[TrueCrypt is not exactly "Open Source", but the source is available. See the complete description and the comments to get more informations.]
Disk encryption software for Windows Vista/XP, Mac OS X, and Linux.
Creates a virtual encrypted disk within a file and mounts it as a real disk.
Though it has not been audited yet, it has many features and is one of the most popular encryption solutions:
Encrypts an entire partition or storage device such as USB flash drive or hard drive.
Encrypts a partition or drive where Windows is installed (pre-boot authentication).
Encryption is automatic, real-time (on-the-fly) and transparent.
Parallelization and pipelining allow data to be read and written as fast as if the drive was not encrypted.
Encryption can be hardware-accelerated on modern processors.
Provides plausible deniability, in case an adversary forces you to reveal the password:
Hidden volume (steganography) and hidden operating system.
For the portable mode you need admin rights, see http://www.truecrypt.org/docs/?s=truecrypt-portable
Is TrueCrypt "Open Source"?
While TrueCrypt is source-public, it is a misconception that it is open source or free software. It is not considered Open Source as defined by the Open Source Initiative or free software as defined by the Free Software Foundation and no major GNU/Linux distribution (Arch, Debian, Ubuntu, Fedora, openSUSE, Gentoo) has accepted it because of license restrictions that are incompatible with being free/libre and open source.
http://istruecryptauditedyet.com/
http://en.wikipedia.org/wiki/TrueCrypt#Licensing_and_Open_Source_status
↧
TrueCrypt
↧
Disk Utility
Disk Utility is the name of a utility created by Apple for performing disk-related tasks in Mac OS X. These tasks include:
the creation, conversion, compression and encryption of disk images from a wide range of formats read by Disk Utility to .dmg or, for CD/DVD images, .cdr;
mounting, unmounting, and ejecting disks (including both hard disks, removable media and disk images);
enabling or disabling journaling;
verifying a disk's integrity, and repairing it if the disk is damaged (this will work for both Mac compatible format partitions, and FAT32 partitions with Microsoft Windows installed);
verifying and repairing permissions;
disk erasing, formatting, partitioning and cloning;
secure deletion of free space or disk using a "zero out" data, a 7-pass DOD 5220-22 M standard, or a 35-pass Gutmann algorithm
adding or changing partition table between Apple Partition Table, GUID Partition Table, and master boot record (MBR);
creating, destroying, merging, and repairing RAID sets;
restoring volumes from Apple Software Restore (ASR) images;
burning disk images to CD or DVD in HFS+ format;
erasing CD-RWs and DVD-RWs;
checking the S.M.A.R.T status of a hard disk.
Disk Utility functions may also be accessed from the Mac OS X command line with the diskutil and hdiutil commands.
↧
↧
Knox
Knox offers easy disk image encryption and comes with a built-in backup service. Knox can automatically back up any or all vaults to a local hard drive, an iPod, an iDisk, or a network volume. Gives you many of the benefits of FileVault or individual encrypted disk images via an easier-to-use interface.
↧
Cloudfogger
Cloudfogger is the free all-in-one encryption solution for files on your computer, mobile devices, Dropbox and all other cloud storage providers, from SkyDrive to Google Drive.
Protect your online privacy with simple and secure AES encryption for all your files, no matter where they are.
Securely share files with others and even encrypt e-mail attachments with the included Outlook addin.
Cloudfogger encrypts all your files on-the-fly: After installation you can define any folder you want as a Cloudfogger Autofogg Folder.
Any file stored in that folder will automatically be encrypted and stored in encrypted mode on your harddisk - and be synced in encrypted mode for example with your Dropbox.
The Cloudfogger file format also supports sharing:
You can grant access to other Cloudfogger users while still keeping full control on who is able to unlock your data.
Cloudfogger - File Encryption finally made simple!
↧
SecurStick
SecurStick is a free portable application that lets you carry encrypted files on your USB drive. You can use the drive on any computer to access and modify those files WITHOUT needing any administrator privileges.
Available languages: English, German and Italian.
↧
↧
Steadycrypt
This is a Java-based application that allows the user to important files that are on that operating system to encrypt easy and secure and organize.
Tested on WinXP, Win7 & OS X 10.6
↧
ImmediateCrypt
ImmediateCrypt is an utility for encryption and decryption of plain text messages with the AES-256 cipher.
It is released under the GPLv3 license (full Java source available) and works under any Java-enabled environment (Windows, Linux and Mac OSX).
↧
Jetico BestCrypt
If your computer were ever to be stolen, are you certain that your personal information cannot be discovered? Jetico’s BestCrypt software automatically encrypts your files so that nobody can read the data unless they have the right password or keys.
BestCrypt supports several encryption algorithms and security standards and offers multiple ways to work transparently with encrypted data:
* Store encrypted data in containers and access the data through virtual drives.
* Encrypt sets of files into a single compressed and self-extracting archive (Read more about BCArchive - included in BestCrypt).
* See BestCrypt Volume Encryption to encrypt and transparently access whole Windows partitions/volumes - 25% discount when purchased together with BestCrypt.
BestCrypt automatically encrypts data before saving or storing a file. Sensitive information is scrambled using an algorithm, making the data unreadable. BestCrypt will transparently decrypt the file once the file has been opened by providing the correct password or key.
BestCrypt creates and supports encrypted virtual disks, which are visible as regular disks with corresponding drive letters (for example, D:, K:, Z:, i.e. with any drive letter that is not used by another system device).
↧
AES Crypt
AES Crypt is an advanced file encryption utility that integrates with the Windows shell or runs from the Linux command prompt to provide a simple, yet powerful, tool for encrypting files using the Advanced Encryption Standard (AES). A Java library is also available for developers using Java to read and write AES formatted files.
NOTE: Crypt4All is the first Android program compatible with AES Crypt.
↧
↧
DocWallet
Your personal document lock box.
Securely stored and always at hand.
You can finally access your confidential documents from anywhere in the world - securely encrypted, perfectly synchronized, and amazingly practical - with DocWallet, the free document manager from Deutsche Post AG, for iPhone, iPad, Mac and PC.
↧
Safe: Encrypted File System
Safe is an application that makes it easy to encrypt your files. When you encrypt your files with Safe they are rendered unreadable to anyone who doesn't have your password.
Safe is cross-platform and currently runs on Windows and Mac OS X. It works with all applications and file types and can store encrypted files anywhere. Safe is also fully compatible with existing EncFS volumes.
Safe is licensed under the GPLv3 and is based on free software.
↧
NPPCrypt
NPPCrypt is a plugin for http://alternativeto.net/software/notepad-plus-plus/ that will allow users to encrypt, decrypt text as well with create hashed messages/text and random blobs.
↧
TruPax
TruPax generates http://alternativeto.net/software/truecrypt/ - compatible container files from arbitrary sets of files and folders. Such files match exactly the size of the contained material and can be mounted by TrueCrypt, but also directly extracted using TruPax itself. Latter also works for containers formatted with FAT32 by TrueCrypt itself, thanks to fat32-lib. For all of that there are no administrator rights required when using TruPax.
The generated file system of the containers is UDF 1.02, which is supported by all of the modern operating systems. Most of them support writing - meaning files in a container can also be deleted or new ones added. TruPax can wipe files after container generation, or just as a separate action. You can also invalidate any TrueCrypt container with it very quickly.
TruPax is completely written in Java, to run it version 7 or higher is required. The installation is simple and optional, thus TruPax is highly portable.
Next to the UI there is a command line version, and with it TruPax can be used in fully automated scenarios.
TruPax works fast and is capable to use all available CPU cores. Containers get generated in just one pass.
Features
- creates file containers in the open UDF format, mountable on many modern operating systems.
- created containers are writable on the more recent systems (Windows 7, OSX, Linux).
- runs on any operating system where the Java 6 runtime is available.
- is a completely new implementation of the TrueCrypt encryption technology.
- uses all processor cores to do its job as fast as possible.
writes container files in just one pass. No seeking.
- is free to use. No charges. No spyware either.
- source code is available for review. No hiding.
↧
↧
FileVault
FileVault is a method of using encryption with volumes on Mac computers. Encryption and decryption are performed on the fly.
FileVault 2 uses full disk, XTS-AES 128 encryption to help keep your data secure. Using FileVault 2, you can encrypt the contents of your entire drive.
↧
CipherShed
A fork of the now-discontinued http://alternativeto.net/software/truecrypt/. CipherShed is a program that can be used to create encrypted files or encrypt entire drives (including USB flash drives and external HDDs). There’s no complicated commands or knowledge required; a simple wizard guides you step-by-step through every process.
After creating an encrypted file or disk drive, the encrypted volume is mounted through CipherShed. The mounted volume shows up as a regular disk that can be read and written to on-the-fly. The encryption is transparent to the operating system and any programs. When finished, the volume can be unmounted, and stored or transported elsewhere, fully secured. Encryption volumes can be moved from OS-to-OS (eg, Windows to Mac) with full compatibility.
↧
Zed!
Zed! protects your personal and sensitive data in encrypted archives on e-mail, on USB sticks and in backups.
ENCRYPTION
With its encryption technology derived from various certified professional solutions, Zed! guarantees optimal levels of data protection and confidentiality for exchange and storage. The data encrypted by Zed! can only be decrypted by users with a valid access key.
Using Zed! is highly intuitive.
Create a .zed container in a single click to which you can add folders, files and grant users. The container is then ready to be sent, with the inside files encrypted. Zed! is able to transport an entire file tree structure with no volume constraints.
↧
GostCrypt
The Gostcrypt project has been launched at the end of 2013 as fork of the (late) Truecrypt project.
It intends to go farther than ever. Since the late 70s, most of the algorithms used (not to say all) are UKUSA encryption systems that have been chosen, promoted and standardized under the control of the USA and its satellite countries.
Security rationales
The GOST 28147-89 block cipher uses 256-bit keys for encryption or decryption. Internally, this key is divided into eight 32-bit subkeys. In the process of setting the GOST 28147-89 key in preparation for encryption and decryption, the S-Box is modified based on the supplied key, providing a first degree of diversification of the algorithm (and thus provides resistance to known attacks).
For this process, the 'GOST R 34.11-94 CryptoProParamSet' S-Box from RFC 4357 is used as initial S-Box. The 256-bit encryption key is hashed using the GOST R 34.11-2012 hash function, which produces a 512-bit digest. As both the initial S-Box and the digest contain 512 bits of information, a bitwise addition modulo two is used on of the 4-bit S-Box entries (see the diagram below). The resulting key-dependent S-Box is used for encryption and decryption. During encryption and decryption, the GOST 28147-89 block cipher is used with the XTS mode of operation. The data unit number, a disk offset used in the XTS algorithm, is combined with the GOST 28147-89 key using bitwise addition modulo two. This operation ensures that a different key is used for each 512-byte section of the disk. Given how small changes in the used key result in large changes in the resulting ciphertext, this mechanism provides an additional challenge for a potential adversary.
↧
↧
Sookasa
Sookasa transparently protects files across the Dropbox cloud and linked mobile devices, while preserving the native Dropbox user experience on Windows, Mac, iOS and Android.
Sookasa creates a secure folder (called Sookasa) inside Dropbox and will automatically encrypt any file or subfolder placed inside the Sookasa folder. The Sookasa folder will look and feel like a normal folder as long as the user is authorized to access the files. Sookasa allows users to collaborate using the normal Dropbox shared folders interface, and also allows users to securely deliver files to colleagues that do not have Sookasa installed.
Sookasa is free for individuals, and its professional edition costs $10/month or $100/year per user.
↧
EncFSMP
A program to mount EncFS folders on Windows and OS X.
Works good with LibreOffice documents on Windows 7.
Features of EncFSMP:
- Mounts EncFS folders on Windows and OS X
- Can create, edit, export and change the password of EncFS folders
- Is 100% compatible with EncFS 1.7.4 on Linux
- Completely free, no nags, no additional downloads like toolbars etc.
With EncFS MP, you can store your data in an encrypted folder. This is especially important if you store your sensitive data in a cloud service like Dropbox or Google Drive.
Since EncFS exists on many platforms, you can access your data from a Windows PC, from an Apple computer, from Linux (using the built-in EncFS), or even from an Android device (using Cryptonite).
Although EncFSMP is an open source project and its source code is released under the MIT license, it contains a closed-source component. The file system component that allows EncFSMP volumes to be mounted is called Pismo File Mount and is developed by Pismo Technic Inc.. Other than that, EncFSMP is 100% open source.
Status of the project:
The current release is considered beta software. This means that this program may contain serious bugs. Therefore, always store important data in a backup location.
↧
Cryptomator
Free client-side AES encryption for your cloud files. Open source software: No backdoors, no registration.
Features
Cryptomator provides transparent, client-side encryption for your cloud. Securely protect your documents from unauthorized access. Cryptomator is open source software, so you can rest assured there are no backdoors
Secure
Cryptomator encrypts your files' contents and names using AES with up to 256 bit keylength. Scrypt hardens your key against bruteforcing.
Transparent
Your applications can work with encrypted files without even noticing. Cryptomator will make your encrypted folder available as a virtual hard drive.
Lean
Cryptomator doesn't flood your computer with funny support files or even drivers. Also Cryptomator's internals are very simple. We believe, that complexity kills security.
Easy
Choose a password and continue working normally on your files. No configuration needed. No accounts required.
Trustworthy
Cryptomator is secure. Ever read this sentence before? Well in this case you don't need to trust us. You can control us. Cryptomator is completely open source software.
Discreet
Cryptomator doesn't need your cloud passwords. It works on your local machine and doesn't care about the accounts you use.
Compatible
Dropbox, OneDrive, Google Drive, ...? Cryptomator works with every single cloud storage provider, as long as your files are sync'ed to your computer.
Multiplatform
Cryptomator is based on Java technology and runs on all major desktop operating systems. Smartphone apps will follow.
Free and open source
Other than most cloud encryption tools, Cryptomator doesn't cost a penny. You don't even need to create an account! It is open source software licensed under the MIT X Consortium license, so you will never stand in front of locked doors in the future.
↧