7/23/2023 0 Comments Truecrypt hidden volumesIt is critical that you choose a good password, since this is the only thing that will prevent someone else from mounting your volume and getting at your data. You can then choose the size of the volume. The defaults should suffice, but if you are a crypto geek, you can customize the algorithms to use. You'll then be asked to choose encryption and hash algorithms. One password will reveal the normal volume, another password (hopefully longer and more difficult to guess) will reveal the hidden volume with the really good stuff on it. The reason you may want to do this is if you are in a situation where you are forced to reveal the volume password, for example, due to extortion. A hidden volume is a tricky way of actually creating two volumes, with different passwords for the normal and hidden volumes. Your next choice is to either create a Standard TrueCrypt volume, or a Hidden TrueCrypt volume. An encrypted file container, which is a file but will appear as a volume once mounted, offers the benefit of working across platforms, so is your best choice if you want some portability. If you intend on using TrueCrypt on a single platform, and want all contents encrypted, then a volume within a partition/drive is a good choice. The first choice you'll need to make is if you want to create an encrypted file container, or a volume within a partition/drive. This launches the TrueCrypt Volume Creation Wizard. To get started, run the TrueCrypt software and choose Create Volume. TrueCrypt is a cross-platform data encryption solution that is available for Mac OS X, as well as various flavors of Windows and Linux. Apple does offer FileVault, and you can also created an encrypted disk image, but these are not total solutions and are Mac-specific. No matter if your data is on a portable Mac, an external hard drive or a USB drive, once someone gets a hold of your drive, it's a simple matter for the culprit to retrieve your personal data. Data security is one of those things most people don't think of until they lose their data.
0 Comments
Leave a Reply. |