Fruhwirth, Clemens (18 July 2005). "New Methods in Hard Disk Encryption"(PDF). Institute for Computer Languages, Theory and Logic Group, Vienna University of Technology. Retrieved 10 March 2007.
"Version History"(PDF). TrueCrypt User's Guide, version 3.1a. TrueCrypt Foundation. 7 February 2005. Archived(PDF) from the original on 30 December 2008. Retrieved 2 March 2017.
Schmid, Patrick; Roos, Achim (28 April 2010). "Conclusion". System Encryption: BitLocker And TrueCrypt Compared. Tom's Hardware. Retrieved 24 May 2014.
Schmid, Patrick; Roos, Achim (28 April 2010). "Conclusion". Protect Your Data With Encryption. Tom's Hardware. Retrieved 24 May 2014.
TrueCrypt FAQ - see question
I use pre-boot authentication. Can I prevent a person (adversary) that is watching me start my computer from knowing that I use TrueCrypt?
"Incompatibilities". TrueCrypt Documentation. TrueCrypt Foundation. Archived from the original on 16 April 2013. Retrieved 24 May 2014.
"Version History"(PDF). TrueCrypt User's Guide, version 3.1a. TrueCrypt Foundation. 7 February 2005. Archived(PDF) from the original on 30 December 2008. Retrieved 2 March 2017.