Part of this is also to do with GDPR compliance. If we wanted to protect the laptop from the NSA, then yes that might be a consideration, but just to protect data against casual theft, I would say that Truecrypt is beyond more than secure and even the NSA may not be able to break Truecrypt encryption. Iterations count as it slows the boot and mount time significantly. The average thief is not going to bother trying to work out how to decrypt an encrypted laptop so its as secure as we need it. The purposes of using Truecrypt for my clients would be whole disk encryption and is more to protect laptops that might get stolen. I don't think its recommended to use Truecrypt on SSD Drives as it does not support Trim which I have never really understood what that does. Is there any value to UEFI considering we want to use Truecrypt and not TPM and Bitlocker which is basically like giving the keys to your house to Microsoft and the NSA. It does not support UEFI (at the moment I am changing to legacy boot as I can't see any benefit to UEFI at all). ![]() However, I have concerns about using Truecrypt as I believe that the following is true: There are some bugs, but not with regards to accessing encrypted data, but more other issues. I am happy to continue to use Truecrypt 7.1a as I trust it and as far as I am aware there are no security flaws with regards to the actual data encryption. I am in the unhappy position of having to upgrade from wonderful Windows 7 to the godawful Windows 10 platform for my clients.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |