en.unionpedia.org

TrueCrypt, the Glossary

Index TrueCrypt

TrueCrypt is a discontinued source-available freeware utility used for on-the-fly encryption (OTFE).[1]

Table of Contents

  1. 161 relations: Adobe Creative Suite, Adobe Inc., Adobe Photoshop, Advanced Encryption Standard, AES instruction set, Affidavit, Alexandria, Virginia, Arbitrary code execution, Ars Technica, Assembly language, Backward compatibility, BBC, BBC News Online, Berlin, Bit, BitLocker, Black Hat Briefings, Block cipher mode of operation, Boing Boing, Booting, Bootloader, Bruce Schneier, Bus mastering, C (programming language), C++, Child pornography, Cipher, Cold boot attack, Comparison of disk encryption software, Comparison of free and open-source software licenses, Computer forensics, Concordia University, Condé Nast, Cryptanalysis, Cryptographic hash function, Czech Republic, Daniel Dantas (entrepreneur), Data parallelism, Data recovery, Data storage, David Miranda (politician), Democracy Now!, Deniable encryption, Dictionary attack, Digital signature, Direct memory access, Disk encryption, Disk encryption software, Disk encryption theory, Disk partitioning, ... Expand index (111 more) »

  2. Disk encryption

Adobe Creative Suite

Adobe Creative Suite (CS) is a discontinued software suite of graphic design, video editing, and web development applications developed by Adobe Systems.

See TrueCrypt and Adobe Creative Suite

Adobe Inc.

Adobe Inc., formerly Adobe Systems Incorporated, is an American computer software company based in San Jose, California.

See TrueCrypt and Adobe Inc.

Adobe Photoshop

Adobe Photoshop is a raster graphics editor developed and published by Adobe for Windows and macOS.

See TrueCrypt and Adobe Photoshop

Advanced Encryption Standard

The Advanced Encryption Standard (AES), also known by its original name Rijndael, is a specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology (NIST) in 2001.

See TrueCrypt and Advanced Encryption Standard

AES instruction set

An AES (Advanced Encryption Standard) instruction set is a set of instructions that are specifically designed to perform AES encryption and decryption operations efficiently.

See TrueCrypt and AES instruction set

Affidavit

An italic (Medieval Latin for "he has declared under oath") is a written statement voluntarily made by an affiant or deponent under an oath or affirmation which is administered by a person who is authorized to do so by law.

See TrueCrypt and Affidavit

Alexandria, Virginia

Alexandria is an independent city in the northern region of the Commonwealth of Virginia, United States.

See TrueCrypt and Alexandria, Virginia

Arbitrary code execution

In computer security, arbitrary code execution (ACE) is an attacker's ability to run any commands or code of the attacker's choice on a target machine or in a target process.

See TrueCrypt and Arbitrary code execution

Ars Technica

Ars Technica is a website covering news and opinions in technology, science, politics, and society, created by Ken Fisher and Jon Stokes in 1998.

See TrueCrypt and Ars Technica

Assembly language

In computer programming, assembly language (alternatively assembler language or symbolic machine code), often referred to simply as assembly and commonly abbreviated as ASM or asm, is any low-level programming language with a very strong correspondence between the instructions in the language and the architecture's machine code instructions.

See TrueCrypt and Assembly language

Backward compatibility

In telecommunications and computing, backward compatibility (or backwards compatibility) is a property of an operating system, software, real-world product, or technology that allows for interoperability with an older legacy system, or with input designed for such a system.

See TrueCrypt and Backward compatibility

BBC

The British Broadcasting Corporation (BBC) is a British public service broadcaster headquartered at Broadcasting House in London, England.

See TrueCrypt and BBC

BBC News Online

BBC News Online is the website of BBC News, the division of the BBC responsible for newsgathering and production.

See TrueCrypt and BBC News Online

Berlin

Berlin is the capital and largest city of Germany, both by area and by population.

See TrueCrypt and Berlin

Bit

The bit is the most basic unit of information in computing and digital communication.

See TrueCrypt and Bit

BitLocker

BitLocker is a full volume encryption feature included with Microsoft Windows versions starting with Windows Vista. TrueCrypt and BitLocker are cryptographic software and disk encryption.

See TrueCrypt and BitLocker

Black Hat Briefings

Black Hat Briefings (commonly referred to as Black Hat) is a computer security conference that provides security consulting, training, and briefings to hackers, corporations, and government agencies around the world.

See TrueCrypt and Black Hat Briefings

Block cipher mode of operation

In cryptography, a block cipher mode of operation is an algorithm that uses a block cipher to provide information security such as confidentiality or authenticity.

See TrueCrypt and Block cipher mode of operation

Boing Boing

Boing Boing is a website, first established as a zine in 1988, later becoming a group blog.

See TrueCrypt and Boing Boing

Booting

In computing, booting is the process of starting a computer as initiated via hardware such as a button on the computer or by a software command.

See TrueCrypt and Booting

Bootloader

A bootloader, also spelled as boot loader or called bootstrap loader, is a computer program that is responsible for booting a computer.

See TrueCrypt and Bootloader

Bruce Schneier

Bruce Schneier (born January 15, 1963) is an American cryptographer, computer security professional, privacy specialist, and writer.

See TrueCrypt and Bruce Schneier

Bus mastering

In computing, bus mastering is a feature supported by many bus architectures that enables a device connected to the bus to initiate direct memory access (DMA) transactions.

See TrueCrypt and Bus mastering

C (programming language)

C (pronounced – like the letter c) is a general-purpose programming language. TrueCrypt and c (programming language) are Cross-platform software.

See TrueCrypt and C (programming language)

C++

C++ (pronounced "C plus plus" and sometimes abbreviated as CPP) is a high-level, general-purpose programming language created by Danish computer scientist Bjarne Stroustrup. TrueCrypt and C++ are Cross-platform software.

See TrueCrypt and C++

Child pornography

Child pornography (also called CP, child sexual abuse material, CSAM, child porn, kiddie porn) is erotic material that depicts persons under the designated age of majority.

See TrueCrypt and Child pornography

Cipher

In cryptography, a cipher (or cypher) is an algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as a procedure.

See TrueCrypt and Cipher

Cold boot attack

In computer security, a cold boot attack (or to a lesser extent, a platform reset attack) is a type of side channel attack in which an attacker with physical access to a computer performs a memory dump of a computer's random-access memory (RAM) by performing a hard reset of the target machine. TrueCrypt and cold boot attack are disk encryption.

See TrueCrypt and Cold boot attack

Comparison of disk encryption software

This is a technical feature comparison of different disk encryption software. TrueCrypt and comparison of disk encryption software are cryptographic software and disk encryption.

See TrueCrypt and Comparison of disk encryption software

Comparison of free and open-source software licenses

This comparison only covers software licenses which have a linked Wikipedia article for details and which are approved by at least one of the following expert groups: the Free Software Foundation, the Open Source Initiative, the Debian Project and the Fedora Project.

See TrueCrypt and Comparison of free and open-source software licenses

Computer forensics

Computer forensics (also known as computer forensic science) is a branch of digital forensic science pertaining to evidence found in computers and digital storage media.

See TrueCrypt and Computer forensics

Concordia University

Concordia University (Université Concordia) is a public English-language research university located in Montreal, Quebec, Canada.

See TrueCrypt and Concordia University

Condé Nast

Condé Nast is a global mass media company founded in 1909 by Condé Montrose Nast (1873–1942) and owned by Advance Publications.

See TrueCrypt and Condé Nast

Cryptanalysis

Cryptanalysis (from the Greek kryptós, "hidden", and analýein, "to analyze") refers to the process of analyzing information systems in order to understand hidden aspects of the systems.

See TrueCrypt and Cryptanalysis

Cryptographic hash function

A cryptographic hash function (CHF) is a hash algorithm (a map of an arbitrary binary string to a binary string with a fixed size of n bits) that has special properties desirable for a cryptographic application.

See TrueCrypt and Cryptographic hash function

Czech Republic

The Czech Republic, also known as Czechia, is a landlocked country in Central Europe.

See TrueCrypt and Czech Republic

Daniel Dantas (entrepreneur)

Daniel Valente Dantas is a Brazilian entrepreneur.

See TrueCrypt and Daniel Dantas (entrepreneur)

Data parallelism

Data parallelism is parallelization across multiple processors in parallel computing environments.

See TrueCrypt and Data parallelism

Data recovery

In computing, data recovery is a process of retrieving deleted, inaccessible, lost, corrupted, damaged, or formatted data from secondary storage, removable media or files, when the data stored in them cannot be accessed in a usual way.

See TrueCrypt and Data recovery

Data storage

Data storage is the recording (storing) of information (data) in a storage medium.

See TrueCrypt and Data storage

David Miranda (politician)

David Michael dos Santos Miranda (10 May 1985 – 9 May 2023) was a Brazilian politician.

See TrueCrypt and David Miranda (politician)

Democracy Now!

Democracy Now! is an hour-long TV, radio, and Internet news program based in Manhattan and hosted by journalists Amy Goodman (who also acts as the show's executive producer), Juan González, and Nermeen Shaikh.

See TrueCrypt and Democracy Now!

Deniable encryption

In cryptography and steganography, plausibly deniable encryption describes encryption techniques where the existence of an encrypted file or message is deniable in the sense that an adversary cannot prove that the plaintext data exists.

See TrueCrypt and Deniable encryption

Dictionary attack

In cryptanalysis and computer security, a dictionary attack is an attack using a restricted subset of a keyspace to defeat a cipher or authentication mechanism by trying to determine its decryption key or passphrase, sometimes trying thousands or millions of likely possibilities often obtained from lists of past security breaches.

See TrueCrypt and Dictionary attack

Digital signature

A digital signature is a mathematical scheme for verifying the authenticity of digital messages or documents.

See TrueCrypt and Digital signature

Direct memory access

Direct memory access (DMA) is a feature of computer systems that allows certain hardware subsystems to access main system memory independently of the central processing unit (CPU).

See TrueCrypt and Direct memory access

Disk encryption

Disk encryption is a technology which protects information by converting it into code that cannot be deciphered easily by unauthorized people or processes.

See TrueCrypt and Disk encryption

Disk encryption software

Disk encryption software is a computer security software that protects the confidentiality of data stored on computer media (e.g., a hard disk, floppy disk, or USB device) by using disk encryption. TrueCrypt and disk encryption software are cryptographic software and disk encryption.

See TrueCrypt and Disk encryption software

Disk encryption theory

Disk encryption is a special case of data at rest protection when the storage medium is a sector-addressable device (e.g., a hard disk). TrueCrypt and disk encryption theory are disk encryption.

See TrueCrypt and Disk encryption theory

Disk partitioning

Disk partitioning or disk slicing is the creation of one or more regions on secondary storage, so that each region can be managed separately.

See TrueCrypt and Disk partitioning

Dm-crypt

dm-crypt is a transparent block device encryption subsystem in Linux kernel versions 2.6 and later and in DragonFly BSD. TrueCrypt and dm-crypt are cryptographic software and disk encryption.

See TrueCrypt and Dm-crypt

Domain name

In the Internet, a domain name is a string that identifies a realm of administrative autonomy, authority or control.

See TrueCrypt and Domain name

DragonFly BSD

DragonFly BSD is a free and open-source Unix-like operating system forked from FreeBSD 4.8.

See TrueCrypt and DragonFly BSD

E4M

Encryption for the Masses (E4M) is a free disk encryption software for Windows NT and Windows 9x families of operating systems. TrueCrypt and E4M are cryptographic software and disk encryption.

See TrueCrypt and E4M

Edward Snowden

Edward Joseph Snowden (born June 21, 1983) is a former American NSA intelligence contractor and a whistleblower who leaked classified documents revealing the existence of global surveillance programs.

See TrueCrypt and Edward Snowden

Evil maid attack

An evil maid attack is an attack on an unattended device, in which an attacker with physical access alters it in some undetectable way so that they can later access the device, or the data on it.

See TrueCrypt and Evil maid attack

Executable

In computer science, executable code, an executable file, or an executable program, sometimes simply referred to as an executable or binary, causes a computer "to perform indicated tasks according to encoded instructions", as opposed to a data file that must be interpreted (parsed) by an interpreter to be functional.

See TrueCrypt and Executable

Execution (computing)

Execution in computer and software engineering is the process by which a computer or virtual machine interprets and acts on the instructions of a computer program.

See TrueCrypt and Execution (computing)

Federal Bureau of Investigation

The Federal Bureau of Investigation (FBI) is the domestic intelligence and security service of the United States and its principal federal law enforcement agency.

See TrueCrypt and Federal Bureau of Investigation

FileHippo

FileHippo is a software downloading website that offers computer software for Windows.

See TrueCrypt and FileHippo

FlexNet Publisher

FlexNet Publisher (formerly known as FLEXlm) is a software license manager from Flexera Software which implements license management and is intended to be used in corporate environments to provide floating licenses to multiple end users of computer software.

See TrueCrypt and FlexNet Publisher

Free software

Free software, libre software, libreware or rarely known as freedom-respecting software is computer software distributed under terms that allow users to run the software for any purpose as well as to study, change, and distribute it and any adapted versions.

See TrueCrypt and Free software

Free Software Foundation

The Free Software Foundation (FSF) is a 501(c)(3) non-profit organization founded by Richard Stallman on October 4, 1985, to support the free software movement, with the organization's preference for software being distributed under copyleft ("share alike") terms, such as with its own GNU General Public License.

See TrueCrypt and Free Software Foundation

Free-software license

A free-software license is a notice that grants the recipient of a piece of software extensive rights to modify and redistribute that software.

See TrueCrypt and Free-software license

FreeOTFE

FreeOTFE is a discontinued open source computer program for on-the-fly disk encryption (OTFE). TrueCrypt and FreeOTFE are cryptographic software, disk encryption and Windows security software.

See TrueCrypt and FreeOTFE

Freeware

Freeware is software, most often proprietary, that is distributed at no monetary cost to the end user.

See TrueCrypt and Freeware

GitHub

GitHub is a developer platform that allows developers to create, store, manage and share their code. TrueCrypt and GitHub are Cross-platform software.

See TrueCrypt and GitHub

Glenn Greenwald

Glenn Edward Greenwald (born March 6, 1967) is an American journalist, author, and former lawyer.

See TrueCrypt and Glenn Greenwald

GNU General Public License

The GNU General Public License (GNU GPL or simply GPL) is a series of widely used free software licenses, or copyleft, that guarantee end users the four freedoms to run, study, share, and modify the software.

See TrueCrypt and GNU General Public License

Google Desktop

Google Desktop was a computer program with desktop search capabilities, created by Google for Linux, Apple Mac OS X, and Microsoft Windows systems.

See TrueCrypt and Google Desktop

Guessing

Guessing is the act of drawing a swift conclusion, called a guess, from data directly at hand, which is then held as probable or tentative, while the person making the guess (the guesser) admittedly lacks material for a greater degree of certainty.

See TrueCrypt and Guessing

Hard disk drive

A hard disk drive (HDD), hard disk, hard drive, or fixed disk is an electro-mechanical data storage device that stores and retrieves digital data using magnetic storage with one or more rigid rapidly rotating platters coated with magnetic material.

See TrueCrypt and Hard disk drive

Hardware keylogger

Hardware keyloggers are used for keystroke logging, a method of capturing and recording computer users' keystrokes, including sensitive passwords.

See TrueCrypt and Hardware keylogger

Hardware Trojan

A Hardware Trojan (HT) is a malicious modification of the circuitry of an integrated circuit.

See TrueCrypt and Hardware Trojan

Heathrow Airport

Heathrow Airport, called London Airport until 1966, is the main international airport serving London, the capital and most populous city of England and the United Kingdom.

See TrueCrypt and Heathrow Airport

HTTP 301

On the World Wide Web, HTTP 301 is the HTTP response status code for 301 Moved Permanently.

See TrueCrypt and HTTP 301

Indictment

An indictment is a formal accusation that a person has committed a crime.

See TrueCrypt and Indictment

Information technology

Information technology (IT) is a set of related fields that encompass computer systems, software, programming languages, and data and information processing, and storage.

See TrueCrypt and Information technology

InfoWorld

InfoWorld (IW) is an American information technology media business.

See TrueCrypt and InfoWorld

International Data Group

International Data Group (IDG, Inc.) is a market intelligence and demand generation company focused on the technology industry.

See TrueCrypt and International Data Group

Internet

The Internet (or internet) is the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices.

See TrueCrypt and Internet

Itanium

Itanium is a discontinued family of 64-bit Intel microprocessors that implement the Intel Itanium architecture (formerly called IA-64).

See TrueCrypt and Itanium

J. Alex Halderman

J.

See TrueCrypt and J. Alex Halderman

John Doe

John Doe (male) and Jane Doe (female) are multiple-use placeholder names that are used in the United States when the true name of a person is unknown or is being intentionally concealed.

See TrueCrypt and John Doe

Keystroke logging

Keystroke logging, often referred to as keylogging or keyboard capturing, is the action of recording (logging) the keys struck on a keyboard, typically covertly, so that a person using the keyboard is unaware that their actions are being monitored.

See TrueCrypt and Keystroke logging

Lauri Love

Lauri Love (born 14 December 1984, United Kingdom) is a British activist who was previously charged by the United States for his alleged activities with the hacker collective ''Anonymous''.

See TrueCrypt and Lauri Love

Linux

Linux is both an open-source Unix-like kernel and a generic name for a family of open-source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991, by Linus Torvalds. TrueCrypt and Linux are Cross-platform software.

See TrueCrypt and Linux

Linux distribution

A Linux distribution (often abbreviated as distro) is an operating system made from a software collection that includes the Linux kernel and often a package management system.

See TrueCrypt and Linux distribution

MacOS

macOS, originally Mac OS X, previously shortened as OS X, is an operating system developed and marketed by Apple since 2001.

See TrueCrypt and MacOS

Maeil Business Newspaper

The Maeil Business Newspaper, also simply known as Maekyung (derived from fthe pronunciation of the Korean name) or MK, is a comprehensive daily newspaper published in South Korea, first issued on March 24, 1966.

See TrueCrypt and Maeil Business Newspaper

Magistrates' court (England and Wales)

In England and Wales, a magistrates' court is a lower court which hears matters relating to summary offences and some triable either-way matters.

See TrueCrypt and Magistrates' court (England and Wales)

Malware

Malware (a portmanteau of malicious software)Tahir, R. (2018).

See TrueCrypt and Malware

Maricopa County Sheriff's Office

The Maricopa County Sheriff's Office (MCSO) is the law enforcement agency that serves Maricopa County, Arizona, and is the largest sheriff's office in Arizona.

See TrueCrypt and Maricopa County Sheriff's Office

Master boot record

A master boot record (MBR) is a type of boot sector in the first few blocks of partitioned computer mass storage devices like fixed disks or removable drives intended for use with IBM PC-compatible systems and beyond.

See TrueCrypt and Master boot record

Matthew D. Green

Matthew Daniel Green (born 1976) is an American cryptographer and security technologist.

See TrueCrypt and Matthew D. Green

Megabyte

The megabyte is a multiple of the unit byte for digital information.

See TrueCrypt and Megabyte

Metropolitan Police

The Metropolitan Police Service (MPS), formerly known as the Metropolitan Police, which is still its common name, serves as the territorial police force responsible for law enforcement and crime prevention within Greater London.

See TrueCrypt and Metropolitan Police

Microsoft Windows

Microsoft Windows is a product line of proprietary graphical operating systems developed and marketed by Microsoft.

See TrueCrypt and Microsoft Windows

Microsoft Word

Microsoft Word is a word processor developed by Microsoft.

See TrueCrypt and Microsoft Word

MorphOS

MorphOS is an AmigaOS-like computer operating system (OS).

See TrueCrypt and MorphOS

Multiple encryption

Multiple encryption is the process of encrypting an already encrypted message one or more times, either using the same or a different algorithm.

See TrueCrypt and Multiple encryption

Multiprocessing

Multiprocessing is the use of two or more central processing units (CPUs) within a single computer system.

See TrueCrypt and Multiprocessing

National Crime Agency

The National Crime Agency (NCA) is a national law enforcement agency in the United Kingdom.

See TrueCrypt and National Crime Agency

NCC Group

NCC Group is an information assurance firm headquartered in Manchester, United Kingdom.

See TrueCrypt and NCC Group

NewsPim

NewsPim or Newspim is a news and media company founded in April, 2003.

See TrueCrypt and NewsPim

Non-disclosure agreement

A non-disclosure agreement (NDA), also known as a confidentiality agreement (CA), confidential disclosure agreement (CDA), proprietary information agreement (PIA), or secrecy agreement (SA), is a legal contract or part of a contract between at least two parties that outlines confidential material, knowledge, or information that the parties wish to share with one another for certain purposes, but wish to restrict access to.

See TrueCrypt and Non-disclosure agreement

OBS Gyeongin TV

OBS Gyeongin TV is a South Korean free-to-air television station covering Gyeonggi Province, Incheon and Seoul.

See TrueCrypt and OBS Gyeongin TV

Online piracy

Online piracy or software piracy is the practice of downloading and distributing copyrighted works digitally without permission, such as music or software.

See TrueCrypt and Online piracy

Open Source Initiative

The Open Source Initiative (OSI) is the steward of the Open Source Definition, the most widely used standard for open-source software.

See TrueCrypt and Open Source Initiative

Open-source license

Open-source licenses are software licenses that allow content to be used, modified, and shared.

See TrueCrypt and Open-source license

Passphrase

A passphrase is a sequence of words or other text used to control access to a computer system, program or data.

See TrueCrypt and Passphrase

Paul Le Roux

Paul Calder Le Roux (born 24 December 1972) is a former programmer, former criminal cartel boss, and informant to the US Drug Enforcement Administration (DEA).

See TrueCrypt and Paul Le Roux

PBKDF2

In cryptography, PBKDF1 and PBKDF2 (Password-Based Key Derivation Function 1 and 2) are key derivation functions with a sliding computational cost, used to reduce vulnerability to brute-force attacks.

See TrueCrypt and PBKDF2

Personal property

Personal property is property that is movable.

See TrueCrypt and Personal property

Phoenix New Times

Phoenix New Times is a free digital and print media company based in Phoenix, Arizona.

See TrueCrypt and Phoenix New Times

Pipeline (computing)

In computing, a pipeline, also known as a data pipeline, is a set of data processing elements connected in series, where the output of one element is the input of the next one.

See TrueCrypt and Pipeline (computing)

Plaintext

In cryptography, plaintext usually means unencrypted information pending input into cryptographic algorithms, usually encryption algorithms.

See TrueCrypt and Plaintext

Plausible deniability

Plausible deniability is the ability of people, typically senior officials in a formal or informal chain of command, to deny knowledge of or responsibility for actions committed by or on behalf of members of their organizational hierarchy.

See TrueCrypt and Plausible deniability

Pre-boot authentication

Pre-boot authentication (PBA) or power-on authentication (POA) serves as an extension of the BIOS, UEFI or boot firmware and guarantees a secure, tamper-proof environment external to the operating system as a trusted authentication layer.

See TrueCrypt and Pre-boot authentication

Privilege escalation

Privilege escalation is the act of exploiting a bug, a design flaw, or a configuration oversight in an operating system or software application to gain elevated access to resources that are normally protected from an application or user.

See TrueCrypt and Privilege escalation

Proprietary software

Proprietary software is software that grants its creator, publisher, or other rightsholder or rightsholder partner a legal monopoly by modern copyright and intellectual property law to exclude the recipient from freely sharing the software or modifying it, and—in some cases, as is the case with some patent-encumbered and EULA-bound software—from making use of the software on their own, thereby restricting their freedoms.

See TrueCrypt and Proprietary software

Random-access memory

Random-access memory (RAM) is a form of electronic computer memory that can be read and changed in any order, typically used to store working data and machine code.

See TrueCrypt and Random-access memory

Randomness test

A randomness test (or test for randomness), in data evaluation, is a test used to analyze the distribution of a set of data to see whether it can be described as random (patternless).

See TrueCrypt and Randomness test

Rio de Janeiro

Rio de Janeiro, or simply Rio, is the capital of the state of Rio de Janeiro.

See TrueCrypt and Rio de Janeiro

RIPEMD

RIPEMD (RIPE Message Digest) is a family of cryptographic hash functions developed in 1992 (the original RIPEMD) and 1996 (other variants).

See TrueCrypt and RIPEMD

Rootkit

A rootkit is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its software that is not otherwise allowed (for example, to an unauthorized user) and often masks its existence or the existence of other software.

See TrueCrypt and Rootkit

Salt (cryptography)

In cryptography, a salt is random data fed as an additional input to a one-way function that hashes data, a password or passphrase.

See TrueCrypt and Salt (cryptography)

Scramdisk

Scramdisk is a free on-the-fly encryption program for Windows 95, Windows 98, and Windows Me. TrueCrypt and Scramdisk are cryptographic software, disk encryption and Windows security software.

See TrueCrypt and Scramdisk

Security hacker

A security hacker is someone who explores methods for breaching defenses and exploiting weaknesses in a computer system or network.

See TrueCrypt and Security hacker

Serpent (cipher)

Serpent is a symmetric key block cipher that was a finalist in the Advanced Encryption Standard (AES) contest, in which it ranked second to Rijndael.

See TrueCrypt and Serpent (cipher)

SHA-2

SHA-2 (Secure Hash Algorithm 2) is a set of cryptographic hash functions designed by the United States National Security Agency (NSA) and first published in 2001.

See TrueCrypt and SHA-2

Simon Phipps (programmer)

Simon Phipps is a computer scientist and web and open source advocate.

See TrueCrypt and Simon Phipps (programmer)

Software license

A software license is a legal instrument governing the use or redistribution of software.

See TrueCrypt and Software license

Source code

In computing, source code, or simply code or source, is a plain text computer program written in a programming language.

See TrueCrypt and Source code

Source-available software

Source-available software is software released through a source code distribution model that includes arrangements where the source can be viewed, and in some cases modified, but without necessarily meeting the criteria to be called open-source.

See TrueCrypt and Source-available software

SourceForge

SourceForge is a web service that offers software consumers a centralized online location to control and manage open-source software projects and research business software.

See TrueCrypt and SourceForge

Steve Gibson (computer programmer)

Steven M. Gibson (born March 26, 1955) is an American software engineer, security researcher, and IT security proponent.

See TrueCrypt and Steve Gibson (computer programmer)

Techdirt

Techdirt is an American Internet blog that reports on technology's legal challenges and related business and economic policy issues, in context of the digital revolution.

See TrueCrypt and Techdirt

The Guardian

The Guardian is a British daily newspaper.

See TrueCrypt and The Guardian

Tom's Hardware

Tom's Hardware is an online publication owned by Future plc and focused on technology.

See TrueCrypt and Tom's Hardware

Trademark

A trademark (also written trade mark or trade-mark) is a type of intellectual property consisting of a recognizable sign, design, or expression that identifies a product or service from a particular source and distinguishes it from others.

See TrueCrypt and Trademark

TrueCrypt

TrueCrypt is a discontinued source-available freeware utility used for on-the-fly encryption (OTFE). TrueCrypt and TrueCrypt are assembly language software, Cross-platform software, cryptographic software, discontinued software, disk encryption, Linux security software, software that uses wxWidgets and Windows security software.

See TrueCrypt and TrueCrypt

Trusted Platform Module

Trusted Platform Module (TPM) is an international standard for a secure cryptoprocessor, a dedicated microcontroller designed to secure hardware through integrated cryptographic keys. TrueCrypt and Trusted Platform Module are cryptographic software.

See TrueCrypt and Trusted Platform Module

TV Chosun

TV Chosun (stylized in all caps) is a South Korean pay television network and broadcasting company, owned by the Chosun Ilbo-led consortium.

See TrueCrypt and TV Chosun

Twofish

In cryptography, Twofish is a symmetric key block cipher with a block size of 128 bits and key sizes up to 256 bits.

See TrueCrypt and Twofish

United Kingdom

The United Kingdom of Great Britain and Northern Ireland, commonly known as the United Kingdom (UK) or Britain, is a country in Northwestern Europe, off the coast of the continental mainland.

See TrueCrypt and United Kingdom

United States Court of Appeals for the Eleventh Circuit

The United States Court of Appeals for the Eleventh Circuit (in case citations, 11th Cir.) is a federal appellate court over the following U.S. district courts.

See TrueCrypt and United States Court of Appeals for the Eleventh Circuit

United States Department of Justice

The United States Department of Justice (DOJ), also known as the Justice Department, is a federal executive department of the United States government tasked with the enforcement of federal law and administration of justice in the United States.

See TrueCrypt and United States Department of Justice

URL redirection

URL redirection, also called URL forwarding, is a World Wide Web technique for making a web page available under more than one URL address.

See TrueCrypt and URL redirection

Usenet

Usenet, USENET, or, "in full", User's Network, is a worldwide distributed discussion system available on computers.

See TrueCrypt and Usenet

Utility software

Utility software is a program specifically designed to help manage and tune system or application software.

See TrueCrypt and Utility software

VeraCrypt

VeraCrypt is a free and open-source utility for on-the-fly encryption (OTFE). TrueCrypt and VeraCrypt are Cross-platform software, cryptographic software, disk encryption, Linux security software, software that uses wxWidgets and Windows security software.

See TrueCrypt and VeraCrypt

Wayback Machine

The Wayback Machine is a digital archive of the World Wide Web founded by the Internet Archive, an American nonprofit organization based in San Francisco, California.

See TrueCrypt and Wayback Machine

Whirlpool (hash function)

In computer science and cryptography, Whirlpool (sometimes styled WHIRLPOOL) is a cryptographic hash function.

See TrueCrypt and Whirlpool (hash function)

Windows Vista

Windows Vista is a major release of the Windows NT operating system developed by Microsoft.

See TrueCrypt and Windows Vista

Wired (magazine)

Wired (stylized in all caps) is a monthly American magazine, published in print and online editions, that focuses on how emerging technologies affect culture, the economy, and politics.

See TrueCrypt and Wired (magazine)

Yonhap News Agency

Yonhap News Agency is a major South Korean news agency.

See TrueCrypt and Yonhap News Agency

2010s global surveillance disclosures

During the 2010s, international media reports revealed new operational details about the Anglophone cryptographic agencies' global surveillance of both foreign and domestic nationals.

See TrueCrypt and 2010s global surveillance disclosures

2018 opinion rigging scandal in South Korea

The 2018 opinion rigging scandal in South Korea is a political scandal that erupted in April 2018 after a group of ardent supporters of the South Korean President Moon Jae-in had been charged with online opinion rigging.

See TrueCrypt and 2018 opinion rigging scandal in South Korea

32-bit computing

In computer architecture, 32-bit computing refers to computer systems with a processor, memory, and other major system components that operate on data in 32-bit units.

See TrueCrypt and 32-bit computing

64-bit computing

In computer architecture, 64-bit integers, memory addresses, or other data units are those that are 64 bits wide.

See TrueCrypt and 64-bit computing

See also

Disk encryption

References

[1] https://en.wikipedia.org/wiki/TrueCrypt

Also known as CipherShed, Realcrypt, Tc-play, Tcplay, TruCrypt, True Crypt, TrueCrypt License.

, Dm-crypt, Domain name, DragonFly BSD, E4M, Edward Snowden, Evil maid attack, Executable, Execution (computing), Federal Bureau of Investigation, FileHippo, FlexNet Publisher, Free software, Free Software Foundation, Free-software license, FreeOTFE, Freeware, GitHub, Glenn Greenwald, GNU General Public License, Google Desktop, Guessing, Hard disk drive, Hardware keylogger, Hardware Trojan, Heathrow Airport, HTTP 301, Indictment, Information technology, InfoWorld, International Data Group, Internet, Itanium, J. Alex Halderman, John Doe, Keystroke logging, Lauri Love, Linux, Linux distribution, MacOS, Maeil Business Newspaper, Magistrates' court (England and Wales), Malware, Maricopa County Sheriff's Office, Master boot record, Matthew D. Green, Megabyte, Metropolitan Police, Microsoft Windows, Microsoft Word, MorphOS, Multiple encryption, Multiprocessing, National Crime Agency, NCC Group, NewsPim, Non-disclosure agreement, OBS Gyeongin TV, Online piracy, Open Source Initiative, Open-source license, Passphrase, Paul Le Roux, PBKDF2, Personal property, Phoenix New Times, Pipeline (computing), Plaintext, Plausible deniability, Pre-boot authentication, Privilege escalation, Proprietary software, Random-access memory, Randomness test, Rio de Janeiro, RIPEMD, Rootkit, Salt (cryptography), Scramdisk, Security hacker, Serpent (cipher), SHA-2, Simon Phipps (programmer), Software license, Source code, Source-available software, SourceForge, Steve Gibson (computer programmer), Techdirt, The Guardian, Tom's Hardware, Trademark, TrueCrypt, Trusted Platform Module, TV Chosun, Twofish, United Kingdom, United States Court of Appeals for the Eleventh Circuit, United States Department of Justice, URL redirection, Usenet, Utility software, VeraCrypt, Wayback Machine, Whirlpool (hash function), Windows Vista, Wired (magazine), Yonhap News Agency, 2010s global surveillance disclosures, 2018 opinion rigging scandal in South Korea, 32-bit computing, 64-bit computing.