Comparison of disk encryption software
From Seo Wiki - Search Engine Optimization and Programming Languages
Jump to navigationJump to search
This is a technical feature comparison of different disk encryption software.
Background information
| Name | Developer | First released | Licensing | Maintained? |
|---|---|---|---|---|
| ArchiCrypt Live | Softwaredevelopment Remus ArchiCrypt | 1998 | Template:Proprietary | Yes |
| BestCrypt | Jetico | 1993[1] | Template:Proprietary | Yes |
| BitArmor DataControl | BitArmor Systems Inc. | May 2008 | Template:Proprietary | Yes |
| BitLocker Drive Encryption | Microsoft | 2006 | Template:Proprietary | Yes |
| Bloombase Keyparc | Bloombase | 2007 | Template:Proprietary | Yes |
| CGD | Roland C. Dowdeswell | 2002-10-04[2] | BSD | Yes |
| Check Point Full Disk Encryption | Check Point Software Technologies Ltd | 1999[3][4][5] | Template:Proprietary | Yes |
| CrossCrypt | Steven Scherrer | 2004-02-10[6] | GPL | No |
| Cryptainer | Cypherix (Secure-Soft India) | ? | Template:Proprietary | Yes |
| CryptArchiver | WinEncrypt | ? | Template:Proprietary | Yes |
| cryptoloop | ? | 2003-07-02[7] | GPL | No |
| Discryptor | Cosect Ltd. | 2008 | Template:Proprietary | Yes |
| DiskCryptor | ntldr | 2007 | GPL | Yes |
| DISK Protect | BeCrypt Ltd | 2001 | Template:Proprietary | Yes |
| dm-crypt/cryptsetup | Christophe Saout | 2004-03-11[8] | GPL | Yes |
| dm-crypt/LUKS | Clemens Fruhwirth (LUKS) | 2005-02-05[9] | GPL | Yes |
| DriveCrypt | SecurStar GmbH | 2001 | Template:Proprietary | Yes |
| DriveSentry GoAnywhere 2 | DriveSentry | 2008 | Template:Proprietary | Yes |
| E4M | Paul Le Roux | 1998-12-18[10] | Open source | No |
| e-Capsule Private Safe | EISST Ltd. | 2005 | Template:Proprietary | Yes |
| eCryptfs | Dustin Kirkland, Tyler Hicks, (formerly Mike Halcrow) | 2005[11] | GPL | Yes |
| FileVault | Apple Computer | 2003-10-24 | Template:Proprietary | Yes |
| FREE CompuSec | CE-Infosys | ? | Template:Proprietary | Yes |
| FreeOTFE | Sarah Dean | 2004-10-10[12] | Open source | Yes |
| GBDE | Poul-Henning Kamp | 2002-10-19[13] | BSD | Yes |
| GELI | Pawel Jakub Dawidek | 2005-04-11[14] | BSD | Yes |
| loop-AES | Jari Ruusu | 2001-04-11 | GPL | Yes |
| n-Crypt Pro | n-Trance Security Ltd | 2005 | Template:Proprietary | Yes |
| PGPDisk | PGP Corporation | 1998-09-01[15] | Template:Proprietary | Yes |
| Private Disk | Dekart | 1993[16] | Template:Proprietary | Yes |
| R-Crypto | R-Tools Technology Inc | 2008 | Template:Proprietary | Yes |
| McAfee Endpoint Encryption (SafeBoot) | McAfee, Inc. | 2007[17] | Template:Proprietary | Yes |
| SafeGuard Easy | Sophos (Utimaco) | 1993[18] | Template:Proprietary | Yes |
| SafeGuard Enterprise Device Encryption | Sophos (Utimaco) | 2007[19] | Template:Proprietary | Yes |
| SafeGuard PrivateDisk |
Sophos (Utimaco)[20] | 2000 | Template:Proprietary | Yes |
| SafeHouse Professional | PC Dynamics, Inc. | 1992 | Template:Proprietary | Yes |
| Scramdisk | Shaun Hollingworth | 1997-07-01 | Open source | No |
| Scramdisk 4 Linux | Hans-Ulrich Juettner | 2005-08-06[21] | GPL | Yes |
| SecuBox | Aiko Solutions | 2007-02-19 | Template:Proprietary | Yes |
| Secude securenotebook | Secude | 2003 | Template:Proprietary | Yes |
| SecureDoc | WinMagic Inc. | 1997 | Template:Proprietary | Yes |
| Sentry 2020 | SoftWinter | 1998[22] | Template:Proprietary | Yes |
| softraid / RAID C | OpenBSD | 2007-11-01[23] | BSD | Yes |
| SpyProof! | Information Security Corp. | 2002 | Template:Proprietary | Yes |
| svnd / vnconfig | OpenBSD | 2000-12-01[24] | BSD | Yes |
| Symantec Endpoint Encryption | Symantec Corporation | 2008 | Template:Proprietary | Yes |
| TrueCrypt | TrueCrypt Foundation | 2004-02-02[25] | TrueCrypt Collective License | Yes |
| Name | Developer | First released | Licensing | Maintained? |
Operating systems
| Name | Windows NT-based | Pre-Windows NT | Windows Mobile/Pocket PC | FreeBSD | Linux | Mac OS | NetBSD | OpenBSD |
|---|---|---|---|---|---|---|---|---|
| ArchiCrypt Live | Yes | No | No | No | No | No | No | No |
| BestCrypt | Yes | Yes | No | No | Yes | No | No | No |
| BitArmor DataControl | Yes | No | No | No | No | No | No | No |
| BitLocker Drive Encryption | Yes | No | No | No | No | No | No | No |
| Bloombase Keyparc | Yes | No | No | No | Yes | Yes | No | No |
| CGD | No | No | No | No | No | No | Yes | No |
| Check Point Full Disk Encryption | Yes | No | Yes | No | Yes | Yes | No | No |
| CrossCrypt | Yes | No | No | No | No | No | No | No |
| Cryptainer | Yes | No | Yes[26] | No | No | No | No | No |
| CryptArchiver | Yes | No | No | No | No | No | No | No |
| cryptoloop | No | No | No | No | Yes | No | No | No |
| Discryptor | Yes | No | No | No | No | No | No | No |
| DiskCryptor | Yes | No | No | No | No | No | No | No |
| DISK Protect | Yes | No | No | No | No | No | No | No |
| dm-crypt/cryptsetup | Yes[27] | No | No | No | Yes | No | No | No |
| dm-crypt/LUKS | Yes[27] | No | Yes[28] | No | Yes | No | No | No |
| DriveCrypt | Yes | No | No | No | No | No | No | No |
| DriveSentry GoAnywhere 2 | Yes | No | No | No | No | No | No | No |
| E4M | Yes | Yes | No | No | No | No | No | No |
| e-Capsule Private Safe | Yes | No | No | No | No | No | No | No |
| eCryptfs | No | No | No | No | Yes | No | No | No |
| FileVault | No | No | No | No | No | Yes | No | No |
| FREE CompuSec | Yes | No | No | No | Yes | No | No | No |
| FreeOTFE | Yes | No | Yes | No | Yes[29] | No | No | No |
| GBDE | No | No | No | Yes | No | No | No | No |
| GELI | No | No | No | Yes | No | No | No | No |
| loop-AES | No | No | No | No | Yes | No | No | No |
| n-Crypt Pro | Yes | No | No | No | No | No | No | No |
| PGPDisk | Yes | No | No | No | No | Yes | No | No |
| Private Disk | Yes | Yes | No | No | No | No | No | No |
| R-Crypto | Yes | No | No | No | No | No | No | No |
| McAfee Endpoint Encryption (SafeBoot) | Yes | No | No | No | No | No | No | No |
| SafeGuard Easy | Yes | No | No | No | No | No | No | No |
| SafeGuard Enterprise Device Encryption | Yes | No | No | No | No | No | No | No |
| SafeGuard PrivateDisk |
Yes | No | No | No | No | No | No | No |
| SafeHouse Professional | Yes | Yes | No | No | No | No | No | No |
| Scramdisk | Yes | Yes | No | No | Yes | No | No | No |
| Scramdisk 4 Linux | No | No | No | No | Yes | No | No | No |
| SecuBox | No | No | Yes | No | No | No | No | No |
| Secude securenotebook | Yes | No | No | No | No | No | No | No |
| SecureDoc | Yes | No | No | No | No | Yes | No | No |
| Sentry 2020 | Yes | No | No | No | No | No | No | No |
| softraid / RAID C | No | No | No | No | No | No | No | Yes |
| SpyProof! | Yes | No | No | No | No | No | No | No |
| svnd / vnconfig | No | No | No | No | No | No | No | Yes |
| Symantec Endpoint Encryption | Yes | No | No | No | No | No | No | No |
| TrueCrypt | Yes | No | No | Yes | Yes | Yes | No | No |
| Name | Windows NT-based | Pre-Windows NT | Windows Mobile/Pocket PC | FreeBSD | Linux | Mac OS | NetBSD | OpenBSD |
Features
- Hidden containers: Whether hidden containers[clarification needed] can be created for deniable encryption. Note that some modes of operation like CBC with a plain IV can be more prone to watermarking attacks than others.
- Pre-boot authentication: Whether authentication can be required before booting the computer, thus allowing one to encrypt the boot disk.
- Custom authentication: Whether custom authentication mechanisms can be implemented with third-party applications.
- Multiple keys: Whether an encrypted volume can have more than one active key.
- Passphrase strengthening: Whether key strengthening is used with plain text passwords to frustrate dictionary attacks, usually using PBKDF2.
- Hardware acceleration: Whether dedicated cryptography acceleration extension cards can be taken advantage of.
- Trusted Platform Module: Whether the implementation can use a TPM cryptoprocessor.
- Two-factor authentication: Whether optional security tokens (hardware security modules, such as Aladdin eToken and smart cards) are supported (for example using PKCS#11)
| Name | Hidden containers | Pre-boot authentication | Custom authentication | Multiple keys | Passphrase strengthening | Hardware acceleration | TPM | Filesystems | Two-factor authentication |
|---|---|---|---|---|---|---|---|---|---|
| BestCrypt | Yes | Yes | No | Yes[30] | Yes | No | No | Any supported by OS | Yes[31] |
| BitArmor DataControl | No | Yes | No | Yes | Yes | No | No | NTFS, FAT32 on non-system volumes | No |
| BitLocker Drive Encryption | No | Yes (With PIN or USB key)[32] |
Yes[33] | Yes[32] |
Yes (Recovery keys only) |
No | Yes[32] | Chiefly NTFS Template:Refun | Yes Template:Refun |
| Bloombase Keyparc | No | No | Yes | Yes | Yes | Yes | No | ? | ? |
| CGD | No | No | Yes[34] | Yes[35] | Yes[34] | No | No | Any supported by OS | Yes[34] |
| Checkpoint Full Disk Encryption | ? | Yes | Yes | Yes | Yes | ? | Yes[36] | ? | Yes |
| CrossCrypt | No | No | No | No | No | No | No | ? | No |
| CryptArchiver | No | No | No | No | ? | No | No | ? | ? |
| cryptoloop | No | Yes[37] | Yes | No | No | Yes[citation needed] | No | Any supported by OS | ? |
| DiskCryptor | No | Yes | No | No | Yes | Yes[38] | No | Any supported by OS | Yes[39] |
| DISK Protect | ? | Yes[40] | ? | Yes[40] | ? | ? | No | ? | ? |
| dm-crypt/cryptsetup | No | Yes[37] | Yes | No | No | Yes | No | Any supported by OS | No |
| dm-crypt/LUKS | No | Yes[37] | Yes | Yes | Yes | Yes | No | Any supported by OS | Yes |
| DriveCrypt | Yes[41] | Yes | No | Yes | Yes | No | No | ? | Yes |
| DriveSentry GoAnywhere 2 | No | No | Yes | No | Yes | No | ? | Any supported by OS | Yes |
| E4M | No | No | No | No | ? | No | No | ? | No |
| e-Capsule Private Safe | Yes[42] | No | No | Yes[42] | No | Yes | No | ? | ? |
| eCryptfs | No | No | Yes | Yes | Yes | Yes | Yes | uses the lower filesystem (stacking) | Yes |
| FileVault | No | No | No | Two passwords[43] | Yes[43] | No | No | ? | ? |
| FREE CompuSec | No | Yes | No | No | No | No | No | ? | ? |
| FreeOTFE | Yes | No | Yes[44] | Yes[45] | Yes | No | No | Any supported by OS | Yes |
| GBDE | No | No[46] | Yes | Yes[47] | No[47] | No[46] | No | Any supported by OS | ? |
| GELI | No | Yes[46] | Yes | Yes[48] | Yes[48] | Yes[46] | No | Any supported by OS | ? |
| GuardianEdge Hard Disk Encryption | No | Yes | Yes | Yes | Yes | No | No | NTFS, FAT32 | Yes |
| loop-AES | No | Yes[49] | Yes[49] | Yes[49] | Yes[49] | Yes[49] | No | Any supported by OS | No |
| n-Crypt Pro | No | No | No | No | Template:N/a[50] | No | No | ? | ? |
| PGPDisk | No | Yes[51] | ? | Yes | Yes[52] | ? | Yes | ? | Yes |
| Private Disk | No | No | No | Yes | Yes | No | No | Any supported by OS | Yes |
| R-Crypto | ? | No | ? | ? | ? | ? | ? | Any supported by OS | ? |
| McAfee Endpoint Encryption | Yes | Yes | Yes | Yes | Yes | No | Yes | ? | Yes |
| SafeGuard Easy | No | Yes | No | Yes | Yes | No | Yes[53] | ? | Yes |
| SafeGuard PrivateDisk | ? | ? | ? | ? | ? | ? | Yes[36] | ? | ? |
| SafeHouse Professional | No | No | Yes | Yes | Yes | No | No | Any supported by OS | Yes |
| Scramdisk | Yes | No | No | No | No | No | No | ? | Last update to web site 2009-07-02 |
| Scramdisk 4 Linux | Yes[54] | No | No | No | Yes[54] | No | No | ext2, ext3, reiserfs, minix, ntfs, vfat/msdos | No |
| SecuBox | No | No | No | No | Yes | No | No | ? | No |
| Secude securenotebook | No | Yes | Yes | No | Yes | No | No | ? | ? |
| SecureDoc | No | Yes[55] | Yes | Yes | Yes | Yes | Yes | ? | Yes |
| Sentry 2020 | No | No | No | ? | ? | No | No | ? | ? |
| softraid / RAID C | No | No | ? | ? | ? | Yes | ? | Any supported by OS | ? |
| svnd / vnconfig | No | No | No | No | Yes (optional by using -K) [56] | Yes | ? | Any supported by OS | ? |
| Symantec Endpoint Encryption | No | Yes | Yes | Yes | Yes | No | No | NTFS, FAT32 | Yes |
| TrueCrypt | Yes (limited to one per "outer" container) |
only on Windows[57] | No | No[58] | Yes | No | No | Any supported by OS | Yes |
| Name | Hidden containers | Pre-boot authentication | Custom authentication | Multiple keys | Passphrase strengthening | Hardware acceleration | TPM | Filesystems | Two-factor authentication |
- ^ Windows 7 introduces Bitlocker-To-Go which supports NTFS, FAT32 or exFAT, however for hard drive encryption, Windows Vista and later are limited to be installable only on NTFS volumes
- ^ BitLocker can be used with a TPM PIN + external USB key for two-factor authentication
Layering
For more details on this topic, see Encryption layer in storage stack.
- Whole disk: Whether the whole physical disk or logical volume can be encrypted, including the partition tables and master boot record. Note that this does not imply that the encrypted disk can be booted off of; refer to "pre-boot authentication" in the features comparison table.
- Partition: Whether individual disk partitions can be encrypted.
- File: Whether the encrypted container can be stored in a file (usually implemented as encrypted loop devices).
- Swap space: Whether the swap space (called a "pagefile" on Windows) can be encrypted individually/explicitly.
- Hibernation file: Whether the hibernation file is encrypted (if hibernation is supported).
| Name | Whole disk | Partition | File | Swap space | Hibernation file |
|---|---|---|---|---|---|
| ArchiCrypt Live | Yes (except for the boot volume) |
Yes | Yes | No | No |
| BestCrypt | Yes | Yes | Yes | Yes | Yes[59] |
| BitArmor DataControl | No | Yes | No | Yes | Yes |
| BitLocker Drive Encryption | Yes (except for the boot volume) |
Yes | No | Yes (parent volume is encrypted) |
Yes (parent volume is encrypted) |
| Bloombase Keyparc | Yes | Yes | Yes | Yes | No |
| CGD | Yes | Yes | Yes[34] | Yes | No |
| Check Point Full Disk Encryption | Yes | Yes | ? | Yes | Yes |
| CrossCrypt | No | No | Yes | No | No |
| CryptArchiver | No | No | Yes | No | No |
| cryptoloop | Yes | Yes | Yes | Yes | No |
| DiskCryptor | Yes | Yes | No | Yes | Yes |
| dm-crypt | Yes | Yes | Yes[60] | Yes | Yes[61] |
| DriveCrypt | Yes | Yes[41] | Yes[41] | No | No |
| DriveSentry GoAnywhere 2 | No | Yes | Yes | No | No |
| E4M | No | Yes | Yes | No | No |
| e-Capsule Private Safe | No | No | Yes[62] | No | No |
| eCryptfs | No | No | Yes | No | No |
| FileVault | No | No | Yes[43] | Yes[43] | No |
| FREE CompuSec | Yes | No | Yes | Yes | Yes |
| FreeOTFE | Yes (except for the boot volume) |
Yes | Yes | No | No |
| GBDE | Yes | Yes | Yes[63] | Yes | No |
| GELI | Yes | Yes | Yes[63] | Yes | No |
| GuardianEdge Hard Disk Encryption | Yes | Yes | Yes | Yes | Yes |
| loop-AES | Yes | Yes[49] | Yes[49] | Yes[49] | No |
| n-Crypt Pro | Yes | Yes | Yes | No | No |
| PGPDisk | Yes | Yes | Yes | Yes | Yes |
| Private Disk | No | No | Yes | No | No |
| R-Crypto | No | No | Yes | No | No |
| Safeboot Device Encryption (Now McAfee Endpoint Encryption) |
Yes | Yes | Yes | Yes | Yes[64] |
| SafeGuard Easy | Yes | Yes | No | Yes | Yes[citation needed] |
| SafeHouse Professional | No | No | Yes | No | No |
| Scramdisk | No | Yes | Yes | No | No |
| Scramdisk 4 Linux | Yes | Yes | Yes | Yes | No |
| SecuBox | No | No | Yes | Template:N/a | No |
| Secude securenotebook | Yes | Yes | No | No | No |
| SecureDoc | Yes[55] | Yes | Yes | Yes | Yes |
| Sentry 2020 | No | No | Yes | No | No |
| softraid / RAID C | Yes | Yes | No | Yes (encrypted by default in OpenBSD)[65] | No |
| svnd / vnconfig | ? | Yes | Yes | Yes (encrypted by default in OpenBSD) | ? |
| SpyProof! | No | Yes | Yes | No | No |
| Symantec Endpoint Encryption | Yes | Yes | Yes | Yes | Yes |
| TrueCrypt | Yes | Yes | Yes | Yes | only on Windows[57] |
| Name | Whole disk | Partition | File | Swap space | Hibernation file |
Modes of operation
For more details on this topic, see Disk encryption theory.
Different modes of operation supported by the software. Note that an encrypted volume can only use one mode of operation.
- CBC with predictable IVs: The CBC (cipher block chaining) mode where initialization vectors are statically derived from the sector number and are not secret; this means that IVs are re-used when overwriting a sector and the vectors can easily be guessed by an attacker, leading to watermarking attacks.
- CBC with secret IVs: The CBC mode where initialization vectors are statically derived from the encryption key and sector number. The IVs are secret, but they are re-used with overwrites. Methods for this include ESSIV and encrypted sector numbers (CGD).
- CBC with random per-sector keys: The CBC mode where random keys are generated for each sector when it is written to, thus does not exhibit the typical weaknesses of CBC with re-used initialization vectors. The individual sector keys are stored on disk and encrypted with a master key. (See GBDE for details)
- LRW: The Liskov-Rivest-Wagner tweakable narrow-block mode, a mode of operation specifically designed for disk encryption. Superseded by the more secure XTS mode due to security concerns.[66]
- XTS: XEX-based Tweaked CodeBook mode (TCB) with CipherText Stealing (CTS), the SISWG (IEEE P1619) standard for disk encryption.
| Name | CBC w/ predictable IVs | CBC w/ secret IVs | CBC w/ random per-sector keys | LRW | XTS |
|---|---|---|---|---|---|
| ArchiCrypt Live | No | No | No | Legacy support [67] | Yes |
| BestCrypt | ? | ? | No | Yes[68] | Yes[69] |
| BitArmor DataControl | No | Yes | Plumb-IV | No | No |
| BitLocker Drive Encryption | No[70] | Yes[70] | No | No | No |
| Bloombase Keyparc | ? | Yes | ? | ? | ? |
| CGD | No | Yes[71] | No | No | No |
| Check Point Full Disk Encryption | ? | ? | ? | ? | ? |
| CrossCrypt | Yes | No | No | No | No |
| CryptArchiver | ? | ? | ? | ? | ? |
| cryptoloop | Yes | No | No | No | No |
| DiskCryptor | No | No | No | No | Yes |
| dm-crypt | Yes | Yes | No | Yes, using *-lrw-benbi[72] | Yes, using *-xts-plain |
| DriveCrypt | ? | ? | ? | ? | ? |
| DriveSentry GoAnywhere 2 | ? | ? | ? | ? | ? |
| E4M | ? | ? | ? | No | No |
| e-Capsule Private Safe | ? | ? | ? | ? | ? |
| eCryptfs | No | Yes | ? | No | No |
| FileVault | Yes[43] | No | No | No | No |
| FREE CompuSec | ? | ? | ? | ? | ? |
| FreeOTFE | Yes | Yes | No | Yes | Yes |
| GBDE | No | No | Yes[47] | No | No |
| GELI | No | Yes[73] | No | No | No |
| GuardianEdge Hard Disk Encryption | No | No | Yes | No | No |
| loop-AES | single-key, multi-key-v2 modes[49] | multi-key-v3 mode[49] | No | No | No |
| n-Crypt Pro | ? | ? | No | No | No |
| PGPDisk | ? | ? | ? | ? | ? |
| Private Disk | Yes | No | Yes[citation needed] | No | No |
| R-Crypto | ? | ? | ? | ? | ? |
| McAfee Endpoint Encryption for PC's (SafeBoot Device Encryption) | No | Yes | No | No | No |
| SafeGuard Easy | ? | ? | ? | ? | ? |
| SafeHouse Professional | Yes | No | No | No | No |
| Scramdisk | No | Yes | No | No | No |
| Scramdisk 4 Linux | No | Yes[74] | No | Yes[75] | Yes[76] |
| SecuBox | Yes | No | No | No | No |
| Secude securenotebook | ? | ? | ? | ? | ? |
| SecureDoc | ? | ? | ? | ? | ? |
| Sentry 2020 | ? | ? | ? | ? | ? |
| softraid / RAID C | ? | ? | ? | ? | Yes [77] |
| svnd / vnconfig | ? | ? | ? | ? | ? |
| Symantec Endpoint Encryption | No | No | Yes | No | No |
| TrueCrypt | Legacy support [78] | No | No | Legacy support [79] | Yes [80] |
| Name | CBC w/ predictable IVs | CBC w/ secret IVs | CBC w/ random per-sector keys | LRW | XTS |
See also
External links
- On-The-Fly Encryption: A Comparison - A much larger comparison of disk encryption software, sorted by OS
Notes and references
- ↑ {{Expansion depth limit exceeded|[[{{{Expansion depth limit exceeded}}} |{{{Expansion depth limit exceeded}}}{{Expansion depth limit exceeded|, {{{Expansion depth limit exceeded}}} }}]] |{{{Expansion depth limit exceeded}}}{{Expansion depth limit exceeded|, {{{Expansion depth limit exceeded}}} }} }}{{Expansion depth limit exceeded|[{{{Expansion depth limit exceeded}}} {{{Expansion depth limit exceeded}}}] |{{{Expansion depth limit exceeded}}} }}, {{Expansion depth limit exceeded|{{{Expansion depth limit exceeded}}} |{{{Expansion depth limit exceeded}}} }}.<span class="Z3988" title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle={{Expansion depth limit exceeded}}&rft.aulast=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.au=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.au=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.date=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.pages=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft_id=&rfr_id=info:sid/en.wikipedia.org:Comparison_of_disk_encryption_software">
- ↑ {{Expansion depth limit exceeded|[[{{{Expansion depth limit exceeded}}} |{{{Expansion depth limit exceeded}}}{{Expansion depth limit exceeded|, {{{Expansion depth limit exceeded}}} }}]] |{{{Expansion depth limit exceeded}}}{{Expansion depth limit exceeded|, {{{Expansion depth limit exceeded}}} }} }}{{Expansion depth limit exceeded|[{{{Expansion depth limit exceeded}}} {{{Expansion depth limit exceeded}}}] |{{{Expansion depth limit exceeded}}} }}, {{Expansion depth limit exceeded|{{{Expansion depth limit exceeded}}} |{{{Expansion depth limit exceeded}}} }}.<span class="Z3988" title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle={{Expansion depth limit exceeded}}&rft.aulast=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.au=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.au=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.date=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.pages=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft_id=&rfr_id=info:sid/en.wikipedia.org:Comparison_of_disk_encryption_software">
- ↑ Original release as Protect Data Security Inc.'s "Protect!style="background: #ececec; color: black; text-align: left; padding-left: 0.5em; font-weight: bold;" class="table-rh"|"{{Expansion depth limit exceeded|[[{{{Expansion depth limit exceeded}}} |{{{Expansion depth limit exceeded}}}{{Expansion depth limit exceeded|, {{{Expansion depth limit exceeded}}} }}]] |{{{Expansion depth limit exceeded}}}{{Expansion depth limit exceeded|, {{{Expansion depth limit exceeded}}} }} }}{{Expansion depth limit exceeded|[{{{Expansion depth limit exceeded}}} {{{Expansion depth limit exceeded}}}] |{{{Expansion depth limit exceeded}}} }}, {{Expansion depth limit exceeded|{{{Expansion depth limit exceeded}}} |{{{Expansion depth limit exceeded}}} }}.<span class="Z3988" title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle={{Expansion depth limit exceeded}}&rft.aulast=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.au=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.au=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.date=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.pages=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft_id=&rfr_id=info:sid/en.wikipedia.org:Comparison_of_disk_encryption_software">
- ↑ Company and product name change to Pointsec {{Expansion depth limit exceeded|[[{{{Expansion depth limit exceeded}}} |{{{Expansion depth limit exceeded}}}{{Expansion depth limit exceeded|, {{{Expansion depth limit exceeded}}} }}]] |{{{Expansion depth limit exceeded}}}{{Expansion depth limit exceeded|, {{{Expansion depth limit exceeded}}} }} }}{{Expansion depth limit exceeded|[{{{Expansion depth limit exceeded}}} {{{Expansion depth limit exceeded}}}] |{{{Expansion depth limit exceeded}}} }}, {{Expansion depth limit exceeded|{{{Expansion depth limit exceeded}}} |{{{Expansion depth limit exceeded}}} }}.<span class="Z3988" title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle={{Expansion depth limit exceeded}}&rft.aulast=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.au=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.au=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.date=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.pages=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft_id=&rfr_id=info:sid/en.wikipedia.org:Comparison_of_disk_encryption_software">
- ↑ {{Expansion depth limit exceeded|[[{{{Expansion depth limit exceeded}}} |{{{Expansion depth limit exceeded}}}{{Expansion depth limit exceeded|, {{{Expansion depth limit exceeded}}} }}]] |{{{Expansion depth limit exceeded}}}{{Expansion depth limit exceeded|, {{{Expansion depth limit exceeded}}} }} }}{{Expansion depth limit exceeded|[{{{Expansion depth limit exceeded}}} {{{Expansion depth limit exceeded}}}] |{{{Expansion depth limit exceeded}}} }}, {{Expansion depth limit exceeded|{{{Expansion depth limit exceeded}}} |{{{Expansion depth limit exceeded}}} }}.<span class="Z3988" title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle={{Expansion depth limit exceeded}}&rft.aulast=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.au=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.au=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.date=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.pages=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft_id=&rfr_id=info:sid/en.wikipedia.org:Comparison_of_disk_encryption_software">
- ↑ {{Expansion depth limit exceeded|[[{{{Expansion depth limit exceeded}}} |{{{Expansion depth limit exceeded}}}{{Expansion depth limit exceeded|, {{{Expansion depth limit exceeded}}} }}]] |{{{Expansion depth limit exceeded}}}{{Expansion depth limit exceeded|, {{{Expansion depth limit exceeded}}} }} }}{{Expansion depth limit exceeded|[{{{Expansion depth limit exceeded}}} {{{Expansion depth limit exceeded}}}] |{{{Expansion depth limit exceeded}}} }}, {{Expansion depth limit exceeded|{{{Expansion depth limit exceeded}}} |{{{Expansion depth limit exceeded}}} }}.<span class="Z3988" title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle={{Expansion depth limit exceeded}}&rft.aulast=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.au=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.au=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.date=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.pages=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft_id=&rfr_id=info:sid/en.wikipedia.org:Comparison_of_disk_encryption_software">
- ↑ Initial cryptoloop patches for the Linux 2.5 development kernel: http://uwsg.iu.edu/hypermail/linux/kernel/0307.0/0348.html
- ↑ dm-crypt was first included in Linux kernel version 2.6.4: http://lwn.net/Articles/75404/
- ↑ {{Expansion depth limit exceeded|[[{{{Expansion depth limit exceeded}}} |{{{Expansion depth limit exceeded}}}{{Expansion depth limit exceeded|, {{{Expansion depth limit exceeded}}} }}]] |{{{Expansion depth limit exceeded}}}{{Expansion depth limit exceeded|, {{{Expansion depth limit exceeded}}} }} }}{{Expansion depth limit exceeded|[{{{Expansion depth limit exceeded}}} {{{Expansion depth limit exceeded}}}] |{{{Expansion depth limit exceeded}}} }}, {{Expansion depth limit exceeded|{{{Expansion depth limit exceeded}}} |{{{Expansion depth limit exceeded}}} }}.<span class="Z3988" title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle={{Expansion depth limit exceeded}}&rft.aulast=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.au=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.au=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.date=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.pages=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft_id=&rfr_id=info:sid/en.wikipedia.org:Comparison_of_disk_encryption_software">
- ↑ {{Expansion depth limit exceeded|[[{{{Expansion depth limit exceeded}}} |{{{Expansion depth limit exceeded}}}{{Expansion depth limit exceeded|, {{{Expansion depth limit exceeded}}} }}]] |{{{Expansion depth limit exceeded}}}{{Expansion depth limit exceeded|, {{{Expansion depth limit exceeded}}} }} }}{{Expansion depth limit exceeded|[{{{Expansion depth limit exceeded}}} {{{Expansion depth limit exceeded}}}] |{{{Expansion depth limit exceeded}}} }}, {{Expansion depth limit exceeded|{{{Expansion depth limit exceeded}}} |{{{Expansion depth limit exceeded}}} }}.<span class="Z3988" title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle={{Expansion depth limit exceeded}}&rft.aulast=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.au=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.au=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.date=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.pages=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft_id=&rfr_id=info:sid/en.wikipedia.org:Comparison_of_disk_encryption_software">).
- ↑ {{Expansion depth limit exceeded|[[{{{Expansion depth limit exceeded}}} |{{{Expansion depth limit exceeded}}}{{Expansion depth limit exceeded|, {{{Expansion depth limit exceeded}}} }}]] |{{{Expansion depth limit exceeded}}}{{Expansion depth limit exceeded|, {{{Expansion depth limit exceeded}}} }} }}{{Expansion depth limit exceeded|[{{{Expansion depth limit exceeded}}} {{{Expansion depth limit exceeded}}}] |{{{Expansion depth limit exceeded}}} }}, {{Expansion depth limit exceeded|{{{Expansion depth limit exceeded}}} |{{{Expansion depth limit exceeded}}} }}.<span class="Z3988" title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle={{Expansion depth limit exceeded}}&rft.aulast=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.au=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.au=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.date=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.pages=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft_id=&rfr_id=info:sid/en.wikipedia.org:Comparison_of_disk_encryption_software">
- ↑ {{Expansion depth limit exceeded|[[{{{Expansion depth limit exceeded}}} |{{{Expansion depth limit exceeded}}}{{Expansion depth limit exceeded|, {{{Expansion depth limit exceeded}}} }}]] |{{{Expansion depth limit exceeded}}}{{Expansion depth limit exceeded|, {{{Expansion depth limit exceeded}}} }} }}{{Expansion depth limit exceeded|[{{{Expansion depth limit exceeded}}} {{{Expansion depth limit exceeded}}}] |{{{Expansion depth limit exceeded}}} }}, {{Expansion depth limit exceeded|{{{Expansion depth limit exceeded}}} |{{{Expansion depth limit exceeded}}} }}.<span class="Z3988" title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle={{Expansion depth limit exceeded}}&rft.aulast=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.au=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.au=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.date=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.pages=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft_id=&rfr_id=info:sid/en.wikipedia.org:Comparison_of_disk_encryption_software">
- ↑ {{Expansion depth limit exceeded|[[{{{Expansion depth limit exceeded}}} |{{{Expansion depth limit exceeded}}}{{Expansion depth limit exceeded|, {{{Expansion depth limit exceeded}}} }}]] |{{{Expansion depth limit exceeded}}}{{Expansion depth limit exceeded|, {{{Expansion depth limit exceeded}}} }} }}{{Expansion depth limit exceeded|[{{{Expansion depth limit exceeded}}} {{{Expansion depth limit exceeded}}}] |{{{Expansion depth limit exceeded}}} }}, {{Expansion depth limit exceeded|{{{Expansion depth limit exceeded}}} |{{{Expansion depth limit exceeded}}} }}.<span class="Z3988" title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle={{Expansion depth limit exceeded}}&rft.aulast=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.au=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.au=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.date=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.pages=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft_id=&rfr_id=info:sid/en.wikipedia.org:Comparison_of_disk_encryption_software">
- ↑ {{Expansion depth limit exceeded|[[{{{Expansion depth limit exceeded}}} |{{{Expansion depth limit exceeded}}}{{Expansion depth limit exceeded|, {{{Expansion depth limit exceeded}}} }}]] |{{{Expansion depth limit exceeded}}}{{Expansion depth limit exceeded|, {{{Expansion depth limit exceeded}}} }} }}{{Expansion depth limit exceeded|[{{{Expansion depth limit exceeded}}} {{{Expansion depth limit exceeded}}}] |{{{Expansion depth limit exceeded}}} }}, {{Expansion depth limit exceeded|{{{Expansion depth limit exceeded}}} |{{{Expansion depth limit exceeded}}} }}.<span class="Z3988" title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle={{Expansion depth limit exceeded}}&rft.aulast=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.au=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.au=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.date=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.pages=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft_id=&rfr_id=info:sid/en.wikipedia.org:Comparison_of_disk_encryption_software">
- ↑ "PGP 6.0 Freeware released - any int'l links?". comp.security.pgp. (Web link). Retrieved on 2007-01-04.
- ↑ {{Expansion depth limit exceeded|[[{{{Expansion depth limit exceeded}}} |{{{Expansion depth limit exceeded}}}{{Expansion depth limit exceeded|, {{{Expansion depth limit exceeded}}} }}]] |{{{Expansion depth limit exceeded}}}{{Expansion depth limit exceeded|, {{{Expansion depth limit exceeded}}} }} }}{{Expansion depth limit exceeded|[{{{Expansion depth limit exceeded}}} {{{Expansion depth limit exceeded}}}] |{{{Expansion depth limit exceeded}}} }}, {{Expansion depth limit exceeded|{{{Expansion depth limit exceeded}}} |{{{Expansion depth limit exceeded}}} }}.<span class="Z3988" title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle={{Expansion depth limit exceeded}}&rft.aulast=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.au=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.au=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.date=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.pages=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft_id=&rfr_id=info:sid/en.wikipedia.org:Comparison_of_disk_encryption_software">
- ↑ {{Expansion depth limit exceeded|[[{{{Expansion depth limit exceeded}}} |{{{Expansion depth limit exceeded}}}{{Expansion depth limit exceeded|, {{{Expansion depth limit exceeded}}} }}]] |{{{Expansion depth limit exceeded}}}{{Expansion depth limit exceeded|, {{{Expansion depth limit exceeded}}} }} }}{{Expansion depth limit exceeded|[{{{Expansion depth limit exceeded}}} {{{Expansion depth limit exceeded}}}] |{{{Expansion depth limit exceeded}}} }}, {{Expansion depth limit exceeded|{{{Expansion depth limit exceeded}}} |{{{Expansion depth limit exceeded}}} }}.<span class="Z3988" title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle={{Expansion depth limit exceeded}}&rft.aulast=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.au=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.au=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.date=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.pages=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft_id=&rfr_id=info:sid/en.wikipedia.org:Comparison_of_disk_encryption_software">
- ↑ {{Expansion depth limit exceeded|[[{{{Expansion depth limit exceeded}}} |{{{Expansion depth limit exceeded}}}{{Expansion depth limit exceeded|, {{{Expansion depth limit exceeded}}} }}]] |{{{Expansion depth limit exceeded}}}{{Expansion depth limit exceeded|, {{{Expansion depth limit exceeded}}} }} }}{{Expansion depth limit exceeded|[{{{Expansion depth limit exceeded}}} {{{Expansion depth limit exceeded}}}] |{{{Expansion depth limit exceeded}}} }}, {{Expansion depth limit exceeded|{{{Expansion depth limit exceeded}}} |{{{Expansion depth limit exceeded}}} }}.<span class="Z3988" title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle={{Expansion depth limit exceeded}}&rft.aulast=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.au=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.au=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.date=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.pages=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft_id=&rfr_id=info:sid/en.wikipedia.org:Comparison_of_disk_encryption_software">
- ↑ {{Expansion depth limit exceeded|[[{{{Expansion depth limit exceeded}}} |{{{Expansion depth limit exceeded}}}{{Expansion depth limit exceeded|, {{{Expansion depth limit exceeded}}} }}]] |{{{Expansion depth limit exceeded}}}{{Expansion depth limit exceeded|, {{{Expansion depth limit exceeded}}} }} }}{{Expansion depth limit exceeded|[{{{Expansion depth limit exceeded}}} {{{Expansion depth limit exceeded}}}] |{{{Expansion depth limit exceeded}}} }}, {{Expansion depth limit exceeded|{{{Expansion depth limit exceeded}}} |{{{Expansion depth limit exceeded}}} }}.<span class="Z3988" title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle={{Expansion depth limit exceeded}}&rft.aulast=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.au=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.au=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.date=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.pages=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft_id=&rfr_id=info:sid/en.wikipedia.org:Comparison_of_disk_encryption_software">
- ↑ Rebranded as ThinkVantage Client Security {{Expansion depth limit exceeded|[[{{{Expansion depth limit exceeded}}} |{{{Expansion depth limit exceeded}}}{{Expansion depth limit exceeded|, {{{Expansion depth limit exceeded}}} }}]] |{{{Expansion depth limit exceeded}}}{{Expansion depth limit exceeded|, {{{Expansion depth limit exceeded}}} }} }}{{Expansion depth limit exceeded|[{{{Expansion depth limit exceeded}}} {{{Expansion depth limit exceeded}}}] |{{{Expansion depth limit exceeded}}} }}, {{Expansion depth limit exceeded|{{{Expansion depth limit exceeded}}} |{{{Expansion depth limit exceeded}}} }}.<span class="Z3988" title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle={{Expansion depth limit exceeded}}&rft.aulast=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.au=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.au=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.date=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.pages=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft_id=&rfr_id=info:sid/en.wikipedia.org:Comparison_of_disk_encryption_software">
- ↑ {{Expansion depth limit exceeded|[[{{{Expansion depth limit exceeded}}} |{{{Expansion depth limit exceeded}}}{{Expansion depth limit exceeded|, {{{Expansion depth limit exceeded}}} }}]] |{{{Expansion depth limit exceeded}}}{{Expansion depth limit exceeded|, {{{Expansion depth limit exceeded}}} }} }}{{Expansion depth limit exceeded|[{{{Expansion depth limit exceeded}}} {{{Expansion depth limit exceeded}}}] |{{{Expansion depth limit exceeded}}} }}, {{Expansion depth limit exceeded|{{{Expansion depth limit exceeded}}} |{{{Expansion depth limit exceeded}}} }}.<span class="Z3988" title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle={{Expansion depth limit exceeded}}&rft.aulast=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.au=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.au=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.date=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.pages=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft_id=&rfr_id=info:sid/en.wikipedia.org:Comparison_of_disk_encryption_software">
- ↑ {{Expansion depth limit exceeded|[[{{{Expansion depth limit exceeded}}} |{{{Expansion depth limit exceeded}}}{{Expansion depth limit exceeded|, {{{Expansion depth limit exceeded}}} }}]] |{{{Expansion depth limit exceeded}}}{{Expansion depth limit exceeded|, {{{Expansion depth limit exceeded}}} }} }}{{Expansion depth limit exceeded|[{{{Expansion depth limit exceeded}}} {{{Expansion depth limit exceeded}}}] |{{{Expansion depth limit exceeded}}} }}, {{Expansion depth limit exceeded|{{{Expansion depth limit exceeded}}} |{{{Expansion depth limit exceeded}}} }}.<span class="Z3988" title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle={{Expansion depth limit exceeded}}&rft.aulast=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.au=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.au=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.date=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.pages=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft_id=&rfr_id=info:sid/en.wikipedia.org:Comparison_of_disk_encryption_software">
- ↑ OpenBSD 4.2 change notes
- ↑ OpenBSD 2.8 change notes
- ↑ TrueCrypt version history
- ↑ [1] PocketPC freeware release - SmartPhone beta available
- ↑ 27.0 27.1 [2] FreeOTFE supports dm-crypt/LUKS volumes
- ↑ [3] FreeOTFE4PDA supports dm-crypt/LUKS volumes
- ↑ [4] Supports Linux volumes
- ↑ Supported by the BestCrypt container format; see BestCrypt SDK
- ↑ Supported by the BestCrypt Volume Encryption software
- ↑ 32.0 32.1 32.2 {{Expansion depth limit exceeded|[[{{{Expansion depth limit exceeded}}} |{{{Expansion depth limit exceeded}}}{{Expansion depth limit exceeded|, {{{Expansion depth limit exceeded}}} }}]] |{{{Expansion depth limit exceeded}}}{{Expansion depth limit exceeded|, {{{Expansion depth limit exceeded}}} }} }}{{Expansion depth limit exceeded|[{{{Expansion depth limit exceeded}}} {{{Expansion depth limit exceeded}}}] |{{{Expansion depth limit exceeded}}} }}, {{Expansion depth limit exceeded|{{{Expansion depth limit exceeded}}} |{{{Expansion depth limit exceeded}}} }}.<span class="Z3988" title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle={{Expansion depth limit exceeded}}&rft.aulast=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.au=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.au=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.date=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.pages=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft_id=&rfr_id=info:sid/en.wikipedia.org:Comparison_of_disk_encryption_software">
- ↑ BitLocker Drive Encryption: Value Add Extensibility Options
- ↑ 34.0 34.1 34.2 34.3 {{Expansion depth limit exceeded|[{{{Expansion depth limit exceeded}}} {{{Expansion depth limit exceeded}}}] |{{{Expansion depth limit exceeded}}} }}, {{Expansion depth limit exceeded|{{{Expansion depth limit exceeded}}} |{{{Expansion depth limit exceeded}}} }}.<span class="Z3988" title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle={{Expansion depth limit exceeded}}&rft.date=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.pages=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft_id=&rfr_id=info:sid/en.wikipedia.org:Comparison_of_disk_encryption_software">
- ↑ {{Expansion depth limit exceeded|[[{{{Expansion depth limit exceeded}}} |{{{Expansion depth limit exceeded}}}{{Expansion depth limit exceeded|, {{{Expansion depth limit exceeded}}} }}]] |{{{Expansion depth limit exceeded}}}{{Expansion depth limit exceeded|, {{{Expansion depth limit exceeded}}} }} }}{{Expansion depth limit exceeded|[{{{Expansion depth limit exceeded}}} {{{Expansion depth limit exceeded}}}] |{{{Expansion depth limit exceeded}}} }}, {{Expansion depth limit exceeded|{{{Expansion depth limit exceeded}}} |{{{Expansion depth limit exceeded}}} }}.<span class="Z3988" title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle={{Expansion depth limit exceeded}}&rft.aulast=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.au=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.au=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.date=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.pages=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft_id=&rfr_id=info:sid/en.wikipedia.org:Comparison_of_disk_encryption_software">
- ↑ 36.0 36.1 {{Expansion depth limit exceeded|[[{{{Expansion depth limit exceeded}}} |{{{Expansion depth limit exceeded}}}{{Expansion depth limit exceeded|, {{{Expansion depth limit exceeded}}} }}]] |{{{Expansion depth limit exceeded}}}{{Expansion depth limit exceeded|, {{{Expansion depth limit exceeded}}} }} }}{{Expansion depth limit exceeded|[{{{Expansion depth limit exceeded}}} {{{Expansion depth limit exceeded}}}] |{{{Expansion depth limit exceeded}}} }}, {{Expansion depth limit exceeded|{{{Expansion depth limit exceeded}}} |{{{Expansion depth limit exceeded}}} }}.<span class="Z3988" title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle={{Expansion depth limit exceeded}}&rft.aulast=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.au=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.au=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.date=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.pages=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft_id=&rfr_id=info:sid/en.wikipedia.org:Comparison_of_disk_encryption_software">
- ↑ 37.0 37.1 37.2 dm-crypt and cryptoloop volumes can be mounted from the initrd before the system is booted
- ↑ Support for hardware cryptography found in VIA processors. http://diskcryptor.net/index.php/DiskCryptor_en#Program_features
- ↑ Ability to place boot loader on external medium and to authenticate using the key medium. Support for key files. http://diskcryptor.net/index.php/DiskCryptor_en#Program_features
- ↑ 40.0 40.1 {{Expansion depth limit exceeded|[[{{{Expansion depth limit exceeded}}} |{{{Expansion depth limit exceeded}}}{{Expansion depth limit exceeded|, {{{Expansion depth limit exceeded}}} }}]] |{{{Expansion depth limit exceeded}}}{{Expansion depth limit exceeded|, {{{Expansion depth limit exceeded}}} }} }}{{Expansion depth limit exceeded|[{{{Expansion depth limit exceeded}}} {{{Expansion depth limit exceeded}}}] |{{{Expansion depth limit exceeded}}} }}, {{Expansion depth limit exceeded|{{{Expansion depth limit exceeded}}} |{{{Expansion depth limit exceeded}}} }}.<span class="Z3988" title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle={{Expansion depth limit exceeded}}&rft.aulast=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.au=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.au=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.date=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.pages=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft_id=&rfr_id=info:sid/en.wikipedia.org:Comparison_of_disk_encryption_software">
- ↑ 41.0 41.1 41.2 {{Expansion depth limit exceeded|[[{{{Expansion depth limit exceeded}}} |{{{Expansion depth limit exceeded}}}{{Expansion depth limit exceeded|, {{{Expansion depth limit exceeded}}} }}]] |{{{Expansion depth limit exceeded}}}{{Expansion depth limit exceeded|, {{{Expansion depth limit exceeded}}} }} }}{{Expansion depth limit exceeded|[{{{Expansion depth limit exceeded}}} {{{Expansion depth limit exceeded}}}] |{{{Expansion depth limit exceeded}}} }}, {{Expansion depth limit exceeded|{{{Expansion depth limit exceeded}}} |{{{Expansion depth limit exceeded}}} }}.<span class="Z3988" title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle={{Expansion depth limit exceeded}}&rft.aulast=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.au=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.au=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.date=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.pages=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft_id=&rfr_id=info:sid/en.wikipedia.org:Comparison_of_disk_encryption_software">
- ↑ 42.0 42.1 {{Expansion depth limit exceeded|[[{{{Expansion depth limit exceeded}}} |{{{Expansion depth limit exceeded}}}{{Expansion depth limit exceeded|, {{{Expansion depth limit exceeded}}} }}]] |{{{Expansion depth limit exceeded}}}{{Expansion depth limit exceeded|, {{{Expansion depth limit exceeded}}} }} }}{{Expansion depth limit exceeded|[{{{Expansion depth limit exceeded}}} {{{Expansion depth limit exceeded}}}] |{{{Expansion depth limit exceeded}}} }}, {{Expansion depth limit exceeded|{{{Expansion depth limit exceeded}}} |{{{Expansion depth limit exceeded}}} }}.<span class="Z3988" title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle={{Expansion depth limit exceeded}}&rft.aulast=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.au=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.au=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.date=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.pages=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft_id=&rfr_id=info:sid/en.wikipedia.org:Comparison_of_disk_encryption_software">
- ↑ 43.0 43.1 43.2 43.3 43.4 {{Expansion depth limit exceeded|[{{{Expansion depth limit exceeded}}} {{{Expansion depth limit exceeded}}}] |{{{Expansion depth limit exceeded}}} }}, {{Expansion depth limit exceeded|{{{Expansion depth limit exceeded}}} |{{{Expansion depth limit exceeded}}} }}.<span class="Z3988" title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle={{Expansion depth limit exceeded}}&rft.date=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.pages=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft_id=&rfr_id=info:sid/en.wikipedia.org:Comparison_of_disk_encryption_software">
- ↑ FreeOTFE has a modular architecture and set of components to allow 3rd party integration
- ↑ FreeOTFE allows multiple keys to mount the same container file via encrypted keyfiles
- ↑ 46.0 46.1 46.2 46.3 {{Expansion depth limit exceeded|[[{{{Expansion depth limit exceeded}}} |{{{Expansion depth limit exceeded}}}{{Expansion depth limit exceeded|, {{{Expansion depth limit exceeded}}} }}]] |{{{Expansion depth limit exceeded}}}{{Expansion depth limit exceeded|, {{{Expansion depth limit exceeded}}} }} }}{{Expansion depth limit exceeded|[{{{Expansion depth limit exceeded}}} {{{Expansion depth limit exceeded}}}] |{{{Expansion depth limit exceeded}}} }}, {{Expansion depth limit exceeded|{{{Expansion depth limit exceeded}}} |{{{Expansion depth limit exceeded}}} }}.<span class="Z3988" title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle={{Expansion depth limit exceeded}}&rft.aulast=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.au=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.au=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.date=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.pages=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft_id=&rfr_id=info:sid/en.wikipedia.org:Comparison_of_disk_encryption_software">
- ↑ 47.0 47.1 47.2 {{Expansion depth limit exceeded|[{{{Expansion depth limit exceeded}}} {{{Expansion depth limit exceeded}}}] |{{{Expansion depth limit exceeded}}} }}, {{Expansion depth limit exceeded|{{{Expansion depth limit exceeded}}} |{{{Expansion depth limit exceeded}}} }}.<span class="Z3988" title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle={{Expansion depth limit exceeded}}&rft.date=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.pages=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft_id=&rfr_id=info:sid/en.wikipedia.org:Comparison_of_disk_encryption_software">
- ↑ 48.0 48.1 {{Expansion depth limit exceeded|[[{{{Expansion depth limit exceeded}}} |{{{Expansion depth limit exceeded}}}{{Expansion depth limit exceeded|, {{{Expansion depth limit exceeded}}} }}]] |{{{Expansion depth limit exceeded}}}{{Expansion depth limit exceeded|, {{{Expansion depth limit exceeded}}} }} }}{{Expansion depth limit exceeded|[{{{Expansion depth limit exceeded}}} {{{Expansion depth limit exceeded}}}] |{{{Expansion depth limit exceeded}}} }}, {{Expansion depth limit exceeded|{{{Expansion depth limit exceeded}}} |{{{Expansion depth limit exceeded}}} }}.<span class="Z3988" title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle={{Expansion depth limit exceeded}}&rft.aulast=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.au=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.au=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.date=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.pages=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft_id=&rfr_id=info:sid/en.wikipedia.org:Comparison_of_disk_encryption_software">
- ↑ 49.0 49.1 49.2 49.3 49.4 49.5 49.6 49.7 49.8 49.9 {{Expansion depth limit exceeded|[[{{{Expansion depth limit exceeded}}} |{{{Expansion depth limit exceeded}}}{{Expansion depth limit exceeded|, {{{Expansion depth limit exceeded}}} }}]] |{{{Expansion depth limit exceeded}}}{{Expansion depth limit exceeded|, {{{Expansion depth limit exceeded}}} }} }}{{Expansion depth limit exceeded|[{{{Expansion depth limit exceeded}}} {{{Expansion depth limit exceeded}}}] |{{{Expansion depth limit exceeded}}} }}, {{Expansion depth limit exceeded|{{{Expansion depth limit exceeded}}} |{{{Expansion depth limit exceeded}}} }}.<span class="Z3988" title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle={{Expansion depth limit exceeded}}&rft.aulast=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.au=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.au=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.date=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.pages=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft_id=&rfr_id=info:sid/en.wikipedia.org:Comparison_of_disk_encryption_software">
- ↑ n-Crypt Pro does not use password authentication — biometric/USB dongle authentication only
- ↑ {{Expansion depth limit exceeded|[[{{{Expansion depth limit exceeded}}} |{{{Expansion depth limit exceeded}}}{{Expansion depth limit exceeded|, {{{Expansion depth limit exceeded}}} }}]] |{{{Expansion depth limit exceeded}}}{{Expansion depth limit exceeded|, {{{Expansion depth limit exceeded}}} }} }}{{Expansion depth limit exceeded|[{{{Expansion depth limit exceeded}}} {{{Expansion depth limit exceeded}}}] |{{{Expansion depth limit exceeded}}} }}, {{Expansion depth limit exceeded|{{{Expansion depth limit exceeded}}} |{{{Expansion depth limit exceeded}}} }}.<span class="Z3988" title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle={{Expansion depth limit exceeded}}&rft.aulast=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.au=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.au=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.date=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.pages=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft_id=&rfr_id=info:sid/en.wikipedia.org:Comparison_of_disk_encryption_software">
- ↑ PGP private keys are always protected by strengthened passphrases
- ↑ {{Expansion depth limit exceeded|[[{{{Expansion depth limit exceeded}}} |{{{Expansion depth limit exceeded}}}{{Expansion depth limit exceeded|, {{{Expansion depth limit exceeded}}} }}]] |{{{Expansion depth limit exceeded}}}{{Expansion depth limit exceeded|, {{{Expansion depth limit exceeded}}} }} }}{{Expansion depth limit exceeded|[{{{Expansion depth limit exceeded}}} {{{Expansion depth limit exceeded}}}] |{{{Expansion depth limit exceeded}}} }}, {{Expansion depth limit exceeded|{{{Expansion depth limit exceeded}}} |{{{Expansion depth limit exceeded}}} }}.<span class="Z3988" title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle={{Expansion depth limit exceeded}}&rft.aulast=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.au=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.au=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.date=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.pages=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft_id=&rfr_id=info:sid/en.wikipedia.org:Comparison_of_disk_encryption_software">
- ↑ 54.0 54.1 For Truecrypt containers
- ↑ 55.0 55.1 {{Expansion depth limit exceeded|[[{{{Expansion depth limit exceeded}}} |{{{Expansion depth limit exceeded}}}{{Expansion depth limit exceeded|, {{{Expansion depth limit exceeded}}}
}}]]
|{{{Expansion depth limit exceeded}}}{{Expansion depth limit exceeded|, {{{Expansion depth limit exceeded}}}
}}
}}{{Expansion depth limit exceeded|[{{{Expansion depth limit exceeded}}} {{{Expansion depth limit exceeded}}}]
|{{{Expansion depth limit exceeded}}}
}}, {{Expansion depth limit exceeded|{{{Expansion depth limit exceeded}}}
|{{{Expansion depth limit exceeded}}}
}}.<span
class="Z3988"
title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle={{Expansion depth limit exceeded}}&rft.aulast=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.au=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.au=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.date=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.pages=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft_id=&rfr_id=info:sid/en.wikipedia.org:Comparison_of_disk_encryption_software"> Cite error: Invalid
<ref>tag; name "sdoc-faq" defined multiple times with different content - ↑ http://www.openbsd.org/cgi-bin/man.cgi?query=vnconfig&sektion=8 OpenBSD Manual Pages: vnconfig(8)
- ↑ 57.0 57.1 http://www.truecrypt.org/docs/sys-encryption-supported-os.php
- ↑ Although each volume encrypted with TrueCrypt can only have one active master key, it is possible to access its contents through more than one header. Each header can have a different password and/or keyfiles if any (cf. TrueCrypt FAQ: Is there a way for an administrator to reset a password when a user forgets it?)
- ↑ http://www.jetico.com/data-protection-encryption-bestcrypt-volume-encryption-enterprise/
- ↑ dm-crypt can encrypt a file-based volume when used with the losetup utility included with all major Linux distributions
- ↑ yes, but the user needs custom scripts: http://www.linuxquestions.org/questions/slackware-14/luks-encryption-swap-and-hibernate-627958/
- ↑ Uses proprietary e-Capsule file system not exposed to the OS.
- ↑ 63.0 63.1 File-based volume encryption is possible when used with mdconfig(8) utility.
- ↑ {{Expansion depth limit exceeded|[[{{{Expansion depth limit exceeded}}} |{{{Expansion depth limit exceeded}}}{{Expansion depth limit exceeded|, {{{Expansion depth limit exceeded}}} }}]] |{{{Expansion depth limit exceeded}}}{{Expansion depth limit exceeded|, {{{Expansion depth limit exceeded}}} }} }}{{Expansion depth limit exceeded|[{{{Expansion depth limit exceeded}}} {{{Expansion depth limit exceeded}}}] |{{{Expansion depth limit exceeded}}} }}, {{Expansion depth limit exceeded|{{{Expansion depth limit exceeded}}} |{{{Expansion depth limit exceeded}}} }}.<span class="Z3988" title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle={{Expansion depth limit exceeded}}&rft.aulast=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.au=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.au=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.date=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.pages=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft_id=&rfr_id=info:sid/en.wikipedia.org:Comparison_of_disk_encryption_software">
- ↑ http://www.openbsd.org/plus38.html OpenBSD 3.8 change notes
- ↑ LRW_issue
- ↑ Containers created with ArchiCrypt Live version 5 use LRW
- ↑ {{Expansion depth limit exceeded|[[{{{Expansion depth limit exceeded}}} |{{{Expansion depth limit exceeded}}}{{Expansion depth limit exceeded|, {{{Expansion depth limit exceeded}}} }}]] |{{{Expansion depth limit exceeded}}}{{Expansion depth limit exceeded|, {{{Expansion depth limit exceeded}}} }} }}{{Expansion depth limit exceeded|[{{{Expansion depth limit exceeded}}} {{{Expansion depth limit exceeded}}}] |{{{Expansion depth limit exceeded}}} }}, {{Expansion depth limit exceeded|{{{Expansion depth limit exceeded}}} |{{{Expansion depth limit exceeded}}} }}.<span class="Z3988" title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle={{Expansion depth limit exceeded}}&rft.aulast=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.au=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.au=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.date=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.pages=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft_id=&rfr_id=info:sid/en.wikipedia.org:Comparison_of_disk_encryption_software">
- ↑ {{Expansion depth limit exceeded|[[{{{Expansion depth limit exceeded}}} |{{{Expansion depth limit exceeded}}}{{Expansion depth limit exceeded|, {{{Expansion depth limit exceeded}}} }}]] |{{{Expansion depth limit exceeded}}}{{Expansion depth limit exceeded|, {{{Expansion depth limit exceeded}}} }} }}{{Expansion depth limit exceeded|[{{{Expansion depth limit exceeded}}} {{{Expansion depth limit exceeded}}}] |{{{Expansion depth limit exceeded}}} }}, {{Expansion depth limit exceeded|{{{Expansion depth limit exceeded}}} |{{{Expansion depth limit exceeded}}} }}.<span class="Z3988" title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle={{Expansion depth limit exceeded}}&rft.aulast=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.au=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.au=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.date=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.pages=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft_id=&rfr_id=info:sid/en.wikipedia.org:Comparison_of_disk_encryption_software">
- ↑ 70.0 70.1 {{Expansion depth limit exceeded|[{{{Expansion depth limit exceeded}}} {{{Expansion depth limit exceeded}}}] |{{{Expansion depth limit exceeded}}} }}, {{Expansion depth limit exceeded|{{{Expansion depth limit exceeded}}} |{{{Expansion depth limit exceeded}}} }}.<span class="Z3988" title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle={{Expansion depth limit exceeded}}&rft.date=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.pages=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft_id=&rfr_id=info:sid/en.wikipedia.org:Comparison_of_disk_encryption_software">
- ↑ {{Expansion depth limit exceeded|[[{{{Expansion depth limit exceeded}}} |{{{Expansion depth limit exceeded}}}{{Expansion depth limit exceeded|, {{{Expansion depth limit exceeded}}} }}]] |{{{Expansion depth limit exceeded}}}{{Expansion depth limit exceeded|, {{{Expansion depth limit exceeded}}} }} }}{{Expansion depth limit exceeded|[{{{Expansion depth limit exceeded}}} {{{Expansion depth limit exceeded}}}] |{{{Expansion depth limit exceeded}}} }}, {{Expansion depth limit exceeded|{{{Expansion depth limit exceeded}}} |{{{Expansion depth limit exceeded}}} }}.<span class="Z3988" title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle={{Expansion depth limit exceeded}}&rft.aulast=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.au=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.au=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.date=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.pages=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft_id=&rfr_id=info:sid/en.wikipedia.org:Comparison_of_disk_encryption_software">
- ↑ Starting with Linux kernel version 2.6.20, CryptoAPI supports the LRW mode: http://lwn.net/Articles/213650/
- ↑ {{Expansion depth limit exceeded|[[{{{Expansion depth limit exceeded}}} |{{{Expansion depth limit exceeded}}}{{Expansion depth limit exceeded|, {{{Expansion depth limit exceeded}}} }}]] |{{{Expansion depth limit exceeded}}}{{Expansion depth limit exceeded|, {{{Expansion depth limit exceeded}}} }} }}{{Expansion depth limit exceeded|[{{{Expansion depth limit exceeded}}} {{{Expansion depth limit exceeded}}}] |{{{Expansion depth limit exceeded}}} }}, {{Expansion depth limit exceeded|{{{Expansion depth limit exceeded}}} |{{{Expansion depth limit exceeded}}} }}.<span class="Z3988" title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle={{Expansion depth limit exceeded}}&rft.aulast=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.au=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.au=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.date=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft.pages=%7B%7B%7B%3Cspan+class%3D%22error%22%3EExpansion+depth+limit+exceeded%3C%2Fspan%3E%7D%7D%7D&rft_id=&rfr_id=info:sid/en.wikipedia.org:Comparison_of_disk_encryption_software">
- ↑ For Scramdisk containers
- ↑ For Truecrypt 4 containers
- ↑ For Truecrypt 5 and 6 containers
- ↑ Commit enabling AES XTS
- ↑ Containers created with TrueCrypt versions 1.0 through 4.0 use CBC.
- ↑ Containers created with TrueCrypt versions 4.1 through 4.3a use LRW, and support CBC for opening legacy containers only.
- ↑ Containers created with TrueCrypt versions 5.0 or later use XTS, and support LRW/CBC for opening legacy containers only.
If you like SEOmastering Site, you can support it by - BTC: bc1qppjcl3c2cyjazy6lepmrv3fh6ke9mxs7zpfky0 , TRC20 and more...
→