Hacker News new | past | comments | ask | show | jobs | submit login

If you want to maintain a better security setup than mentioned in the article above (and for Windows), you can use TrueCrypt[1], which has some nice schemes to protect your data, even if someone forces you to leak out your password. You can even maintain virtual drives that are completely encrypted and can be mounted when needed. Do check it out!

[1]http://www.truecrypt.org




I am wary of truecrypt. It is open source, but the development is not open. It's also "exceedingly difficult to generate binaries from source that match the binaries provided by Truecrypt (due to compiler options, etc.)"[1]

[1]: http://www.privacylover.com/encryption/analysis-is-there-a-b...


TrueCrypt uses only 1000 iterations of SHA-512, which is worse not better. http://www.truecrypt.org/docs/?s=header-key-derivation


Isn't this essentially the same scheme the article author has used?

A password for the encrypted outer volume can be given out if forced without revealing the existence or password to decrypt smaller volumes.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: