Used TrueCrypt for Windows?


Using TrueCrypt is not secure as it may contain unfixed security issues. The development of TrueCrypt was ended in 5/2014 after Microsoft terminated support of Windows XP. Windows 8/7/Vista and later offer integrated support for encrypted disks and virtual disk images. You should migrate any data encrypted by TrueCrypt to encrypted disks or virtual disk images supported on your platform. Please refer to TrueCrypt's site for an important update about this software.

Editors’ Review

Download.com staff
This free, open-source software offers comprehensive disk encryption. It creates virtual encrypted disks, encrypts partitions and devices, and provides real-time, transparent encryption.
Enlarged image for TrueCrypt
TrueCrypt 0/1
  • Pros

    • Open-source and free to use.
    • Creates virtual encrypted disks.
    • Encrypts entire partitions and devices.
    • Real-time transparent encryption.
    • Supports multiple strong encryption algorithms.
  • Cons

    • Provides plausible deniability features.
    • Based on older E4M 2.02a technology.

Used TrueCrypt for Windows?


Explore More


Full Specifications

GENERAL
Release
Latest update
Version
7.2
OPERATING SYSTEMS
Platform
Windows
Operating System
  • Windows 10
  • Windows XP
  • Windows Vista
  • Windows 7
Additional Requirements
None
POPULARITY
Total Downloads
814,607
Downloads Last Week
2

Report Software

Program available in other languages


Last Updated


User Reviews

4.3/5

323 User Votes


Developer’s Description

Encrypt your sensitive data with this open-source software.

Protect your sensitive data with this free open-source disk encryption software. Creates a virtual encrypted disk within a file and mount it as a real disk. Encrypt an entire hard disk partition or a device, such as USB flash drive. Automatically and transparently encrypt in real time.

TrueCrypt provides two levels of plausible deniability, in case an adversary forces you to reveal the password: a hidden volume (steganography- more information may be found here); no TrueCrypt volume can be identified (volumes cannot be distinguished from random data). TrueCrypt uses encryption algorithms AES-256, Blowfish (448-bit key), CAST5, Serpent, Triple DES, and Twofish. It is based on Encryption for the Masses (E4M) 2.02a, conceived in 1997.


Download.com
Your review for TrueCrypt