Different modes of operation supported by the software. Note that an encrypted volume can only use one mode of operation.
"Jetico Mission". Jetico. Retrieved 2014-05-30. https://www.jetico.com/about-jetico/mission-story
"Bloombase StoreSafe". Bloombase. Retrieved 2014-11-28. https://www.bloombase.com/products/storesafe
Roland Dowdeswell (2002-10-04). "CryptoGraphic Disk". mailing list announcement. Retrieved 2007-01-14. http://mail-index.netbsd.org/current-users/2002/10/04/0008.html
"Protect guards laptop and desktop data". Archived from the original on March 2, 2005. Retrieved 2008-09-03. https://web.archive.org/web/20050302202315/http://www.infoworld.com/cgi-bin/displayArchive.pl?%2F99%2F25%2Fc05-25.48.htm
Company and product name change to Pointsec "Protect Data Security Inc. changes name to Pointsec Mobile Technologies Inc". Archived from the original on 2004-08-20. Retrieved 2008-09-03. https://web.archive.org/web/20040820174918/http://www.pointsec.com/news/news.asp?newsid=85
"Check Point Completes the Offer for Protect Data with Substantial Acceptance of 87.1 Percent". Archived from the original on 2008-08-20. Retrieved 2008-09-03. https://web.archive.org/web/20080820034450/http://www.checkpoint.com/press/2007/protectdataacquisition011107.html
Niklas Lemcke (2014-12-15). "Pre-Alpha testing started". Retrieved 2014-12-24. https://ciphershed.org/pre-alpha-testing-started/
"TrueCrypt License Version 3.0". TrueCrypt Foundation. 2012-02-07. Retrieved 2014-12-24. https://github.com/CipherShed/CipherShed/blob/master/src/License.txt
Sarah Dean (2004-02-10). "OTFEDB entry". Archived from the original on 2008-12-11. Retrieved 2008-08-10. https://web.archive.org/web/20081211101509/http://otfedb.sdean12.org/cgi-bin/pub_factsheet.cgi?SYSTEM_ID=46
Initial cryptoloop patches for the Linux 2.5 development kernel: "Archived copy". Archived from the original on 2005-01-10. Retrieved 2006-12-24.{{cite web}}: CS1 maint: archived copy as title (link) https://web.archive.org/web/20050110090339/http://www.uwsg.iu.edu/hypermail/linux/kernel/0307.0/0348.html
"Home". cryptomator.org. http://www.cryptomator.org/
"Releases · DavidXanatos/DiskCryptor". GitHub. https://github.com/DavidXanatos/DiskCryptor/releases
dm-crypt was first included in Linux kernel version 2.6.4: https://lwn.net/Articles/75404/ https://lwn.net/Articles/75404/
Clemens Fruhwirth. "LUKS version history". Archived from the original on 2006-12-25. Retrieved 2006-12-24. https://web.archive.org/web/20061225094038/http://luks.endorphin.org/dm-crypt
"archived E4M documentation". Archived from the original on 2000-05-24. https://web.archive.org/web/20000524061402/http://www.e4m.net/news.html
"eCryptfs". Retrieved 2008-04-29. http://ecryptfs.sourceforge.net
Valient Gough (2003). "EncFS - an Encrypted Filesystem". README.md file. Retrieved 2007-01-14. https://github.com/vgough/encfs
"FreeOTFE version history". Archived from the original on 2006-12-07. Retrieved 2006-12-24. https://web.archive.org/web/20061207224351/http://www.freeotfe.org/docs/version_history.htm#version_history
"gbde(4) man page in FreeBSD 4.11". GBDE manual page as it appeared in FreeBSD 4.11. Retrieved 2006-12-24. http://www.freebsd.org/cgi/man.cgi?query=gbde&apropos=0&sektion=4&manpath=FreeBSD+5.0-RELEASE&format=html
"geli(8) man page in FreeBSD 6.0". GELI manual page as it first appeared in FreeBSD 6.0. Retrieved 2006-12-24. http://www.freebsd.org/cgi/man.cgi?query=geli&apropos=0&sektion=0&manpath=FreeBSD+6.0-RELEASE&format=html
Release Notes. GnuPG https://gnupg.org/download/release_notes.html
"gocryptfs changelog on github". GitHub. Retrieved 2018-01-16. https://github.com/rfjakob/gocryptfs#changelog
"as received from FreeOTFE version v5.21 with small changes". GitHub. 2014-06-20. Retrieved 2015-09-14. https://github.com/t-d-k/LibreCrypt/commit/a395620545beff7736427dfc3b508b4f67609396
"McAfee Drive Encryption". product description. McAfee. Retrieved 2019-07-31. https://www.mcafee.com/enterprise/en-us/products/technologies/drive-encryption.html
"PGP 6.0 Freeware released- any int'l links?". Newsgroup: comp.security.pgp. Usenet: 6sh4vm$jbf$1@news.cybercity.dk. Retrieved 2007-01-04. https://groups.google.com/group/comp.security.pgp/msg/da7ee135c5e99044
"Dekart Encryption software timeline". Dekart. http://www.lazybit.com/index.php/a/2007/04/19/dekart_private_disk_timeline
"SafeGuard Easy 4.5 Technical Whitepaper" (PDF). Utimaco. Retrieved 2009-08-10. https://www.sophos.com/sophos/docs/eng/factshts/sophos-safeguard-easy-dsus.pdf
"SafeGuard Enterprise Technical Whitepaper" (PDF). Utimaco. Retrieved 2009-08-10. https://www.sophos.com/sophos/docs/eng/factshts/sophos-safeguard-enterprise-dsus.pdf
Rebranded as ThinkVantage Client Security "ThinkVantage Technologies Deployment Guide" (PDF). Lenovo (FTP). Retrieved 2008-03-05.[dead ftp link] (To view documents see Help:FTP) ftp://ftp.software.ibm.com/pc/pccbbs/thinkcentre_pdf/rr30mst.pdf
"ScramDisk 4 Linux Releases". http://sourceforge.net/project/showfiles.php?group_id=101952&package_id=109447
"Sentry 2020 news". Retrieved 2007-01-02. http://www.softwinter.com/
"OpenBSD 4.2 Changelog". http://www.openbsd.org/plus42.html
"OpenBSD 2.8 Changelog". http://www.openbsd.org/plus28.html
"bwalex/tc-play". GitHub. 2019-08-27. https://github.com/bwalex/tc-play/releases
Last update: 2020-03-02 "bwalex/tc-play". Github. 2023-04-03. https://github.com/bwalex/tc-play
Trend Micro /wiki/Trend_Micro
"Mobile Armor: Your Data.Secure. Everywhere". 4 September 2004. Archived from the original on 4 September 2004. https://web.archive.org/web/20040904085456/http://www.mobilearmor.com/products.html
"TrueCrypt". https://www.truecrypt.org/docs/?s=version-history2
"TrueCrypt License Version 3.1". TrueCrypt Foundation. 2014-05-28. Retrieved 2014-05-29. https://github.com/warewolf/truecrypt/compare/master...7.2#diff-dc5cde275269b574b34b1204b9221cb2L1
"VeraCrypt". https://veracrypt.codeplex.com/SourceControl/list/changesets?page=8
"Apache License 2.0". IDRIX. 2015-06-28. Archived from the original on 2015-07-09. Retrieved 2015-08-08. https://web.archive.org/web/20150709234209/https://veracrypt.codeplex.com/license
"Whole Hard Disk Encryption Software - BestCrypt Volume Encryption - Jetico Inc. Oy". http://www.jetico.com/products/enterprise-data-protection/bestcrypt-volume-encryption
https://github.com/Aorimn/dislocker FUSE driver to read/write Windows BitLocker-ed volumes under Linux / Mac OSX https://github.com/Aorimn/dislocker
https://github.com/Aorimn/dislocker FUSE driver to read/write Windows BitLocker-ed volumes under Linux / Mac OSX https://github.com/Aorimn/dislocker
"Archived copy" (PDF). Archived from the original (PDF) on 2015-09-23. Retrieved 2014-12-14.{{cite web}}: CS1 maint: archived copy as title (link) https://web.archive.org/web/20150923202446/http://www.checkpoint.com/products/full-disk-encryption/DS_FullDisk_Encryption_120614.pdf
https://play.google.com/store/apps/details?id=com.sovworks.edslite Third party app allows to open containers encryptes with AES-256, SHA-512 hash and FAT file system https://play.google.com/store/apps/details?id=com.sovworks.edslite
http://www.truecrypt.org/misc/freebsd Although CipherShed can be built under FreeBSD, it is not recommended to run it because of bugs and instabilities when CipherShed is attempted to be used https://www.truecrypt.org/misc/freebsd
CrossCrypt - Only for the Microsoft Windows XP/2000 operating systems
http://www.freeotfe.org/docs/Main/Linux_volumes.htm FreeOTFE supports cryptoloop, dm-crypt/cryptsetup/dmsetup, and dm-crypt/LUKS volumes http://www.freeotfe.org/docs/Main/Linux_volumes.htm
"Cryptomator - Free Cloud Encryption". http://www.cryptomator.org
http://www.freeotfe.org/docs/Main/Linux_volumes.htm FreeOTFE supports cryptoloop, dm-crypt/cryptsetup/dmsetup, and dm-crypt/LUKS volumes http://www.freeotfe.org/docs/Main/Linux_volumes.htm
http://www.freeotfe.org/docs/Main/Linux_volumes.htm FreeOTFE supports cryptoloop, dm-crypt/cryptsetup/dmsetup, and dm-crypt/LUKS volumes http://www.freeotfe.org/docs/Main/Linux_volumes.htm
"Boxcryptor - Encryption for cloud storage - Window, Mac, Android, iOS". https://www.boxcryptor.com/
"Safe - Protect Your Files". Archived from the original on 2016-04-21. Retrieved 2016-03-29. https://web.archive.org/web/20160421064348/http://www.getsafe.org/
"Safe - Protect Your Files". Archived from the original on 2016-04-21. Retrieved 2016-03-29. https://web.archive.org/web/20160421064348/http://www.getsafe.org/
https://code.google.com/p/libfvde/ libfvde supports reading FileVault2 Drive Encryption (FVDE) encrypted volumes https://code.google.com/p/libfvde/
http://www.freeotfe.org/docs/Main/Linux_volumes.htm Supports Linux volumes http://www.freeotfe.org/docs/Main/Linux_volumes.htm
https://play.google.com/store/apps/details?id=com.nemesis2.luksmanager&hl=en_GB Third party app allows a user to open LibreCrypt compatible LUKS containers https://play.google.com/store/apps/details?id=com.nemesis2.luksmanager&hl=en_GB
https://github.com/t-d-k/LibreCrypt/blob/master/docs/Linux_volumes.md Supports Linux volumes https://github.com/t-d-k/LibreCrypt/blob/master/docs/Linux_volumes.md
"Endpoint Encryption Powered by PGP Technology - Symantec". https://www.broadcom.com/products/cybersecurity
https://play.google.com/store/apps/details?id=com.sovworks.edslite Third party app allows to open containers encryptes with AES-256, SHA-512 hash and FAT file system https://play.google.com/store/apps/details?id=com.sovworks.edslite
http://www.truecrypt.org/misc/freebsd Although TrueCrypt can be built under FreeBSD, it is not recommended to run it because of bugs and instabilities when TrueCrypt is attempted to be used https://www.truecrypt.org/misc/freebsd
https://play.google.com/store/apps/details?id=com.sovworks.eds.android Third party app allows to encrypt and decrypt VeraCrypt containers (only available in the paid version) https://play.google.com/store/apps/details?id=com.sovworks.eds.android
https://apps.apple.com/de/app/disk-decipher/id516538625 Third party app allows to encrypt and decrypt VeraCrypt containers (only available in the paid version) https://apps.apple.com/de/app/disk-decipher/id516538625
http://www.jetico.com/linux/bcrypt-help/c_hiddn.htm Hidden containers description from Jetico (BestCrypt) http://www.jetico.com/linux/bcrypt-help/c_hiddn.htm
Secret-containers and Camouflage files ArchiCrypt Live Description Archived 2011-08-24 at the Wayback Machine http://www.archicrypt-shop.com/ArchiCrypt-Live.htm
Secret-containers and Camouflage files ArchiCrypt Live Description Archived 2011-08-24 at the Wayback Machine http://www.archicrypt-shop.com/ArchiCrypt-Live.htm
Supports "Guest" keys
Secret-containers and Camouflage files ArchiCrypt Live Description Archived 2011-08-24 at the Wayback Machine http://www.archicrypt-shop.com/ArchiCrypt-Live.htm
Using "Archicrypt Card"
Supported by the BestCrypt container format; see BestCrypt SDK
Supported by the BestCrypt Volume Encryption software
With PIN or USB key
BitLocker Drive Encryption: Value Add Extensibility Options http://download.microsoft.com/download/a/f/7/af7777e5-7dcd-4800-8a0a-b18336565f5b/BitLockerExt.doc
"BitLocker Drive Encryption Technical Overview". Microsoft. Archived from the original on 2008-02-24. Retrieved 2008-03-13. https://web.archive.org/web/20080224023214/http://technet2.microsoft.com/windowsserver2008/en/library/ce4d5a2e-59a5-4742-89cc-ef9f5908b4731033.mspx?mfr=true
Recovery keys only.
"BitLocker Drive Encryption Technical Overview". Microsoft. Archived from the original on 2008-02-24. Retrieved 2008-03-13. https://web.archive.org/web/20080224023214/http://technet2.microsoft.com/windowsserver2008/en/library/ce4d5a2e-59a5-4742-89cc-ef9f5908b4731033.mspx?mfr=true
Windows 7 introduces Bitlocker-To-Go which supports NTFS, FAT32 or exFAT, however for hard drive encryption, Windows Vista and later are limited to be installable only on NTFS volumes /wiki/Windows_Vista
BitLocker can be used with a TPM PIN + external USB key for two-factor authentication
Roland C. Dowdeswell, John Ioannidis. "The CryptoGraphic Disk Driver" (PDF). CGD Design Paper. Retrieved 2006-12-24. http://www.imrryr.org/~elric/cgd/cgd.pdf
Federico Biancuzzi (2005-12-21). "Inside NetBSD's CGD". interview with Roland Dowdeswell. ONLamp.com. Archived from the original on 2007-09-29. Retrieved 2006-12-24. https://web.archive.org/web/20070929091538/http://www.onlamp.com/pub/a/bsd/2005/12/21/netbsd_cgd.html?page=1
Roland C. Dowdeswell, John Ioannidis. "The CryptoGraphic Disk Driver" (PDF). CGD Design Paper. Retrieved 2006-12-24. http://www.imrryr.org/~elric/cgd/cgd.pdf
Roland C. Dowdeswell, John Ioannidis. "The CryptoGraphic Disk Driver" (PDF). CGD Design Paper. Retrieved 2006-12-24. http://www.imrryr.org/~elric/cgd/cgd.pdf
"Operating Systems Supported for System Encryption" (PDF). CipherShed Documentation. CipherShed Project. Retrieved 2014-12-27. https://github.com/CipherShed/CipherShed/blob/v0.7.3.0-dev/doc/userdocs/guide/CipherShed-User-Guide-0.7.3.0.pdf
Although each volume encrypted with CipherShed can only have one active master key, it is possible to access its contents through more than one header. Each header can have a different password and/or keyfiles if any (cf. TrueCrypt FAQ: Is there a way for an administrator to reset a volume password or pre-boot authentication password when a user forgets it (or loses a keyfile)?) https://www.truecrypt.org/faq
"Keyfiles". TrueCrypt Documentation. TrueCrypt Foundation. Retrieved 2014-05-28. https://www.truecrypt.org/docs/keyfiles
"Some encryption programs use TPM to prevent attacks. Will TrueCrypt use it too?". TrueCrypt FAQ. TrueCrypt Foundation. Archived from the original on 2013-04-16. Retrieved 2014-05-28. https://archive.today/20130416052646/http://www.truecrypt.org/faq
"Future". TrueCrypt Foundation. Retrieved 2014-05-24.[permanent dead link] https://www.truecrypt.org/future.php
"CryFS: How it works". Retrieved 2016-09-23. https://www.cryfs.org/howitworks
dm-crypt and cryptoloop volumes can be mounted from the initrd before the system is booted /wiki/Initrd
dm-crypt and cryptoloop volumes can be mounted from the initrd before the system is booted /wiki/Initrd
"DiskCryptor Features". Archived from the original on 2010-05-29. Retrieved 2010-05-25. https://web.archive.org/web/20100529120057/http://diskcryptor.net/wiki/Main_Page/en
"DiskCryptor". GitHub. 10 February 2022. https://github.com/DavidXanatos/DiskCryptor
"DiskCryptor Features". Archived from the original on 2010-05-29. Retrieved 2010-05-25. https://web.archive.org/web/20100529120057/http://diskcryptor.net/wiki/Main_Page/en
"DISK Protect Data Sheet" (PDF). Retrieved 2018-12-02. https://www.becrypt.com/uk/uploads/files/Disk%20Protect%20Standard_.pdf
"DISK Protect Data Sheet" (PDF). Retrieved 2018-12-02. https://www.becrypt.com/uk/uploads/files/Disk%20Protect%20Standard_.pdf
dm-crypt and cryptoloop volumes can be mounted from the initrd before the system is booted /wiki/Initrd
"cryptsetup Frequently Asked Questions". Retrieved 2016-01-07. https://gitlab.com/cryptsetup/cryptsetup/wikis/FrequentlyAskedQuestions
An external tool can be used to read the key from the TPM and then have the key passed on to dm-crypt/LUKS via the standard input /wiki/Standard_input
"Multi level access with separate access credentials, each enabling a different set of functional or logical operations". EISST Ltd. Archived from the original on 2007-09-28. Retrieved 2007-07-25. https://web.archive.org/web/20070928145451/http://www.eisst.com/products/private_safe/compare/
"Multi level access with separate access credentials, each enabling a different set of functional or logical operations". EISST Ltd. Archived from the original on 2007-09-28. Retrieved 2007-07-25. https://web.archive.org/web/20070928145451/http://www.eisst.com/products/private_safe/compare/
uses the lower filesystem (stacking)
"Intel Advanced Encryption Standard (AES) Instructions Set - Rev 3". Intel. Retrieved 2012-07-26. http://software.intel.com/en-us/articles/intel-advanced-encryption-standard-aes-instructions-set/
Jacob Appelbaum, Ralf-Philipp Weinmann (2006-12-29). "Unlocking FileVault: An Analysis of Apple's disk encryption" (PDF). Retrieved 2012-01-03. {{cite journal}}: Cite journal requires |journal= (help) https://events.ccc.de/congress/2006/Fahrplan/attachments/1244-23C3VileFault.pdf
Jacob Appelbaum, Ralf-Philipp Weinmann (2006-12-29). "Unlocking FileVault: An Analysis of Apple's disk encryption" (PDF). Retrieved 2012-01-03. {{cite journal}}: Cite journal requires |journal= (help) https://events.ccc.de/congress/2006/Fahrplan/attachments/1244-23C3VileFault.pdf
"Mac OS X 10.7 Lion: the Ars Technica review". Ars Technica. 2011-07-20. Retrieved 2012-01-03. https://arstechnica.com/apple/reviews/2011/07/mac-os-x-10-7.ars/13
FreeOTFE has a modular architecture and set of components to allow 3rd party integration
FreeOTFE allows multiple keys to mount the same container file via encrypted keyfiles
"FreeBSD Handbook: Encrypting Disk Partitions". Retrieved 2006-12-24. http://www.freebsd.org/doc/en_US.ISO8859-1/books/handbook/disks-encrypting.html
Poul-Henning Kamp. "GBDE - GEOM Based Disk Encryption" (PDF). GBDE Design Document. Retrieved 2006-12-24. /wiki/Poul-Henning_Kamp
Poul-Henning Kamp. "GBDE - GEOM Based Disk Encryption" (PDF). GBDE Design Document. Retrieved 2006-12-24. /wiki/Poul-Henning_Kamp
"FreeBSD Handbook: Encrypting Disk Partitions". Retrieved 2006-12-24. http://www.freebsd.org/doc/en_US.ISO8859-1/books/handbook/disks-encrypting.html
"FreeBSD Handbook: Encrypting Disk Partitions". Retrieved 2006-12-24. http://www.freebsd.org/doc/en_US.ISO8859-1/books/handbook/disks-encrypting.html
"geli(8) man page in FreeBSD-current". GELI manual page in current FreeBSD. Retrieved 2006-12-24. http://www.freebsd.org/cgi/man.cgi?query=geli&apropos=0&sektion=0&manpath=FreeBSD+7-current&format=html
"geli(8) man page in FreeBSD-current". GELI manual page in current FreeBSD. Retrieved 2006-12-24. http://www.freebsd.org/cgi/man.cgi?query=geli&apropos=0&sektion=0&manpath=FreeBSD+7-current&format=html
"FreeBSD Handbook: Encrypting Disk Partitions". Retrieved 2006-12-24. http://www.freebsd.org/doc/en_US.ISO8859-1/books/handbook/disks-encrypting.html
Jari Ruusu. "loop-AES README file". Archived from the original on 2023-08-23. Retrieved 2007-04-23. https://web.archive.org/web/20230823163835/https://loop-aes.sourceforge.net/loop-AES.README
Jari Ruusu. "loop-AES README file". Archived from the original on 2023-08-23. Retrieved 2007-04-23. https://web.archive.org/web/20230823163835/https://loop-aes.sourceforge.net/loop-AES.README
Jari Ruusu. "loop-AES README file". Archived from the original on 2023-08-23. Retrieved 2007-04-23. https://web.archive.org/web/20230823163835/https://loop-aes.sourceforge.net/loop-AES.README
Jari Ruusu. "loop-AES README file". Archived from the original on 2023-08-23. Retrieved 2007-04-23. https://web.archive.org/web/20230823163835/https://loop-aes.sourceforge.net/loop-AES.README
Jari Ruusu. "loop-AES README file". Archived from the original on 2023-08-23. Retrieved 2007-04-23. https://web.archive.org/web/20230823163835/https://loop-aes.sourceforge.net/loop-AES.README
Using customization
"Intel Advanced Encryption Standard (AES) Instructions Set - Rev 3". Intel. Retrieved 2012-07-26. http://software.intel.com/en-us/articles/intel-advanced-encryption-standard-aes-instructions-set/
"McAfee Endpoint Encryption" (PDF). McAfee. Archived from the original (PDF) on 2010-12-17. Retrieved 2012-07-26. https://web.archive.org/web/20101217175911/http://mcafee.com/us/resources/data-sheets/ds-endpoint-encryption.pdf
n-Crypt Pro does not use password authentication— biometric/USB dongle authentication only
"PGP Whole Disk Encryption FAQ". PGP Corporation. Archived from the original on 2006-12-24. Retrieved 2006-12-24. https://web.archive.org/web/20061224231228/http://www.pgp.com/products/wholediskencryption/faq.html
PGP private keys are always protected by strengthened passphrases
"Embedded Security: Trusted Platform Module Technology Comes of Age". Utimaco. Archived from the original on 2006-08-23. Retrieved 2008-03-04. https://web.archive.org/web/20060823075648/http://americas.utimaco.com/encryption/TPM-Technology-Comes-Of-Age.html
"Embedded Security: Trusted Platform Module Technology Comes of Age". Utimaco. Archived from the original on 2006-08-23. Retrieved 2008-03-04. https://web.archive.org/web/20060823075648/http://americas.utimaco.com/encryption/TPM-Technology-Comes-Of-Age.html
"ThinkVantage Technologies Deployment Guide" (PDF). Lenovo. Retrieved 2008-03-05. http://download.lenovo.com/ibmdl/pub/pc/pccbbs/thinkcentre_pdf/rr30mst.pdf
For TrueCrypt containers
For TrueCrypt containers
"SecureDoc Product Information". WinMagic Inc. Archived from the original on 2008-03-13. Retrieved 2008-03-05. https://web.archive.org/web/20080313174257/http://www.winmagic.com/solutions/securedoc.html
optional by using -K OpenBSD Manual Pages: vnconfig(8) https://man.openbsd.org/mount_vnd.8#K
"Endpoint Encryption". http://docs.trendmicro.com/en-us/enterprise/endpoint-encryption.aspx
"Solutions for Solid-State Drives (SSD) - Endpoint Encryption". Archived from the original on 2014-11-29. Retrieved 2014-11-17. https://web.archive.org/web/20141129081340/http://esupport.trendmicro.com/solution/en-US/1058686.aspx
"Support for smart card readers - Endpoint Encryption". http://esupport.trendmicro.com/solution/en-US/1059884.aspx
The current situation around TrueCrypt project is controversial. On 28.05.2014 after many years of development and broad usage the open-source (although anonymous) project was suddenly stopped, and all previous official materials and complete (encrypt/decrypt) binaries were withdrawn from its website citing some "unfixed security issues" and Windows XP end of support. The technical information herein is valid only for previous versions of TrueCrypt (v7.1a and some earlier). The latest available version (v7.2) is decrypt only, its authenticity and actual reasons behind the move are unclear, and its usage is not recommended. https://www.zdnet.com/article/truecrypt-quits-inexplicable/ https://www.zdnet.com/article/truecrypt-quits-inexplicable/
"Operating Systems Supported for System Encryption". TrueCrypt Documentation. TrueCrypt Foundation. Archived from the original on 2013-01-08. Retrieved 2014-05-28. https://archive.today/20130108161502/http://www.truecrypt.org/docs/?s=sys-encryption-supported-os
"Keyfiles". TrueCrypt Documentation. TrueCrypt Foundation. Retrieved 2014-05-28. https://www.truecrypt.org/docs/keyfiles
Although each volume encrypted with TrueCrypt can only have one active master key, it is possible to access its contents through more than one header. Each header can have a different password and/or keyfiles if any (cf. TrueCrypt FAQ: Is there a way for an administrator to reset a volume password or pre-boot authentication password when a user forgets it (or loses a keyfile)?) https://www.truecrypt.org/faq
"Some encryption programs use TPM to prevent attacks. Will TrueCrypt use it too?". TrueCrypt FAQ. TrueCrypt Foundation. Archived from the original on 2013-04-16. Retrieved 2014-05-28. https://archive.today/20130416052646/http://www.truecrypt.org/faq
"Future". TrueCrypt Foundation. Retrieved 2014-05-24.[permanent dead link] https://www.truecrypt.org/future.php
"Operating Systems Supported for System Encryption". VeraCrypt Documentation. IDRIX. Retrieved 2017-10-11. https://www.veracrypt.fr/en/Supported%20Systems%20for%20System%20Encryption.html
"Whole Hard Disk Encryption Software - BestCrypt Volume Encryption - Jetico Inc. Oy". Archived from the original on 2009-08-29. Retrieved 2009-09-17. https://web.archive.org/web/20090829172925/http://www.jetico.com/data-protection-encryption-bestcrypt-volume-encryption-enterprise/
Within a VHD http://www.howtogeek.com/193013/how-to-create-an-encrypted-container-file-with-bitlocker-on-windows/ https://www.howtogeek.com/193013/how-to-create-an-encrypted-container-file-with-bitlocker-on-windows/
Roland C. Dowdeswell, John Ioannidis. "The CryptoGraphic Disk Driver" (PDF). CGD Design Paper. Retrieved 2006-12-24. http://www.imrryr.org/~elric/cgd/cgd.pdf
dm-crypt can encrypt a file-based volume when used with the losetup utility included with all major Linux distributions
yes, but the user needs custom scripts: http://www.linuxquestions.org/questions/slackware-14/luks-encryption-swap-and-hibernate-627958/ http://www.linuxquestions.org/questions/slackware-14/luks-encryption-swap-and-hibernate-627958/
Uses proprietary e-Capsule file system not exposed to the OS.
Jacob Appelbaum, Ralf-Philipp Weinmann (2006-12-29). "Unlocking FileVault: An Analysis of Apple's disk encryption" (PDF). Retrieved 2012-01-03. {{cite journal}}: Cite journal requires |journal= (help) https://events.ccc.de/congress/2006/Fahrplan/attachments/1244-23C3VileFault.pdf
not technically part of FileVault, but provided by many versions of Mac OS X; can be enabled independently of FileVault
Jacob Appelbaum, Ralf-Philipp Weinmann (2006-12-29). "Unlocking FileVault: An Analysis of Apple's disk encryption" (PDF). Retrieved 2012-01-03. {{cite journal}}: Cite journal requires |journal= (help) https://events.ccc.de/congress/2006/Fahrplan/attachments/1244-23C3VileFault.pdf
not technically part of FileVault, but provided by many versions of Mac OS X; can be enabled independently of FileVault
http://macmarshal.com/images/Documents/mm_wp_102.pdf[permanent dead link] http://macmarshal.com/images/Documents/mm_wp_102.pdf
"Use FileVault to encrypt the startup disk on your Mac". http://support.apple.com/kb/HT4790?viewlocale=en_US&locale=en_US
"Mac OS X 10.7 Lion: the Ars Technica review". Ars Technica. 2011-07-20. Retrieved 2012-01-03. https://arstechnica.com/apple/reviews/2011/07/mac-os-x-10-7.ars/13
File-based volume encryption is possible when used with mdconfig(8) utility. http://www.freebsd.org/cgi/man.cgi?query=mdconfig&sektion=8
File-based volume encryption is possible when used with mdconfig(8) utility. http://www.freebsd.org/cgi/man.cgi?query=mdconfig&sektion=8
Jari Ruusu. "loop-AES README file". Archived from the original on 2023-08-23. Retrieved 2007-04-23. https://web.archive.org/web/20230823163835/https://loop-aes.sourceforge.net/loop-AES.README
Jari Ruusu. "loop-AES README file". Archived from the original on 2023-08-23. Retrieved 2007-04-23. https://web.archive.org/web/20230823163835/https://loop-aes.sourceforge.net/loop-AES.README
Jari Ruusu. "loop-AES README file". Archived from the original on 2023-08-23. Retrieved 2007-04-23. https://web.archive.org/web/20230823163835/https://loop-aes.sourceforge.net/loop-AES.README
Jari Ruusu. "loop-AES README file". Archived from the original on 2023-08-23. Retrieved 2007-04-23. https://web.archive.org/web/20230823163835/https://loop-aes.sourceforge.net/loop-AES.README
"Control Break International Debuts SafeBoot Version 4.27". September 2004. Archived from the original on 2015-04-02. Retrieved 2015-03-05. https://web.archive.org/web/20150402092906/http://connection.ebscohost.com/c/articles/14197489/control-break-international-debuts-safeboot-version-4-27
http://www.openbsd.org/plus38.html OpenBSD 3.8 change notes http://www.openbsd.org/plus38.html
however, not Windows UEFI-based computers with a GUID partition table (GPT) https://www.truecrypt.org/future
"Operating Systems Supported for System Encryption". TrueCrypt Documentation. TrueCrypt Foundation. Archived from the original on 2013-01-08. Retrieved 2014-05-28. https://archive.today/20130108161502/http://www.truecrypt.org/docs/?s=sys-encryption-supported-os
"Operating Systems Supported for System Encryption". TrueCrypt Documentation. TrueCrypt Foundation. Archived from the original on 2013-01-08. Retrieved 2014-05-28. https://archive.today/20130108161502/http://www.truecrypt.org/docs/?s=sys-encryption-supported-os
LRW_issue /wiki/IEEE_P1619#LRW_issue
Containers created with ArchiCrypt Live version 5 use LRW
"New features in BestCrypt version 8". Jetico. Archived from the original on 2007-02-04. Retrieved 2007-03-02. https://web.archive.org/web/20070204033742/http://www.jetico.com/bc8_web_help/html/03_new_features/01_new_features.htm
"New features in version 2". Jetico. Archived from the original on 2008-09-05. Retrieved 2009-03-01. https://web.archive.org/web/20080905174317/http://www.jetico.com/bcve_web_help/html/01_introduction/04_new_in_version.htm
Niels Fergusson (August 2006). "AES-CBC + Elephant Diffuser: A Disk Encryption Algorithm for Windows Vista" (PDF). Microsoft. Retrieved 2008-02-22. {{cite journal}}: Cite journal requires |journal= (help) http://download.microsoft.com/download/0/2/3/0238acaf-d3bf-4a6d-b3d6-0a0be4bbb36e/BitLockerCipher200608.pdf
Niels Fergusson (August 2006). "AES-CBC + Elephant Diffuser: A Disk Encryption Algorithm for Windows Vista" (PDF). Microsoft. Retrieved 2008-02-22. {{cite journal}}: Cite journal requires |journal= (help) http://download.microsoft.com/download/0/2/3/0238acaf-d3bf-4a6d-b3d6-0a0be4bbb36e/BitLockerCipher200608.pdf
"man 4 cgd in NetBSD-current". NetBSD current manual page on CGD. 2006-03-11. Retrieved 2006-12-24. http://netbsd.gw.com/cgi-bin/man-cgi?cgd+4+NetBSD-current
Containers created with TrueCrypt versions 1.0 through 4.0 use CBC.
Containers created with TrueCrypt versions 4.1 through 4.3a use LRW, and support CBC for opening legacy containers only.
Containers created with CipherShed or TrueCrypt versions 5.0+ use XTS, and support LRW/CBC for opening legacy containers only.
"CIBLE DE SECURITE CRITERES COMMUNS NIVEAU EAL3+" (PDF). https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-Cible-2022_35fr.pdf
Starting with Linux kernel version 2.6.20, CryptoAPI supports the LRW mode: https://lwn.net/Articles/213650/ https://lwn.net/Articles/213650/
"cryptsetup - manage plain dm-crypt and LUKS encrypted volumes". 2018-01-01. Retrieved 2018-05-08. https://man.cx/?page=cryptsetup(8)
Jacob Appelbaum, Ralf-Philipp Weinmann (2006-12-29). "Unlocking FileVault: An Analysis of Apple's disk encryption" (PDF). Retrieved 2012-01-03. {{cite journal}}: Cite journal requires |journal= (help) https://events.ccc.de/congress/2006/Fahrplan/attachments/1244-23C3VileFault.pdf
"OS X Lion: About FileVault 2". Retrieved 2011-01-03. http://support.apple.com/kb/HT4790
Poul-Henning Kamp. "GBDE - GEOM Based Disk Encryption" (PDF). GBDE Design Document. Retrieved 2006-12-24. /wiki/Poul-Henning_Kamp
"Linux/BSD disk encryption comparison". Archived from the original on 2007-06-29. Retrieved 2006-12-24. https://web.archive.org/web/20070629214031/http://mareichelt.de/pub/notmine/linuxbsd-comparison.html
Pawel Jakub Dawidek (2006-06-08). "Data authentication for geli(8) committed to HEAD". Retrieved 2021-11-22. https://docs.freebsd.org/cgi/getmsg.cgi?fetch=326862+0+archive/2006/freebsd-current/20060611.freebsd-current
Jari Ruusu. "loop-AES README file". Archived from the original on 2023-08-23. Retrieved 2007-04-23. https://web.archive.org/web/20230823163835/https://loop-aes.sourceforge.net/loop-AES.README
Jari Ruusu. "loop-AES README file". Archived from the original on 2023-08-23. Retrieved 2007-04-23. https://web.archive.org/web/20230823163835/https://loop-aes.sourceforge.net/loop-AES.README
For Scramdisk containers
For TrueCrypt 4 containers
For TrueCrypt 5 and 6 containers
"'CVS: cvs.openbsd.org: src' - MARC". https://marc.info/?l=openbsd-cvs&m=121302798322835&w=2
Containers created with TrueCrypt versions 1.0 through 4.0 use CBC.
Containers created with TrueCrypt versions 4.1 through 4.3a use LRW, and support CBC for opening legacy containers only.
Containers created with TrueCrypt versions 5.0 or later use XTS, and support LRW/CBC for opening legacy containers only.