The TrueCrypt Encryption Era – Security and Peace of Mind Part 2

Old No Comments on The TrueCrypt Encryption Era – Security and Peace of Mind Part 2 12

The link for part 1 of this article on TrueCrypt encryption is here

The Truecrypt Encryption Era – The Loss of the Era Explored Part 1 http://www.geekbraindump.com/2014/06/17/the-truecrypt-encryption-era-the-loss-of-the-era-explored-part-1/#sthash.fAUhkttS.dpuf

Part 2 is designed to give you reasons why some people used it.

  1. Why are people interested in this product?

Well, think about these questions. Are you an inventor, accountant, or author? Do you have important financial software on a computer that needs to be for the parent’s eyes only? In a nutshell, people desire to secure their personal data from theft and have peace of mind provided by the high level of data security.

2. Why did some consultants recommend it?

Information Technology Professionals realize how valuable new inventions are and how vulnerable these ideas, programs, etc… are before attaining the patents.

“A patent is an intellectual property right granted by the Government of the United States of America to an inventor “to exclude others from making, using, offering for sale, or selling the invention throughout the United States or importing the invention into the United States” for a limited time in exchange for public disclosure of the invention when the patent is granted.”-USPTO.GOV

You do not want your bright and hard worked on ideas stolen! Very sad to say, it happens. The same goes for people writing out the drafts of their books. In the same line of thought, all data that could result in financial loss or identity theft that is stored on the computer. Even if a computer\laptop was stolen, there could have been an experience of shock and anger. However, knowing your critical data would not be assessed helped you to be calm as you went about changing passwords, credit data, etc…

3. How did some consultants implement it?

TrueCrypt was implemented in visible and hidden containers depending on what the client desired. When the containers were hidden, and a laptop was lost in an airport or some other location, there was a sense of security that the data container would not be visible for unauthorized personnel to know it was even there.   TrueCrypt containers have been stored on network drives; and yes, backed up to cloud storage providers is a good practice to implement if you are big on using the “cloud.”

4. Are there viable choices consultants are recommending now?

This section is for you the reader to comment on. You see, this is why the article is entitled “The TrueCrypt Encryption Era”. With the software no longer being developed or available from the official website, people are left with the bitlocker choice of Windows or some other choice. See Link reference and WARNING on why to migrate.

http://truecrypt.sourceforge.net/

WARNING: Using TrueCrypt is not secure as it may contain unfixed security issues.
This page exists only to help migrate existing data encrypted by TrueCrypt.
The development of TrueCrypt was ended in 5/2014 after Microsoft terminated support of Windows XP. Windows 8/7/Vista and later offer integrated support for encrypted disks and virtual disk images.

Closing Thoughts

This is not to suggest you use Windows bit locker. It is just an option. But as I mentioned before, it is an end of an era in that hands down TrueCrypt possessed the best encryption and ease of use options solutions for even residential (Grandma) users, for its day. When smartly implemented according to circumstances, it gave the clients security and peace of mind.

Author

James Lynch

POCBOOKS.COM “If something you read changes your life, it becomes your reality.” The author of the Product of Culture Trilogy James is also an Information Technology Professional and Consultant "Whether a person is aware of it or not, like technology, everything has an answer. You can't be afraid to ask questions, You just may receive what you have been looking for!"

Related Articles

Leave a comment

Back to Top