truecrypt
Encrypt volumes, partitions, or entire drives
SYNOPSIS
truecrypt [options] [volume]
PARAMETERS
--create
Create a new TrueCrypt volume.
--mount
Mount a TrueCrypt volume.
--dismount
Dismount a TrueCrypt volume.
--password
Specify the password for the volume. (Use with extreme caution due to potential shell history exposure.)
--encryption
Specify the encryption algorithm (e.g., AES, Serpent, Twofish). Must be used during volume creation.
--hash
Specify the hash algorithm (e.g., SHA-512, RIPEMD-160). Must be used during volume creation.
--filesystem
Specify filesystem to use. Must be used during volume creation.
--size
Specify the size of the volume. Must be used during volume creation.
--volume-type
Specify volume type. Must be used during volume creation. (e.g., normal, hidden)
--protect-hidden
Protect hidden volume when creating a hidden volume.
--text
Operate in command-line only mode.
--help
Display help message.
--version
Display version information.
DESCRIPTION
TrueCrypt was a discontinued source-available freeware utility used for on-the-fly encryption (OTFE). It could create a virtual encrypted disk within a file or encrypt an entire partition or storage device. It offered strong encryption algorithms and aimed to provide plausible deniability. While development ceased abruptly in 2014, TrueCrypt remains relevant because encrypted volumes created with it may still exist.
Important: While it's possible that TrueCrypt may still be used on older systems, due to the discontinuation of development and unresolved security concerns, use it with caution. Newer, actively maintained alternatives like VeraCrypt (a fork of TrueCrypt) are highly recommended for new encryption needs.
CAVEATS
TrueCrypt development ceased in 2014, and concerns were raised about its security. Using it carries inherent risks. Avoid using it for new encryption needs. Use VeraCrypt instead.
ALTERNATIVES
VeraCrypt is the recommended open-source alternative, as it's a fork of TrueCrypt with continued development and security audits. Other options include Linux's built-in LUKS encryption (accessed via cryptsetup) and commercial solutions.
SECURITY WARNING
Always back up your data before working with any encryption software. Never forget your password, as data recovery is generally impossible without it. Because the development of TrueCrypt has been discontinued and there are unresolved security concerns, using it could pose a security risk.
Use at your own risk.
MOUNTING EXAMPLE
Example to mount a volume:truecrypt --mount /path/to/volume /mnt/mountpoint
Then the password prompt would appear, or you need to add it to the command by using: --password
HISTORY
TrueCrypt was initially released in 2004 and gained popularity for its ease of use and robust encryption capabilities. It was widely used by individuals and organizations seeking to protect sensitive data. The sudden cessation of development in 2014, accompanied by a warning about security vulnerabilities, sparked considerable debate and speculation. Despite the controversy, existing TrueCrypt volumes may still need to be accessed and migrated to newer encryption solutions.
SEE ALSO
veracrypt(1), cryptsetup(8)