
There is nothing difficult about using Truecrypt. Its not about whether our data is really at risk - its the principle. RMDTECH wrote:Many people just don't like the big brother ideology in America. So I would like to continue to use Truecrypt 7.1a, but I would like to hear if people have any reservations about Truecrypt in terms of using it with W10, UEFI, SSD Drives or any other factor that I might not be aware of? Part of this is also to do with GDPR compliance. If we wanted to protect the laptop from the NSA, then yes that might be a consideration, but just to protect data against casual theft, I would say that Truecrypt is beyond more than secure and even the NSA may not be able to break Truecrypt encryption. Iterations count as it slows the boot and mount time significantly.
#Encryptstick vs truecrypt how to
The average thief is not going to bother trying to work out how to decrypt an encrypted laptop so its as secure as we need it. The purposes of using Truecrypt for my clients would be whole disk encryption and is more to protect laptops that might get stolen. I don't think its recommended to use Truecrypt on SSD Drives as it does not support Trim which I have never really understood what that does. Is there any value to UEFI considering we want to use Truecrypt and not TPM and Bitlocker which is basically like giving the keys to your house to Microsoft and the NSA.

It does not support UEFI (at the moment I am changing to legacy boot as I can't see any benefit to UEFI at all). However, I have concerns about using Truecrypt as I believe that the following is true: There are some bugs, but not with regards to accessing encrypted data, but more other issues. I am happy to continue to use Truecrypt 7.1a as I trust it and as far as I am aware there are no security flaws with regards to the actual data encryption. I am in the unhappy position of having to upgrade from wonderful Windows 7 to the godawful Windows 10 platform for my clients.
