While technologies such as Tor and SSL/TLS protect the confidentiality of your data as it passes through computer networks (especially the Internet), they do not offer protection of the files you have stored, such as on internal and external hard drives. This article will explain how TrueCrypt works and how you can utilize it on the two most popular operating systems, Microsoft Windows and Linux. Now we will look at TrueCrypt, perhaps the most popular solution for encrypting data at rest. ![]() ![]() This blog has already covered SSH, RetroShare, and the Tor network as options for securing data in transit. Help is not far off: one of the most effective ways to foil surveillance is by using encryption to make your data unreadable by other parties.ĭata can be encrypted in two states – when it is in transmission through a communications network, or when it is at rest (i.e., stored on some sort of storage medium, such as a computer hard drive like the internal drive of your PC or an external USB flash drive). More and more Internet users are looking for solutions to keep their files, emails, and Web searches private. The home page of the next incarnation of TrueCrypt is TrueCrypt.ch.Īfter numerous revelations this year of the National Security Agency’s ( NSA) frightening capabilities of mass spying on phone calls and Internet traffic (see, for example, PRISM), there has been a renewed interest in online privacy and the securing of our electronic data communications, such as Web and email activity. ![]() Update: the TrueCrypt project unexpectedly shut down on. ![]() Update 2: TrueCrypt audit results released (PDF)
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |