![]() ![]() Or for 32-bit: /sbin/init: ELF 32-bit LSB shared object If you are unsure run: file /sbin/initĪnd the beginning of the output will be (for 64-bit) something like: /sbin/init: ELF 64-bit LSB shared object There are 32 and 64 bit versions available, so choose the correct one depending on your system. We’ll be installing the “console-only” version of TrueCrypt for Linux. At the time of writing, you can choose between the following when creating a new encrypted volume: TrueCrypt provides many different encryption methods. A foundation has been set up to fully audit it: (here) and Xavier de Carné de Carnavalet claims to have compiled the source against the binaries and found a perfect match (here). However, it’s very unlikely: it has gotten a lot of attention recently, and no one has found anything yet. As TrueCrypt is open source, it seems unlikely that it would be able to include a backdoor, and yet with backdoors being found left, right, and centre, there is of course the possibility that there are backdoors in TrueCrypt too. Reading the official documentation of TrueCrypt gives the impression that the author is highly paranoid, which is a positive trait when it comes to security. TrueCrypt allows you to encrypt files in virtual volumes, and even create ‘hidden’ volumes, so in the case that you are forced to reveal your password, you can still maintain the security of your data. If you’re worried about the recent NSA scandals and want to maintain some privacy, or simply want to keep your data safe and secure, then the free and open source TrueCrypt is an ideal option. What is TrueCrypt and is it really secure? The TrueCrypt website has instructions on how to migrate away from their tool. Using TrueCrypt is not secure as it may contain unfixed security issues. Warning: TrueCrypt is no longer maintained.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |