Home   Documentation   Downloads   News   Future   History   Screenshots   Donations   FAQ   Forum   Contact  
                   
 
   
  
 AES
   
Security Requirements and Precautions Direct Link






Please consider making a donation.

   Donate Now >> Donate   


Security Requirements and Precautions

IMPORTANT: If you want to use TrueCrypt, you must follow the security requirements and security precautions listed in this chapter.
The sections in this chapter specify security requirements for using TrueCrypt and give information about things that adversely affect or limit the ability of TrueCrypt to secure data and to provide plausible deniability. Disclaimer: This chapter is not guaranteed to contain a list of all security issues and attacks that might adversely affect or limit the ability of TrueCrypt to secure data and to provide plausible deniability.





  Next Section >>


Search  •  Legal Notices www.truecrypt.org