VeraCrypt adds enhanced security to the algorithms used for system and partitions encryption making it immune to new developments in brute-force attacks. More information about the features of VeraCrypt may be found in the documentationĬontributed Resources & Downloads (Tutorials, PPA, ARM, Raspberry Pi.).Provides plausible deniability, in case an adversary forces you to reveal the password: Hidden volume (steganography) and hidden operating system.Encryption can be hardware-accelerated on modern processors.Parallelization and pipelining allow data to be read and written as fast as if the drive was not encrypted.Encryption is automatic, real-time(on-the-fly) and transparent.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |