veracrypt

VeraCrypt 1.22

VeraCrypt has emerged from the encryption program TrueCrypt and is one of the most popular open source programs. The freeware can create encrypted containers and encrypt hard disk, SSD, USB stick and SD card. The operation of VeraCrypt is similar to that of TrueCrypt, because the software for encryption uses parts of the code of TrueCrypt 7.1a.

Successor of TrueCrypt

VeraCrypt is not a reaction to the project end of TrueCrypt in the year 2014. Because VeraCrypt was completed by its French developer in June 2013 and was already a TrueCrypt alternative, as the project end of TrueCrypt was not yet in sight. With the demise of TrueCrypt, VeraCrypt is considered a TrueCrypt successor and takes over its role as a cross-platform encryption program for Windows, macOS and Linux and can be used even on the mini computer Raspberry Pi.
Alternative to Bitlocker

On Windows, VeraCrypt also offers an open-source alternative to Bitlocker from Microsoft. Because, given the information that became known by the whistleblower Edward Snowden, the question arises whether intelligence services can bypass the Bitlocker encryption.

TrueCrypt has security holes

TrueCrypt always had the drawback that nobody really knew who was behind the software project and whether backdoors were installed. This has turned out to be unfounded in retrospect, but still leaves the security of TrueCrypt to be desired. Because the software has known security holes that are closed in VeraCrypt.
VeraCrypt encrypted stronger

But that's not all, because the security software encrypts the containers more securely. For example, VeraCrypt uses Xeroom 2 instead of 160 iterations when encrypting the system partition with PBKDF327661-RIPEMD1000 compared to TrueCrypt, and iterations instead of 655331 on 2000 containers. There are also delays in opening encrypted partitions that are tolerable to the legitimate owner, but more costly to crackers and hackers. When trying to decrypt encrypted drives or containers, Brutforce attacks are used, among other things, to find the password. Millions of possible passwords are tried out so that each delay significantly increases the time to find the right password. As a result, it reduces the likelihood of cracking the encryption, which makes the computer system more secure, especially since a brut force attack can still be discovered in good time and prevented by measures such as blocking the IP of the hacker.
Encrypt containers and disks

To protect private files against unauthorized access, it is sufficient to store them in a container that is encrypted with VeraCrypt. A VeraCrypt container is a file that can be stored on any drive such as hard disks and USB sticks, or alternatively in the cloud. The user specifies the size of the file when he creates and encrypts the container file with VeraCrypt. Alternatively, VeraCrypt encrypts the magnetic hard disk, SSD, SD card or USB stick.
Hidden container

In addition to encryption VeraCrypt also offers the hiding of data. This is realized through hidden containers that VeryCrypt creates inside an encrypted drive or container. Hidden containers are intended for very secret files. For encrypted containers and drives can only be decrypted with a password, but are visible. Accordingly, one could be forced to release the password. If so, the files in the contained, hidden container remain invisible because they are protected with their own password. Of course, this password must be different from the one used to decrypt the visible, encrypted container or drive.
Compatibility with TrueCrypt containers

Anyone who has created encrypted TrueCrypt containers can usually open them with VeraCrypt and not only read the content, but also change it. To do this, after selecting the TrueCrypt container and clicking on "Mount", the tick must be set before "TrueCrypt Mode", which VeraCrypt automatically does in the current version. If there are problems, an attempt remains in read-only mode, after which the folder opens at least for reading. Folder created with VeraCrypt can not open TrueCrypt. This should not surprise connoisseurs of TrueCrypt, since TrueCrypt containers of a newer TrueCrypt version can not be opened by an older one.
Encryption for Windows, Linux and macOS

Encryption with VeraCrypt is possible under Windows, Linux and macOS. The corresponding setup files are available in our download area or on the project page of VeraCrypt. These must be executed as usual under Windows and macOS.

Linux users get an archive file, which is unpacked first. This is followed by the installation of the 32 or 64 bit variant, whereby the choice exists between a command line version or the user interface (GUI). Among the Linux variants, there is also one for Raspbian, the Linux distribution for the mini-computer Raspberry Pi. Here, if necessary, still missing a package that can be installed with the Debian tool apt-get.
Use VeraCrypt Portable

As with TrueCrypt, VeraCrypt also offers a portable version that can be started as a portable software from the USB stick without installation. VeraCrypt Portable has the same features as the standard version of VeraCrypt and can be used on the used computer with administrator rights.