TrueCrypt (English Wikipedia)

Analysis of information sources in references of the Wikipedia article "TrueCrypt" in English language version.

refsWebsite
Global rank English rank
low place
low place
1st place
1st place
14th place
14th place
388th place
265th place
1,518th place
1,072nd place
low place
low place
383rd place
320th place
low place
low place
1,216th place
797th place
4,942nd place
4,061st place
2,976th place
1,939th place
low place
low place
low place
low place
low place
low place
1,669th place
1,290th place
5,386th place
4,042nd place
low place
low place
low place
low place
146th place
110th place
low place
low place
low place
low place
low place
low place
998th place
632nd place
6th place
6th place
low place
low place
4,558th place
3,044th place
low place
low place
1,668th place
1,164th place
1,067th place
749th place
5,701st place
4,384th place
low place
low place
low place
low place
1,631st place
1,239th place
5,990th place
3,752nd place
8,888th place
6,276th place
low place
low place
low place
low place
low place
low place
766th place
3,515th place
low place
low place
low place
low place
low place
low place
8,706th place
5,167th place
7,398th place
5,036th place
low place
low place
3,475th place
2,144th place
low place
low place
low place
low place
1,317th place
873rd place
low place
low place
low place
low place
79th place
65th place
193rd place
152nd place
1,478th place
868th place
2,275th place
1,288th place
49th place
47th place
low place
low place
9th place
13th place
12th place
11th place
8th place
10th place
881st place
611th place
6,694th place
4,043rd place
2,840th place
1,614th place
low place
9,818th place
1,444th place
1,458th place
1,156th place
1,125th place
812th place
931st place
low place
low place
low place
low place
low place
low place
1,475th place
1,188th place
3,696th place
2,428th place
low place
low place
3,857th place
2,958th place
low place
low place
low place
low place
1,746th place
1,165th place
23rd place
32nd place
1,459th place
991st place
low place
low place
low place
low place
low place
low place

16s.us

adobe.com

helpx.adobe.com

alphr.com

archive.org

help.archive.org

archive.today

  • "Version History". TrueCrypt Foundation. Archived from the original on 8 January 2013. Retrieved 1 October 2009.
  • "Language Packs". truecrypt.org. TrueCrypt Foundation. Archived from the original on 5 December 2012.
  • "Operating Systems Supported for System Encryption". TrueCrypt Documentation. TrueCrypt Foundation. Archived from the original on 8 January 2013. Retrieved 24 May 2014.
  • "Hash Algorithms". TrueCrypt Documentation. TrueCrypt Foundation. Archived from the original on 25 May 2014. Retrieved 24 May 2014.
  • "Modes of Operation". TrueCrypt Documentation. TrueCrypt Foundation. Archived from the original on 4 September 2013. Retrieved 24 May 2014.
  • "Hidden Operating System". TrueCrypt Documentation. TrueCrypt Foundation. Archived from the original on 16 April 2013. Retrieved 24 May 2014.
  • "Security Requirements for Hidden Volumes". TrueCrypt Documentation. TrueCrypt Foundation. Archived from the original on 17 September 2012. Retrieved 24 May 2014.
  • "TrueCrypt Volume Format Specification". TrueCrypt Documentation. TrueCrypt Foundation. Archived from the original on 19 June 2013. Retrieved 24 May 2014.
  • "Archive". Archived from the original on 7 May 2014. Retrieved 2 March 2017.
  • "Incompatibilities". TrueCrypt Documentation. TrueCrypt Foundation. Archived from the original on 16 April 2013. Retrieved 24 May 2014.
  • "Security Requirements and Precautions". TrueCrypt Documentation. TrueCrypt Foundation. Archived from the original on 16 April 2013. Retrieved 24 May 2014.
  • "Physical Security". TrueCrypt Documentation. TrueCrypt Foundation. Archived from the original on 13 September 2012. Retrieved 24 May 2014.
  • "Malware". TrueCrypt Documentation. TrueCrypt Foundation. Archived from the original on 13 September 2012. Retrieved 24 May 2014.
  • "Some encryption programs use TPM to prevent attacks. Will TrueCrypt use it too?". TrueCrypt FAQ. TrueCrypt Foundation. Archived from the original on 16 April 2013. Retrieved 24 August 2011.
  • TrueCrypt License. Accessed on: 21 May 2012 Archived 30 May 2012 at archive.today

arquivo.pt

arstechnica.com

atavist.com

mastermind.atavist.com

auerfeld.wordpress.com

bbc.co.uk

blackhat.com

boingboing.net

citizenaudit.org

code.google.com

concordia.ca

madiba.encs.concordia.ca

cryptographyengineering.com

blog.cryptographyengineering.com

cryptoservices.github.io

dailydot.com

debian.org

bugs.debian.org

donga.com

voda.donga.com

dragonflybsd.org

leaf.dragonflybsd.org

endorphin.org

clemens.endorphin.org

  • Fruhwirth, Clemens (18 July 2005). "New Methods in Hard Disk Encryption" (PDF). Institute for Computer Languages, Theory and Logic Group, Vienna University of Technology. Retrieved 10 March 2007.

fbi.gov

findlaw.com

caselaw.findlaw.com

freeotfe.org

github.com

gnu.org

grc.com

groups.google.com

gulli.com

h-online.com

heise.de

huihoo.com

docs.huihoo.com

  • "Version History" (PDF). TrueCrypt User's Guide, version 3.1a. TrueCrypt Foundation. 7 February 2005. Archived (PDF) from the original on 30 December 2008. Retrieved 2 March 2017.

ibtimes.co.uk

indiegogo.com

infoworld.com

itwire.com

kernel.org

git.kernel.org

launchpad.net

bugs.edge.launchpad.net

lists.freedesktop.org

mk.co.kr

news.mk.co.kr

morph.zone

library.morph.zone

narkive.com

alt.security.scramdisk.narkive.com

newspim.com

newyorker.com

nvsos.gov

ohloh.net

opencryptoaudit.org

opensource.org

projects.opensource.org

opensuse.org

lists.opensuse.org

pcworld.com

peterkleissner.com

phoenixnewtimes.com

blogs.phoenixnewtimes.com

redhat.com

bugzilla.redhat.com

redhat.com

reuters.com

schneier.com

seclists.org

securstar.com

simonhunt.wordpress.com

slashdot.org

yro.slashdot.org

sourceforge.net

truecrypt.sourceforge.net

sourceforge.net

ssi.gouv.fr

stoned-vienna.com

techdirt.com

techworld.com

news.techworld.com

theguardian.com

theregister.co.uk

threatpost.com

tmdb.de

tomshardware.com

  • Schmid, Patrick; Roos, Achim (28 April 2010). "Conclusion". System Encryption: BitLocker And TrueCrypt Compared. Tom's Hardware. Retrieved 24 May 2014.
  • Schmid, Patrick; Roos, Achim (28 April 2010). "Conclusion". Protect Your Data With Encryption. Tom's Hardware. Retrieved 24 May 2014.

truecrypt.org

  • "Version History". TrueCrypt Foundation. Archived from the original on 8 January 2013. Retrieved 1 October 2009.
  • "Language Packs". truecrypt.org. TrueCrypt Foundation. Archived from the original on 5 December 2012.
  • "Version Information". TrueCrypt User's Guide, version 1.0. TrueCrypt Team. 2 February 2004. Retrieved 28 May 2014.[dead link] Alt URL
  • "TrueCrypt". Archived from the original on 1 January 2014.
  • "Supported Operating Systems". TrueCrypt Documentation. TrueCrypt Foundation. Retrieved 24 May 2014.
  • "Operating Systems Supported for System Encryption". TrueCrypt Documentation. TrueCrypt Foundation. Archived from the original on 8 January 2013. Retrieved 24 May 2014.
  • "Encryption Algorithms". TrueCrypt Documentation. TrueCrypt Foundation. Retrieved 24 May 2014.
  • "Hash Algorithms". TrueCrypt Documentation. TrueCrypt Foundation. Archived from the original on 25 May 2014. Retrieved 24 May 2014.
  • "Modes of Operation". TrueCrypt Documentation. TrueCrypt Foundation. Archived from the original on 4 September 2013. Retrieved 24 May 2014.
  • "Header Key Derivation, Salt, and Iteration Count". TrueCrypt Documentation. TrueCrypt Foundation. Retrieved 24 May 2014.
  • "Plausible Deniability". TrueCrypt Documentation. TrueCrypt Foundation. Archived from the original on 26 February 2008. Retrieved 24 May 2014.
  • "Hidden Volume". TrueCrypt Documentation. TrueCrypt Foundation. Retrieved 24 May 2014.
  • "Hidden Operating System". TrueCrypt Documentation. TrueCrypt Foundation. Archived from the original on 16 April 2013. Retrieved 24 May 2014.
  • "Security Requirements for Hidden Volumes". TrueCrypt Documentation. TrueCrypt Foundation. Archived from the original on 17 September 2012. Retrieved 24 May 2014.
  • "TrueCrypt Volume Format Specification". TrueCrypt Documentation. TrueCrypt Foundation. Archived from the original on 19 June 2013. Retrieved 24 May 2014.
  • TrueCrypt FAQ - see question I use pre-boot authentication. Can I prevent a person (adversary) that is watching me start my computer from knowing that I use TrueCrypt?
  • "Incompatibilities". TrueCrypt Documentation. TrueCrypt Foundation. Archived from the original on 16 April 2013. Retrieved 24 May 2014.
  • "Security Requirements and Precautions". TrueCrypt Documentation. TrueCrypt Foundation. Archived from the original on 16 April 2013. Retrieved 24 May 2014.
  • "Physical Security". TrueCrypt Documentation. TrueCrypt Foundation. Archived from the original on 13 September 2012. Retrieved 24 May 2014.
  • "Malware". TrueCrypt Documentation. TrueCrypt Foundation. Archived from the original on 13 September 2012. Retrieved 24 May 2014.
  • "Some encryption programs use TPM to prevent attacks. Will TrueCrypt use it too?". TrueCrypt FAQ. TrueCrypt Foundation. Archived from the original on 16 April 2013. Retrieved 24 August 2011.
  • TrueCrypt License. Accessed on: 21 May 2012 Archived 30 May 2012 at archive.today

tvchosun.com

news.tvchosun.com

twitter.com

uscourts.gov

ca11.uscourts.gov

usenix.org

uspto.gov

tmsearch.uspto.gov

washington.edu

cs.washington.edu

web.archive.org

wired.com

wsj.com

blogs.wsj.com

yonhapnews.co.kr

youtube.com