Quick summary
TrueCrypt is a straightforward disk-encryption utility that helps protect data on Windows and other operating systems. It creates an encrypted virtual volume or secures entire disks and external drives, encrypting and decrypting data automatically as files are saved or opened. Without the correct password or key, the protected data remains inaccessible.
Supported systems and encryption options
- Compatible with Windows (various versions), macOS, and Linux.
- Uses strong ciphers such as AES-256, Twofish, and Serpent.
- Open-source and available at no cost, with a lightweight installer that has minimal impact on system resources.
Installing and initial setup
Installation follows the familiar pattern of Windows utilities: download, run the installer, and follow the prompts. Documentation and community forums provide step-by-step guidance and troubleshooting tips. The package does not require extra third-party programs, and the installer keeps the footprint small so it won’t noticeably slow your machine.
Step-by-step: encrypting a system drive
- Install the application and open it, then choose the System menu and select Encrypt System Drive/Partition.
- Pick the encryption mode you want (single-boot for one OS or multi-boot if multiple operating systems coexist).
- Select the partition or drive you intend to protect and proceed.
- Choose or customize the encryption algorithm and other advanced settings if you prefer not to use defaults.
- Create and confirm a strong password (a long passphrase is recommended). This same password will be required to start the system if you encrypt the boot partition.
- Generate entropy by moving the mouse as prompted; this randomness is used to build the primary encryption key.
- Save the Rescue Disk ISO file to a safe location (or burn it to disc / copy it to a USB drive) — this image is necessary to recover your system if critical files are corrupted.
- Optionally wipe free space on the target drive before encryption to reduce traces of unencrypted data.
- Run the built-in test, reboot when prompted, and begin the encryption process. After restart, the software will launch and complete the encryption.
Recommended practices and useful features
- Store the encryption password and Rescue Disk securely, preferably in a reliable password manager.
- Use hidden volumes for highly sensitive data and regular encrypted volumes for everyday files.
- Take advantage of conveniences such as favorite volumes, automatic dismount, read-only mounts, and keyboard shortcuts to streamline usage.
Alternatives and final thoughts
If you need a maintained alternative, consider VeraCrypt among others. TrueCrypt offers a powerful, no-cost way to encrypt data across multiple platforms with features that include hidden volumes and automatic on-the-fly encryption, making it a practical choice for users who want strong protection without complex setup.
Technical
- Windows
- Mac
- English
- Japanese
- Free