Change history for TrueCrypt


2016-04-26 17:24:04
Updated by Midas

  • License: Open Source: [url=http://www.truecrypt.org/legal/license]TrueCrypt License Version 3.0[/url] ([url=https://www.truecrypt.org/donations/]donate[/url])
  • Forum topic ID: 65922042


2015-10-06 01:00:38
Updated by webfork

  • Synopsis: TrueCrypt creates and opens secure volumes that function like an attached drive, making it possible to move files to and from a secure place, as well as open and run. Additional security features include support for key files and hidden volumes inside regular ones (for [url=https://en.wikipedia.org/wiki/Plausible_deniability]plausible deniability[/url]) for higher security, as well as hardware acceleration and benchmark tools for speed.Supports a range of encryption algorithms including AES, Serpent, and Twofish, as well as [url=https://en.wikipedia.org/wiki/Multiple_encryption]combinations[/url] (e.g. Serpent + Twofish) in the event that one of them is eventually cracked.[b]WarningNote[/b]: This program may have unfixed security vulnerabilities.  As version 7.2 only allows the opening of TrueCrypt volumes, not their creation, we are linking to a mirrror of Version 7.1a.


2015-10-06 01:00:23
Updated by webfork

  • System Requirement:
  • Synopsis: TrueCrypt creates and opens secure volumes that function like an attached drive, making it possible to move files to and from a secure place, as well as open and run. Additional security features include support for key files and hidden volumes inside regular ones (for [url=https://en.wikipedia.org/wiki/Plausible_deniability]plausible deniability[/url]) for higher security, as well as hardware acceleration and benchmark tools for speed.Supports a range of encryption algorithms including AES, Serpent, and Twofish, as well as [url=https://en.wikipedia.org/wiki/Multiple_encryption]combinations[/url] (e.g. Serpent + Twofish) in the event that one of them is eventually cracked.Includes a variety of command-line controls, and official clients are also availa[ble for Mac and Linux. (]Whole disk encryption options are of course not portable.)[b]NOTEarning[/b]: Version 7.2 only allow This the openinrog of TrueCram maypt havoe unfixed security vulumes, [b]not[/nerab] their crealitiones.  As Versversioon 7.2 only allows 7.1a cathe opening of TrueCrypt bvolumes, not their cre doation, wne are linking to aded [umirrrl=http://www.or ofil Vehrsippo.com/.n 7.1a.
  • How to extract: [list=1][*]Download and launch thee installler EXE and run[*]Select the [i]Extract[/i] option to extract files to a folder of your choice[*]Launch [i]TrueCrypt.exe[/i][/list]For more information on the available options of running TrueCrypt in portable mode, read the section on [url=http://www.truecrypt.org/docs/traveler-mode.php]Traveler Mode[/url].
  • Similar/alternative apps: [url=http://www.portablefreeware.com/index.php?id=2703]VeraCrypt[/url], [url=http://www.portablefreeware.com/index.php?id=698]FreeOTFE[/url]


2014-06-06 00:52:32
Updated by webfork

  • Synopsis: TrueCrypt creates and opens secure volumes that function like an attached drive, making it possible to move files to and from a secure place, as well as open and run. Additional security features include support for key files and hidden volumes inside regular ones (for [url=https://en.wikipedia.org/wiki/Plausible_deniability]plausible deniability[/url]) for higher security, as well as hardware acceleration and benchmark tools for speed.Supports a range of encryption algorithms including AES, Serpent, and Twofish, as well as [url=https://en.wikipedia.org/wiki/Multiple_encryption]combinations[/url] (e.g. Serpent + Twofish) in the event that one of them is eventually cracked.Includes a variety of command-line controls, and official clients are also available for Mac and Linux. (Whole disk encryption options are of course not portable.)[b]NOTE[/b]: Version 7.2 only allows the opening of TrueCrypt volumes, [b]not[/b] their creation. Version 7.1a can be downloaded [url=http://www.filehippo.com/...


2014-06-06 00:51:37
Updated by webfork

  • Synopsis:


2014-06-06 00:51:09
Updated by webfork

  • Synopsis: TrueCrypt creates and opens secure volumes that function like an attached drive, making it possible to move files to and from a secure place, as well as open and run. Additional security features include support for key files and hidden volumes inside regular ones (for [url=https://en.wikipedia.org/wiki/Plausible_deniability]plausible deniability[/url]) for higher security, as well as hardware acceleration and benchmark tools for speed.Supports a range of encryption algorithms including AES, Serpent, and Twofish, as well as [url=https://en.wikipedia.org/wiki/Multiple_encryption]combinations[/url] (e.g. Serpent + Twofish) in the event that one of them is eventually cracked.Includes a variety of command-line controls, and official clients are also available for Mac and Linux. (Whole disk encryption options are of course not portable.)[b]NOTE: As[/b]: Version 7.2 only has been widely clovered elwsewhere, version 7.2 only allows t the opening of TrueCrypt volumes, not thmes, not their creation. Version 7.1a can be downloaded [url=http://www.filehippo.com/...


2014-06-06 00:49:41
Updated by webfork

  • Synopsis: TrueCrypt creates and opens secure volumes that function like an attached drive, making it possible to move files to and from a secure place, as well as open and run. Additional security features include support for key files and hidden volumes inside regular ones (for [url=https://en.wikipedia.org/wiki/Plausible_deniability]plausible deniability[/url]) for higher security, as well as hardware acceleration and benchmark tools for speed.Supports a range of encryption algorithms including AES, Serpent, and Twofish, as well as [url=https://en.wikipedia.org/wiki/Multiple_encryption]combinations[/url] (e.g. Serpent + Twofish) in the event that one of them is eventually cracked.Includes a variety of command-line controls, and official clients are also available for Mac and Linux. (Whole disk encryption options are of course not portable.)NOTE: As has been widely covered elsewhere, version 7.2 only allows the opening of TrueCrypt volumes, not their creation. Version 7.1a can be downloaded [url=http://...


2014-05-29 12:59:11
Updated by Midas

  • Download URL: http://www.truecryfilehippto.corgm/download.ph_truecrypt
  • What's new:


2013-09-21 17:29:40
Updated by webfork

  • Synopsis: TrueCrypt creates and opens secure volumes that function like an attached drive, making it possible to move files to and from a secure place, as well as open and run. Additional security features include support for key files and hidden volumes inside regular ones (for [url=https://en.wikipedia.org/wiki/Plausible_deniability]plausible deniability[/url]) for higher security, as well as hardware acceleration and benchmark tools for speed.Supports a range of encryption algorithms including AES, Serpent, and Twofish, as well as [url=https://en.wikipedia.org/wiki/Multiple_encryption]combinations[/url] (e.g. Serpent + Twofish) in the event that one of them is eventually cracked.Includes a variety of command-line controls, and official clients are also available for Mac and Linux. (Whole disk encryption options are of course not portable.)


2013-07-07 16:24:16
Updated by webfork

  • Synopsis: TrueCrypt creates and opens secure volumes that function like an attached drive, making it possible to move files to and from a secure place, as well as open and run. Additional security features include support for key files and hidden volumes inside regular ones (for [url=https://en.wikipedia.org/wiki/Plausible_deniability]plausible deniability[/url]) for higher security, as well as hardware acceleration and benchmark tools for speed.Supports a range of encryption algorithms including AES, Serpent, and Twofish, as well as combinations (e.g. Serpent + Twofish) in the event that one of them is eventually cracked.Includes a variety of command-line controls, and official clients are also available for Mac and Linux. (Whole disk encryption options are of course not portable.)


2013-06-26 02:07:51
Updated by webfork

  • Synopsis: TrueCrypt creates and opens secure volumes that work like an attached dfunction like an attached drive, making it possible to move files to and from a secure place, as well as open and run. Additional security features include support for key files and hivdde,n volumaes inside regular ones (for [url=https://en.wikipedia.org/wikii/Plausible_deniability]plausible deniability[/url]) for higher security, posasib well as hardware accele ration and usbe and run files from inside a secure volume. Supports a range chmark tools for speed.Supports a range of encryption algorithms including AES, Serpent, and Twofish, erpent, asnd Twell ofish, as well as combinations (e.g. Seerpent + Twofish) in the event that oin the e of thvent thalgt orine of thems is eventually cracked.SInclupports key files, hardware acceledes a varaietiy on, hiddenf vcolumes (for plausible deniability), bemand-line chmaontrk tools to analyze speed differences, and a variety of comm annd-line contr ols. Official clients are also available for Mac and Linux.


2013-03-02 22:03:35
Updated by webfork

  • Synopsis: TrueCrypt creates and opens secure volumes that work like an attached drive, making it possible to use and run files from inside a secure volume. Supports a range of encryption algorithms including AES, Serpent, and Twofish, as well as combinations (e.g. Serpent + Twofish) in the event that one of the algorithms is eventually cracked.Supports key files, hardware racceleral ation, hidden favolsume password (for plausible deniability), benchmark tools to analyze speed differences, and a variety of command-line controls. Official clients are also available for Mac and Linux.


2013-03-02 22:00:33
Updated by webfork

  • Synopsis: TrueCrypt creates and opens secure volumes that work transparent to the user, making it possible to use and run files from inside a secure volume. The program can open encrypted files that appear as an external device, as well as encrypt the operating system. Supports a range like an attached drive, making it possible to use and run files from inside a secure volume. Supports a range of high-security 256-bit en encryption tion algorithms, including AES, Serpent, and TwoS, Serpent, and Twofish, a as well l as combinationtions (e.g. Serpent + Twofish) in th in the event that one of the algorithms is event that one of the ualgorithms is eventually cly cracked.Supports key files, a real and false password for plausible dkeniabiy filityes, aa real and false vpassword fori plausible dety of niability, bencohmmand-line contark tools to analyze speed differences, and a variety of commannd -line controls. Official clients are also available for Mac and Linux.
  • Forum topic ID: 0659


2013-03-02 21:56:46
Updated by webfork

  • License: Open Source: [url=http://www.truecrypt.org/legal/license]TrueCrypt License Version 3.0[/url] ([url=https://www.truecrypt.org/don
  • System Requirement:
  • How to extract:
  • Writes settings to: None.
  • Screenshot: Updated
  • Similar/alternative apps: [url=http://www.portablefreeware.com/index.php?id=698]FreeOTFE[/url]


2012-08-15 19:29:26
Updated by webfork

  • Version: Vv7.1a
  • License: Open Source: Tr[url=http://www.truecrypt.org/legal/license]TrueCrypt Licenense Version 3.0[/url]
  • Synopsis:
  • How to extract: [list=1][*]Downnloaad the innstaaller EXE and E and run n[*]Seelect the Extract opthe [ion ]Exto extrract[/i] option files to a folder oxtract files to a folder of yoour cchoice [*]Launch TrueCrypt.exeFor more information ounch [i]TrueCrypth.exe[/i][/list]For more information on the avaiailable options of running TrueCrypt in portable mopde, read the sections of running Tr [ueCryprl=htt in por://www.table mode, ruead the secrypt.org/docs/tion raveler-mon de.php]Trraveleler Mode[/url].
  • Keywords: crypto virtual drive secure
  • What's new: [list][*]Minor iminor improvemenents and bug fixes[/list]


2012-02-08 17:18:19
Updated by webfork

  • License: Open Source: TrueCrypt License Version 3.0
  • Synopsis: TrueCrypt creates virtual encrypted disks within a file and mounts the file as a real disk. It can also encrypt an entire hard disk partition or device, such as USB memory stick, floppy disk, etc. It supports a range of high-security 256-and opens secure volumes that work transparent to the user, making it possible to use and run files from inside a secure volume. The program can open encrypted files that appear as an external device, as well as encrypt the operating system. Supports a range of high-security encr256-bit encrypption algorithms, includion ag AES, Serpent, and Twofish, as wellg as corithms, includbinations (e.g AES,. Serpent, anderpent + Twoofish) in the event that one of the algorithms ish. For even higher secturitally, these cran be combineked (e.g. Serpent + Twofish) in the event thaupports key files, a real oand false passwofrd the algforithms plarusible evdentuiabillity cracked.C, a variety of coss-plmmand-line contform (Mols, and official c/Llienux),ts are alsupports key favailables, two passwords for plausible deniability, and a variety fof commr Mac and-l Line controlsux.
  • How to extract: Download the installer EXE and run. Selecelect the Extract opthe "Extract" optiion t to extract ct filles to a folder of a folder of your choicce. Launch TrrueeCrypt.e.exe. For more information on the available options of running TrueCrypt in portable mode, read the section on Traveler Mode.


2012-02-07 23:11:02
Updated by Checker

  • What's new: Minor improvements and bug fixes


2012-02-07 23:10:39
Updated by Checker

  • Version: V7.1a
  • License: Open Source: Tr
  • What's new: New features: Full compatibility with 64-bit and 32-bit Mac OS X 10.7 LionImprovements and bug fixes: Minor improvements and bug fixes 


2011-09-01 22:22:47
Updated by Checker

  • Version: V7.0a1
  • License: Open Source: TrueCrypt License Version 3.0
  • What's new: INew features: Full comprovements: Workaround for a bug in some custom (non-Microsoft) dratibilivers for storage device controllers that caused a system crashy when initiaiting hi 64-bernit ation ond TrueCrypt32-enbit Macrypted operatingOS systemsX 10. (Wind7 Liows 7/Vista/2008/2008R2) Other minor iImprovemeements ants Bd bug fixes: Minonor improvements and bug fixes  


2011-04-25 16:53:46
Updated by webfork

  • Synopsis: TrueCrypt creates virtual encrypted disks within a file and mounts the file as a real disk. It can also encrypt an entire hard disk partition or device, such as USB memory stick, floppy disk, etc. It supports a range of high-security 256-bit encryption algorithms, including AES, Serpent, and Twofish. For even higher security, these can be combined (e.g. Serpent + Twofish) in the event that one of the algorithms are eventually cracked.Cross-platform (Mac/Linux), supports key files, two passwords for plausible deniability, and a various cariety of commmand-line acontironls.


2011-03-05 21:07:44
Updated by webfork

  • License: Freeware/Open pen Souource: TrueCrypt License Version 3.0


2010-12-30 19:37:44
Updated by Lupo73

  • Synopsis: TrueCrypt creates virtual encrypted disks within a file and mounts the file as a real disk. It can also encrypt an entire hard disk partition or device, such as USB memory stick, floppy disk, etc. It supports a range of high-security 256-bit encryption algorithms, including AES, Serpent, and Twofish. For even higher security, these can be combined (e.g. Serpent + Twofish) in the event that one of the algorithms are eventually cracked.Cross-platform (Mac/Linux), supports key files, two passwords for plausible deniability, and various command-line actions.


2010-09-06 21:39:45
Updated by Checker

  • System Requirement: WinNT


2010-09-06 18:17:34
Updated by Checker

  • Synopsis: TrueCrypt creates virtual encrypted disks within a file and mount it as a real disk. It can also encrypt an entire hard disk partition or s the file as a real disk. It can also encrypt an entire hard disk partition or devicce, s such as USB memory stick, floppSB memory d stisck, etc. It supports a range , floppy disk, etc. It supports a range of hi high-security 256-bit encryption abit encryption algoriithms, including AES, Serpent, aerpent, and Twofisish. For extra even higher security, these these can bn be coombineined (e.e.g. Serpent + AESTwofish) in the event that one of the algorithms are eventually cracked.
  • What's new: Improvements: Workaround for a bug in some custom (non-Microsoft) drivers for storage device controllers that caused a system crash when initiating hibernation on TrueCrypt-encrypted operating systems. (Windows 7/Vista/2008/2008R2) Other minor improvements (Windows, Mac OS X, and Linux) Bug fixes: Minor buug fiixes (Windows, : Mac OS X, and Linor bug fix) es


2010-09-06 11:05:30
Updated by Checker

  • Version: V7.0a
  • How to extract: Download the installer EXE and run. Select the "Extract" option to extract files to a folder of your choice. Launch TrueCrypt.exe. For more information on the available options of running TrueCrypt in portable mode, read the section on Traveler Mode.
  • What's new: New features: Hardware-accelerated AES (for more information, see the chapter Hardware Acceleration). Note: If you want to disable hardware acceleration, select Settings > Performance and disable the option 'Accelerate AES encryption/decryption by using the AES instructions of the processor'. A volume can now be configured to be automatically mounted whenever its host device gets connected to the computer (provided that the correct password and/or keyfiles are supplied). (Windows) Note: For example, if you have a TrueCrypt container on a USB flash drive and you want to configure TrueCrypt to mount it automatically whenever you insert the USB flash drive into the USB port, follow these steps: 1. Mount the volume. 2. Right-click the mounted volume in the drive list in the main TrueCrypt window and select 'Add to Favrorites'. 3. The Favorites Organizerements: window shWorkaroulnd appea for. Ina bug it,n somenable the option 'Mount selected volcustome whe(n on-Mits hocrosoft) devricvers for storaget device controllers that caused a system crash when connected' aind click OK. Also tiatinoteg thibernation on TrueCrypt-encrypted operating systems. (Windows 7/Vista/2008/2008R2) Other minor improvements (Windows, Mac OS X, and Linux) Bug fixes: Minor bug fixes (Windows, Mac OS X, and Lillnux) ...


2010-07-20 20:34:31
Updated by Checker

  • Synopsis: TrueCrypt creates virtual encrypted disks within a file and mount it as a real disk. It can also encrypt an entire hard disk partition or device, such as USB memory stick, floppy disk, etc. It supports a range of high-security 256-bit encryption algorithms, including AES, Serpent, and Twofish. For extra security, these can be combined (e.g. Serpent + AES) in the event that one of the algorithms are eventually cracked.
  • How to extract: Download ad thee instalaller EXE and E and run. Select ect the "Extract" option to extract files to a folder option to extract files to a folder of yoour choice. Launch TrueCrh TrueCrypt.ext.exe. For more information on the available options ofr morue information on the available options of running TrueCrypt in portable mode, rode, read t the section onon Traveeler Mode.
  • What's new: New features: Hardware-accelerated AES (for more information, see the chapter Hardware Acceleration). Note: If you want to disable hardware acceleration, select Settings > Performance and disable the option 'Accelerate AES encryption/decryption by using the AES instructions of the processor'. A volume can now be configured to be automatically mounted whenever its host device gets conA volume can now be configured to be automatically mounted whenecver its host device geteds tconnected to the computerter (provided thaed that the e corrrect passswordord and/or keyfiles are supplied)or keyfiles are supplied). (Windows) s) Note: For example, if you have a TrueCrypt container on a USB flash driv e xample, if you have a TrueCrypt container on a USB flash drive and you you want to configure TrueCrypt to mount it automatically wahentever to coyou insert the USB figulash drive TrueCrypt to mount itnto automatically whenever you insert the USB flash drive into the USB port, folollow these s these steps: 1. Mount t the vollume. 2. Right-click the mounted volume in the drive list in the main TrueCrypt window and select 'Add to Favoriteclick the mounted volume in the drive list in the main TrueCrypt window and select 'Add to Favorites'. 3. The Favorites Orrganinizer windoer window should ap appear. In in it, enable te the option 'Mount selecount selected volume when its hoste when its host device gets connecteets connected' and cliclick OK. Allso note that TrueCrypt will ...


2010-07-20 20:33:53
Updated by admin

  • Synopsis: TrueCrypt creates virtual encrypted disks within a file and mount it as a real disk. It can also encrypt an entire hard disk partition or a device, ice, such ch as USB memory stick, fUSB memory stick, floppy disk, etc. It supports a full range of t supports a range of high-sencryption algorithms, including AES-256, Blowfish (448-bit key), CAST5, Serpent (256-bit key), Triple DES, and Twofish (rity 256-bit key). Note that 64-bit-block encryptioption allgoririthms (B, inclowfudishng AES, CAST-128,erpent, and Triple DES) wofish. For extra deprsecaurited fry, these can be com V4bined (e.g.3 o Serpent + AES) in the event that onwae of the algorithms are eventually crackeds.
  • What's new: New features: Hardware-accelerated AESNew features: Hardware-accelerated AES (for mr more information, see the chapter Hardware Acceleration). Note: If you want to disable hardware acceleration, select Settings > Performance and disable the option 'Accelerate AES encryption/decryption by using the iAES instructions of the processor'. A volume can now be conforigured to be automation, scally mounted whenever its host device gets connected to the computer (provided that the e correchapt password and/or keyfilers Hardware Acce supplieratd). (Wiondows). Note: If youote: For example, if you have a TrueCrypt container on a USB flash drive and you want to configure TrueCrypt to mount it automatically whenever you insert the USB flash drive into the USB port, follow these steps: 1. Mount the volume. 2. Right-click the mounted volume in the drive list in the maint TrueCrypto disable hardware accelerat window an,d select Seelect 'Add to Favoritinges'. 3. The &Favorites Orgt; Panizerforma wince and disable the optionw 'Acceshould apperate AES encrypt. In ion/decryption by using the AES instructions of the, processor'. A vonablume can nthe owption be c'Monfigurednt selected vo blume autwhen its homast devicallye mgets counted whenever its host device gets connected to the computer (provided that the corrnect password aned' and/or keyfiles are suppclied)ck OK. (Windows) Note: For example, if you have a TrueCrypt container on a USB f Alash drive and you want to co nfigure TrueCrypt to mount it automatically whenever you insert the USB flash drive into the USB port, follow these steps: 1. Mounot the volume. 2. Right-click the mounted volume in the drive list in the main Truthat TrueCrypt window and select 'Add to Favorites'. 3. The Favorites Organizer window should appear. In it, enable the option 'Mount selected volume when its host device gets connected' ...


2010-07-20 10:53:19
Updated by admin

  • Version: V67.3a0
  • System Requirement: WinNT Win7
  • Size (in bytes): 4200000519598
  • What's new: Minor i New features: Hardware-accelerated AES (for more information, see the chapter Hardware Acceleration). Note: If you want to disable hardware acceleration, select Settings > Performance and disable the option 'Accelerate AES encryption/decryption by using the AES instructions of the processor'. A volume can now be configured to be automatically mounted whenever its host device gets connected to the computer (provided that the correct password and/or keyfiles are supplied). (Windows) Note: For example, if you have a TrueCrypt container on a USB flash drive and you want to configure TrueCrypt to mount it automatically whenever you insert the USB flash drive into the USB port, follow these steps: 1. Mount the volume. 2. Right-click the mounted volume in the drive list in the main TrueCrypt window and select 'Add to Favorites'. 3. The Favorites Organizer window should appear. In it, enable the oprtion 'Mount selected volume when its host devements aice gets connected' bug fixes...


2009-12-01 08:32:18
Updated by admin

  • Categories: [Security - Encryption/Decryption]
  • Suggested by: Christer Alldé?n
  • What's new: Minor improvements and bug fixes[by Checker]


2009-11-23 21:02:34
Updated by admin

  • Suggested by: Christer Alldén
  • What's new: Minor improvements and bug fixes[by Checker]


2009-11-23 21:02:12
Updated by admin

  • What's new: Minor improvements and bug fixes


2009-11-23 21:01:33
Updated by admin

  • Version: V6.3a


2009-11-13 16:36:43
Updated by admin

  • Version: V6.23
  • System Requirement:


2007-03-20 05:41:55
Added by admin