News

The methods are the same as the Truecrypt: you can create individual file containers and mount them as drives so that you can keep your files encrypted. A container is actually a place that when ...
A new security audit has found critical vulnerabilities in VeraCrypt, an open-source, full-disk encryption program that’s the direct successor of the widely popular, but now defunct, TrueCrypt. Users ...