct memory access
Disk encryption
Disk encryption is a technology which protects information by converting it into code that cannot be deciphered easily by unauthorized people or processes.
See TrueCrypt and Disk encryption
Disk encryption software
Disk encryption software is a computer security software that protects the confidentiality of data stored on computer media (e.g., a hard disk, floppy disk, or USB device) by using disk encryption. TrueCrypt and disk encryption software are cryptographic software and disk encryption.
See TrueCrypt and Disk encryption software
Disk encryption theory
Disk encryption is a special case of data at rest protection when the storage medium is a sector-addressable device (e.g., a hard disk). TrueCrypt and disk encryption theory are disk encryption.
See TrueCrypt and Disk encryption theory
Disk partitioning
Disk partitioning or disk slicing is the creation of one or more regions on secondary storage, so that each region can be managed separately.
See TrueCrypt and Disk partitioning
Dm-crypt
dm-crypt is a transparent block device encryption subsystem in Linux kernel versions 2.6 and later and in DragonFly BSD. TrueCrypt and dm-crypt are cryptographic software and disk encryption.
Domain name
In the Internet, a domain name is a string that identifies a realm of administrative autonomy, authority or control.
DragonFly BSD
DragonFly BSD is a free and open-source Unix-like operating system forked from FreeBSD 4.8.
See TrueCrypt and DragonFly BSD
E4M
Encryption for the Masses (E4M) is a free disk encryption software for Windows NT and Windows 9x families of operating systems. TrueCrypt and E4M are cryptographic software and disk encryption.
Edward Snowden
Edward Joseph Snowden (born June 21, 1983) is a former American NSA intelligence contractor and a whistleblower who leaked classified documents revealing the existence of global surveillance programs.
See TrueCrypt and Edward Snowden
Evil maid attack
An evil maid attack is an attack on an unattended device, in which an attacker with physical access alters it in some undetectable way so that they can later access the device, or the data on it.
See TrueCrypt and Evil maid attack
Executable
In computer science, executable code, an executable file, or an executable program, sometimes simply referred to as an executable or binary, causes a computer "to perform indicated tasks according to encoded instructions", as opposed to a data file that must be interpreted (parsed) by an interpreter to be functional.
Execution (computing)
Execution in computer and software engineering is the process by which a computer or virtual machine interprets and acts on the instructions of a computer program.
See TrueCrypt and Execution (computing)
Federal Bureau of Investigation
The Federal Bureau of Investigation (FBI) is the domestic intelligence and security service of the United States and its principal federal law enforcement agency.
See TrueCrypt and Federal Bureau of Investigation
FileHippo
FileHippo is a software downloading website that offers computer software for Windows.
FlexNet Publisher
FlexNet Publisher (formerly known as FLEXlm) is a software license manager from Flexera Software which implements license management and is intended to be used in corporate environments to provide floating licenses to multiple end users of computer software.
See TrueCrypt and FlexNet Publisher
Free software
Free software, libre software, libreware or rarely known as freedom-respecting software is computer software distributed under terms that allow users to run the software for any purpose as well as to study, change, and distribute it and any adapted versions.
See TrueCrypt and Free software
Free Software Foundation
The Free Software Foundation (FSF) is a 501(c)(3) non-profit organization founded by Richard Stallman on October 4, 1985, to support the free software movement, with the organization's preference for software being distributed under copyleft ("share alike") terms, such as with its own GNU General Public License.
See TrueCrypt and Free Software Foundation
Free-software license
A free-software license is a notice that grants the recipient of a piece of software extensive rights to modify and redistribute that software.
See TrueCrypt and Free-software license
FreeOTFE
FreeOTFE is a discontinued open source computer program for on-the-fly disk encryption (OTFE). TrueCrypt and FreeOTFE are cryptographic software, disk encryption and Windows security software.
Freeware
Freeware is software, most often proprietary, that is distributed at no monetary cost to the end user.
GitHub
GitHub is a developer platform that allows developers to create, store, manage and share their code. TrueCrypt and GitHub are Cross-platform software.
Glenn Greenwald
Glenn Edward Greenwald (born March 6, 1967) is an American journalist, author, and former lawyer.
See TrueCrypt and Glenn Greenwald
GNU General Public License
The GNU General Public License (GNU GPL or simply GPL) is a series of widely used free software licenses, or copyleft, that guarantee end users the four freedoms to run, study, share, and modify the software.
See TrueCrypt and GNU General Public License
Google Desktop
Google Desktop was a computer program with desktop search capabilities, created by Google for Linux, Apple Mac OS X, and Microsoft Windows systems.
See TrueCrypt and Google Desktop
Guessing
Guessing is the act of drawing a swift conclusion, called a guess, from data directly at hand, which is then held as probable or tentative, while the person making the guess (the guesser) admittedly lacks material for a greater degree of certainty.
Hard disk drive
A hard disk drive (HDD), hard disk, hard drive, or fixed disk is an electro-mechanical data storage device that stores and retrieves digital data using magnetic storage with one or more rigid rapidly rotating platters coated with magnetic material.
See TrueCrypt and Hard disk drive
Hardware keylogger
Hardware keyloggers are used for keystroke logging, a method of capturing and recording computer users' keystrokes, including sensitive passwords.
See TrueCrypt and Hardware keylogger
Hardware Trojan
A Hardware Trojan (HT) is a malicious modification of the circuitry of an integrated circuit.
See TrueCrypt and Hardware Trojan
Heathrow Airport
Heathrow Airport, called London Airport until 1966, is the main international airport serving London, the capital and most populous city of England and the United Kingdom.
See TrueCrypt and Heathrow Airport
HTTP 301
On the World Wide Web, HTTP 301 is the HTTP response status code for 301 Moved Permanently.
Indictment
An indictment is a formal accusation that a person has committed a crime.
Information technology
Information technology (IT) is a set of related fields that encompass computer systems, software, programming languages, and data and information processing, and storage.
See TrueCrypt and Information technology
InfoWorld
InfoWorld (IW) is an American information technology media business.
International Data Group
International Data Group (IDG, Inc.) is a market intelligence and demand generation company focused on the technology industry.
See TrueCrypt and International Data Group
Internet
The Internet (or internet) is the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices.
Itanium
Itanium is a discontinued family of 64-bit Intel microprocessors that implement the Intel Itanium architecture (formerly called IA-64).
J. Alex Halderman
J.
See TrueCrypt and J. Alex Halderman
John Doe
John Doe (male) and Jane Doe (female) are multiple-use placeholder names that are used in the United States when the true name of a person is unknown or is being intentionally concealed.
Keystroke logging
Keystroke logging, often referred to as keylogging or keyboard capturing, is the action of recording (logging) the keys struck on a keyboard, typically covertly, so that a person using the keyboard is unaware that their actions are being monitored.
See TrueCrypt and Keystroke logging
Lauri Love
Lauri Love (born 14 December 1984, United Kingdom) is a British activist who was previously charged by the United States for his alleged activities with the hacker collective ''Anonymous''.
Linux
Linux is both an open-source Unix-like kernel and a generic name for a family of open-source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991, by Linus Torvalds. TrueCrypt and Linux are Cross-platform software.
Linux distribution
A Linux distribution (often abbreviated as distro) is an operating system made from a software collection that includes the Linux kernel and often a package management system.
See TrueCrypt and Linux distribution
MacOS
macOS, originally Mac OS X, previously shortened as OS X, is an operating system developed and marketed by Apple since 2001.
Maeil Business Newspaper
The Maeil Business Newspaper, also simply known as Maekyung (derived from fthe pronunciation of the Korean name) or MK, is a comprehensive daily newspaper published in South Korea, first issued on March 24, 1966.
See TrueCrypt and Maeil Business Newspaper
Magistrates' court (England and Wales)
In England and Wales, a magistrates' court is a lower court which hears matters relating to summary offences and some triable either-way matters.
See TrueCrypt and Magistrates' court (England and Wales)
Malware
Malware (a portmanteau of malicious software)Tahir, R. (2018).
Maricopa County Sheriff's Office
The Maricopa County Sheriff's Office (MCSO) is the law enforcement agency that serves Maricopa County, Arizona, and is the largest sheriff's office in Arizona.
See TrueCrypt and Maricopa County Sheriff's Office
Master boot record
A master boot record (MBR) is a type of boot sector in the first few blocks of partitioned computer mass storage devices like fixed disks or removable drives intended for use with IBM PC-compatible systems and beyond.
See TrueCrypt and Master boot record
Matthew D. Green
Matthew Daniel Green (born 1976) is an American cryptographer and security technologist.
See TrueCrypt and Matthew D. Green
Megabyte
The megabyte is a multiple of the unit byte for digital information.
Metropolitan Police
The Metropolitan Police Service (MPS), formerly known as the Metropolitan Police, which is still its common name, serves as the territorial police force responsible for law enforcement and crime prevention within Greater London.
See TrueCrypt and Metropolitan Police
Microsoft Windows
Microsoft Windows is a product line of proprietary graphical operating systems developed and marketed by Microsoft.
See TrueCrypt and Microsoft Windows
Microsoft Word
Microsoft Word is a word processor developed by Microsoft.
See TrueCrypt and Microsoft Word
MorphOS
MorphOS is an AmigaOS-like computer operating system (OS).
Multiple encryption
Multiple encryption is the process of encrypting an already encrypted message one or more times, either using the same or a different algorithm.
See TrueCrypt and Multiple encryption
Multiprocessing
Multiprocessing is the use of two or more central processing units (CPUs) within a single computer system.
See TrueCrypt and Multiprocessing
National Crime Agency
The National Crime Agency (NCA) is a national law enforcement agency in the United Kingdom.
See TrueCrypt and National Crime Agency
NCC Group
NCC Group is an information assurance firm headquartered in Manchester, United Kingdom.
NewsPim
NewsPim or Newspim is a news and media company founded in April, 2003.
Non-disclosure agreement
A non-disclosure agreement (NDA), also known as a confidentiality agreement (CA), confidential disclosure agreement (CDA), proprietary information agreement (PIA), or secrecy agreement (SA), is a legal contract or part of a contract between at least two parties that outlines confidential material, knowledge, or information that the parties wish to share with one another for certain purposes, but wish to restrict access to.
See TrueCrypt and Non-disclosure agreement
OBS Gyeongin TV
OBS Gyeongin TV is a South Korean free-to-air television station covering Gyeonggi Province, Incheon and Seoul.
See TrueCrypt and OBS Gyeongin TV
Online piracy
Online piracy or software piracy is the practice of downloading and distributing copyrighted works digitally without permission, such as music or software.
See TrueCrypt and Online piracy
Open Source Initiative
The Open Source Initiative (OSI) is the steward of the Open Source Definition, the most widely used standard for open-source software.
See TrueCrypt and Open Source Initiative
Open-source license
Open-source licenses are software licenses that allow content to be used, modified, and shared.
See TrueCrypt and Open-source license
Passphrase
A passphrase is a sequence of words or other text used to control access to a computer system, program or data.
Paul Le Roux
Paul Calder Le Roux (born 24 December 1972) is a former programmer, former criminal cartel boss, and informant to the US Drug Enforcement Administration (DEA).
See TrueCrypt and Paul Le Roux
PBKDF2
In cryptography, PBKDF1 and PBKDF2 (Password-Based Key Derivation Function 1 and 2) are key derivation functions with a sliding computational cost, used to reduce vulnerability to brute-force attacks.
Personal property
Personal property is property that is movable.
See TrueCrypt and Personal property
Phoenix New Times
Phoenix New Times is a free digital and print media company based in Phoenix, Arizona.
See TrueCrypt and Phoenix New Times
Pipeline (computing)
In computing, a pipeline, also known as a data pipeline, is a set of data processing elements connected in series, where the output of one element is the input of the next one.
See TrueCrypt and Pipeline (computing)
Plaintext
In cryptography, plaintext usually means unencrypted information pending input into cryptographic algorithms, usually encryption algorithms.
Plausible deniability
Plausible deniability is the ability of people, typically senior officials in a formal or informal chain of command, to deny knowledge of or responsibility for actions committed by or on behalf of members of their organizational hierarchy.
See TrueCrypt and Plausible deniability
Pre-boot authentication
Pre-boot authentication (PBA) or power-on authentication (POA) serves as an extension of the BIOS, UEFI or boot firmware and guarantees a secure, tamper-proof environment external to the operating system as a trusted authentication layer.
See TrueCrypt and Pre-boot authentication
Privilege escalation
Privilege escalation is the act of exploiting a bug, a design flaw, or a configuration oversight in an operating system or software application to gain elevated access to resources that are normally protected from an application or user.
See TrueCrypt and Privilege escalation
Proprietary software
Proprietary software is software that grants its creator, publisher, or other rightsholder or rightsholder partner a legal monopoly by modern copyright and intellectual property law to exclude the recipient from freely sharing the software or modifying it, and—in some cases, as is the case with some patent-encumbered and EULA-bound software—from making use of the software on their own, thereby restricting their freedoms.
See TrueCrypt and Proprietary software
Random-access memory
Random-access memory (RAM) is a form of electronic computer memory that can be read and changed in any order, typically used to store working data and machine code.
See TrueCrypt and Random-access memory
Randomness test
A randomness test (or test for randomness), in data evaluation, is a test used to analyze the distribution of a set of data to see whether it can be described as random (patternless).
See TrueCrypt and Randomness test
Rio de Janeiro
Rio de Janeiro, or simply Rio, is the capital of the state of Rio de Janeiro.
See TrueCrypt and Rio de Janeiro
RIPEMD
RIPEMD (RIPE Message Digest) is a family of cryptographic hash functions developed in 1992 (the original RIPEMD) and 1996 (other variants).
Rootkit
A rootkit is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its software that is not otherwise allowed (for example, to an unauthorized user) and often masks its existence or the existence of other software.
Salt (cryptography)
In cryptography, a salt is random data fed as an additional input to a one-way function that hashes data, a password or passphrase.
See TrueCrypt and Salt (cryptography)
Scramdisk
Scramdisk is a free on-the-fly encryption program for Windows 95, Windows 98, and Windows Me. TrueCrypt and Scramdisk are cryptographic software, disk encryption and Windows security software.
Security hacker
A security hacker is someone who explores methods for breaching defenses and exploiting weaknesses in a computer system or network.
See TrueCrypt and Security hacker
Serpent (cipher)
Serpent is a symmetric key block cipher that was a finalist in the Advanced Encryption Standard (AES) contest, in which it ranked second to Rijndael.
See TrueCrypt and Serpent (cipher)
SHA-2
SHA-2 (Secure Hash Algorithm 2) is a set of cryptographic hash functions designed by the United States National Security Agency (NSA) and first published in 2001.
Simon Phipps (programmer)
Simon Phipps is a computer scientist and web and open source advocate.
See TrueCrypt and Simon Phipps (programmer)
Software license
A software license is a legal instrument governing the use or redistribution of software.
See TrueCrypt and Software license
Source code
In computing, source code, or simply code or source, is a plain text computer program written in a programming language.
Source-available software
Source-available software is software released through a source code distribution model that includes arrangements where the source can be viewed, and in some cases modified, but without necessarily meeting the criteria to be called open-source.
See TrueCrypt and Source-available software
SourceForge
SourceForge is a web service that offers software consumers a centralized online location to control and manage open-source software projects and research business software.
Steve Gibson (computer programmer)
Steven M. Gibson (born March 26, 1955) is an American software engineer, security researcher, and IT security proponent.
See TrueCrypt and Steve Gibson (computer programmer)
Techdirt
Techdirt is an American Internet blog that reports on technology's legal challenges and related business and economic policy issues, in context of the digital revolution.
The Guardian
The Guardian is a British daily newspaper.
See TrueCrypt and The Guardian
Tom's Hardware
Tom's Hardware is an online publication owned by Future plc and focused on technology.
See TrueCrypt and Tom's Hardware
Trademark
A trademark (also written trade mark or trade-mark) is a type of intellectual property consisting of a recognizable sign, design, or expression that identifies a product or service from a particular source and distinguishes it from others.
TrueCrypt
TrueCrypt is a discontinued source-available freeware utility used for on-the-fly encryption (OTFE). TrueCrypt and TrueCrypt are assembly language software, Cross-platform software, cryptographic software, discontinued software, disk encryption, Linux security software, software that uses wxWidgets and Windows security software.
Trusted Platform Module
Trusted Platform Module (TPM) is an international standard for a secure cryptoprocessor, a dedicated microcontroller designed to secure hardware through integrated cryptographic keys. TrueCrypt and Trusted Platform Module are cryptographic software.
See TrueCrypt and Trusted Platform Module
TV Chosun
TV Chosun (stylized in all caps) is a South Korean pay television network and broadcasting company, owned by the Chosun Ilbo-led consortium.
Twofish
In cryptography, Twofish is a symmetric key block cipher with a block size of 128 bits and key sizes up to 256 bits.
United Kingdom
The United Kingdom of Great Britain and Northern Ireland, commonly known as the United Kingdom (UK) or Britain, is a country in Northwestern Europe, off the coast of the continental mainland.
See TrueCrypt and United Kingdom
United States Court of Appeals for the Eleventh Circuit
The United States Court of Appeals for the Eleventh Circuit (in case citations, 11th Cir.) is a federal appellate court over the following U.S. district courts.
See TrueCrypt and United States Court of Appeals for the Eleventh Circuit
United States Department of Justice
The United States Department of Justice (DOJ), also known as the Justice Department, is a federal executive department of the United States government tasked with the enforcement of federal law and administration of justice in the United States.
See TrueCrypt and United States Department of Justice
URL redirection
URL redirection, also called URL forwarding, is a World Wide Web technique for making a web page available under more than one URL address.
See TrueCrypt and URL redirection
Usenet
Usenet, USENET, or, "in full", User's Network, is a worldwide distributed discussion system available on computers.
Utility software
Utility software is a program specifically designed to help manage and tune system or application software.
See TrueCrypt and Utility software
VeraCrypt
VeraCrypt is a free and open-source utility for on-the-fly encryption (OTFE). TrueCrypt and VeraCrypt are Cross-platform software, cryptographic software, disk encryption, Linux security software, software that uses wxWidgets and Windows security software.
Wayback Machine
The Wayback Machine is a digital archive of the World Wide Web founded by the Internet Archive, an American nonprofit organization based in San Francisco, California.
See TrueCrypt and Wayback Machine
Whirlpool (hash function)
In computer science and cryptography, Whirlpool (sometimes styled WHIRLPOOL) is a cryptographic hash function.
See TrueCrypt and Whirlpool (hash function)
Windows Vista
Windows Vista is a major release of the Windows NT operating system developed by Microsoft.
See TrueCrypt and Windows Vista
Wired (magazine)
Wired (stylized in all caps) is a monthly American magazine, published in print and online editions, that focuses on how emerging technologies affect culture, the economy, and politics.
See TrueCrypt and Wired (magazine)
Yonhap News Agency
Yonhap News Agency is a major South Korean news agency.
See TrueCrypt and Yonhap News Agency
2010s global surveillance disclosures
During the 2010s, international media reports revealed new operational details about the Anglophone cryptographic agencies' global surveillance of both foreign and domestic nationals.
See TrueCrypt and 2010s global surveillance disclosures
2018 opinion rigging scandal in South Korea
The 2018 opinion rigging scandal in South Korea is a political scandal that erupted in April 2018 after a group of ardent supporters of the South Korean President Moon Jae-in had been charged with online opinion rigging.
See TrueCrypt and 2018 opinion rigging scandal in South Korea
32-bit computing
In computer architecture, 32-bit computing refers to computer systems with a processor, memory, and other major system components that operate on data in 32-bit units.
See TrueCrypt and 32-bit computing
64-bit computing
In computer architecture, 64-bit integers, memory addresses, or other data units are those that are 64 bits wide.
See TrueCrypt and 64-bit computing
See also
Disk encryption
- BestCrypt
- BitLocker
- Cold boot attack
- Comparison of disk encryption software
- Comparison of encrypted external drives
- Disk encryption
- Disk encryption software
- Disk encryption theory
- Dm-crypt
- E4M
- ECryptfs
- EncFS
- FileVault
- Filesystem-level encryption
- FreeOTFE
- GBDE
- GNU fcrypt
- Geli (software)
- Hardware-based full disk encryption
- IEEE P1619
- In re Boucher
- Key Management Interoperability Protocol
- Linux Unified Key Setup
- List of cryptographic file systems
- Next-Generation Secure Computing Base
- PGPDisk
- Private Disk
- Rclone
- Scramdisk
- Sentry 2020
- TRESOR
- Transparent data encryption
- TrueCrypt
- TrueCrypt version history
- USB flash drive security
- United States v. Fricosu
- VeraCrypt
- Watermarking attack
References
[1] https://en.wikipedia.org/wiki/TrueCrypt
Also known as CipherShed, Realcrypt, Tc-play, Tcplay, TruCrypt, True Crypt, TrueCrypt License.
, Dm-crypt, Domain name, DragonFly BSD, E4M, Edward Snowden, Evil maid attack, Executable, Execution (computing), Federal Bureau of Investigation, FileHippo, FlexNet Publisher, Free software, Free Software Foundation, Free-software license, FreeOTFE, Freeware, GitHub, Glenn Greenwald, GNU General Public License, Google Desktop, Guessing, Hard disk drive, Hardware keylogger, Hardware Trojan, Heathrow Airport, HTTP 301, Indictment, Information technology, InfoWorld, International Data Group, Internet, Itanium, J. Alex Halderman, John Doe, Keystroke logging, Lauri Love, Linux, Linux distribution, MacOS, Maeil Business Newspaper, Magistrates' court (England and Wales), Malware, Maricopa County Sheriff's Office, Master boot record, Matthew D. Green, Megabyte, Metropolitan Police, Microsoft Windows, Microsoft Word, MorphOS, Multiple encryption, Multiprocessing, National Crime Agency, NCC Group, NewsPim, Non-disclosure agreement, OBS Gyeongin TV, Online piracy, Open Source Initiative, Open-source license, Passphrase, Paul Le Roux, PBKDF2, Personal property, Phoenix New Times, Pipeline (computing), Plaintext, Plausible deniability, Pre-boot authentication, Privilege escalation, Proprietary software, Random-access memory, Randomness test, Rio de Janeiro, RIPEMD, Rootkit, Salt (cryptography), Scramdisk, Security hacker, Serpent (cipher), SHA-2, Simon Phipps (programmer), Software license, Source code, Source-available software, SourceForge, Steve Gibson (computer programmer), Techdirt, The Guardian, Tom's Hardware, Trademark, TrueCrypt, Trusted Platform Module, TV Chosun, Twofish, United Kingdom, United States Court of Appeals for the Eleventh Circuit, United States Department of Justice, URL redirection, Usenet, Utility software, VeraCrypt, Wayback Machine, Whirlpool (hash function), Windows Vista, Wired (magazine), Yonhap News Agency, 2010s global surveillance disclosures, 2018 opinion rigging scandal in South Korea, 32-bit computing, 64-bit computing.