{"id":308,"date":"2008-01-28T08:18:51","date_gmt":"2008-01-28T12:18:51","guid":{"rendered":"http:\/\/blogs.law.harvard.edu\/zeroday\/2008\/01\/28\/truecrypt-finally-coming-to-mac-os-x\/"},"modified":"2008-01-28T08:18:51","modified_gmt":"2008-01-28T12:18:51","slug":"truecrypt-finally-coming-to-mac-os-x","status":"publish","type":"post","link":"https:\/\/archive.blogs.harvard.edu\/zeroday\/2008\/01\/28\/truecrypt-finally-coming-to-mac-os-x\/","title":{"rendered":"TrueCrypt finally coming to Mac OS X"},"content":{"rendered":"<p><a href=\"http:\/\/www.truecrypt.org\/future.php\">Release scheduled for: February 4, 2008<br \/>\n<\/a><br \/>\nUnfamiliar with TrueCrypt?<\/p>\n<p><a href=\"http:\/\/www.truecrypt.org\/\"><br \/>\nCreates a virtual encrypted disk within a file and mounts it as a real disk. <\/p>\n<p>Encrypts an entire hard disk partition or a storage device such as USB flash drive.<\/p>\n<p>Encryption is automatic, real-time (on-the-fly) and transparent.<\/p>\n<p>Provides two levels of plausible deniability, in case an adversary forces you to reveal the password:<\/p>\n<p>1) Hidden volume.<br \/>\n2) No TrueCrypt volume can be identified<br \/>\nEncryption algorithms: AES-256, Serpent, and Twofish. Mode of operation: LRW.<br \/>\nFurther information regarding features of the software may be found in the documentation.<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Release scheduled for: February 4, 2008 Unfamiliar with TrueCrypt? Creates a virtual encrypted disk within a file and mounts it as a real disk. Encrypts an entire hard disk partition or a storage device such as USB flash drive. Encryption is automatic, real-time (on-the-fly) and transparent. Provides two levels of plausible deniability, in case an [&hellip;]<\/p>\n","protected":false},"author":214,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[274,271],"tags":[],"class_list":["post-308","post","type-post","status-publish","format-standard","hentry","category-interesting-tech","category-rights-online"],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/posts\/308","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/users\/214"}],"replies":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/comments?post=308"}],"version-history":[{"count":0,"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/posts\/308\/revisions"}],"wp:attachment":[{"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/media?parent=308"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/categories?post=308"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/tags?post=308"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}