Content deleted Content added
add short description |
m HTTP to HTTPS for SourceForge |
||
(31 intermediate revisions by 21 users not shown) | |||
Line 32:
|-
!{{Rh}}| BitArmor DataControl
|
| 2008-05
| {{Proprietary}}
Line 44:
|-
!{{Rh}}| Bloombase StoreSafe
| [https://www.bloombase.com/ Bloombase]
| 2012
| {{Proprietary}}
Line 53:
| 2011
| {{Proprietary}}
| {{
|-
!{{Rh}}| CGD
Line 79:
| {{no}}
|-
!{{Rh}}|
| Steven Scherrer
| 2004-02-10<ref>{{cite web |author=Sarah Dean |date=2004-02-10 |title=OTFEDB entry |url=http://otfedb.sdean12.org/cgi-bin/pub_factsheet.cgi?SYSTEM_ID=46 |access-date=2008-08-10 |url-status=dead |archive-url=https://web.archive.org/web/20081211101509/http://otfedb.sdean12.org/cgi-bin/pub_factsheet.cgi?SYSTEM_ID=46 |archive-date=2008-12-11 }}</ref>
Line 99:
!{{Rh}}| Cryptainer
| Cypherix Software
|
| {{Proprietary}}
| {{yes}}
Line 121:
| {{no}}
|-
!{{Rh}}| [[Cryptomator]]
| Skymatic UG (haftungsbeschränkt)
| 2016-03-09<ref>{{cite web |url=http://www.cryptomator.org/ |title=Home |website=cryptomator.org}}</ref>
| {{free|[[GPLv3]]}}
| {{yes}}
Line 142:
| Stefan Küng
| 2012
| {{free|[[
| {{yes}}
|-
Line 155:
| 2007
| {{free|[[GNU General Public License|GPL]]}}
| {{
|-
!{{Rh}}| DISK Protect
Line 174:
| {{free|[[GNU General Public License|GPL]]}}
| {{yes}}
|-
!{{Rh}}| [[DriveSentry]] GoAnywhere 2
Line 215 ⟶ 209:
| 2003<ref>{{cite web |author=Valient Gough |date=2003 |title= EncFS - an Encrypted Filesystem |work=README.md file |url=https://github.com/vgough/encfs |access-date=2007-01-14 }}</ref>
| {{free|[[GNU Lesser General Public License|LGPLv3]]}}
| {{
|-
!{{Rh}}| EncryptStick
| ENC Security Systems
| 2009
| {{Proprietary}}
| {{yes}}
Line 310 ⟶ 298:
| n-Trance Security Ltd
| 2005
| {{Proprietary}}
| {{yes}}
Line 362 ⟶ 338:
|-
!{{Rh}}| SafeGuard PrivateDisk
| [[Sophos]] (Utimaco)<ref name="LenovoPrivateDisk">Rebranded as ThinkVantage Client Security {{
| 2000
| {{Proprietary}}
Line 381 ⟶ 357:
!{{Rh}}| [[Scramdisk]] 4 Linux
| Hans-Ulrich Juettner
| 2005-08-06<ref>{{cite web |title=ScramDisk 4 Linux Releases |url=
| {{free|[[GNU General Public License|GPL]]}}
| {{no}}
Line 394 ⟶ 370:
| SECUDE
| 2003
| {{Proprietary}}
| {{yes}}
Line 443 ⟶ 413:
| 2012-01-28<ref>{{cite web|url=https://github.com/bwalex/tc-play/releases|title=bwalex/tc-play|website=[[GitHub]]|date=2019-08-27}}</ref>
| {{free|[[BSD licenses|BSD]]}}
| {{no}}<ref>Last update: 2020-03-02 {{cite web|publisher = Github | title = bwalex/tc-play | url=https://github.com/bwalex/tc-play|date=2023-04-03}}</ref>
|-
!{{Rh}}| [[Trend Micro]] Endpoint Encryption (Mobile Armor)
Line 466 ⟶ 436:
| IDRIX
| 2013-06-22<ref>{{cite web|url=https://veracrypt.codeplex.com/SourceControl/list/changesets?page=8|title=VeraCrypt}}</ref>
| {{free|Apache License 2.0}}<ref>{{cite web | title =Apache License 2.0 | publisher =IDRIX | date =2015-06-28 | url =https://veracrypt.codeplex.com/license | access-date =
TrueCrypt License Version 3.0 (legacy code only)
| {{yes}}
Line 481 ⟶ 451:
!{{Rh}}| Licensing
!{{Rh}}| Maintained?
|-
!ZzEnc
![https://imdtech.ru/ru/technologies/fde/ IMDTech]
!2013
!Commercial
!
|}
Line 487 ⟶ 463:
|-
! Name
! [[Android (operating system)|Android]]
! [[Windows NT]]
! [[iOS]]
! [[Mac OS X]]
! [[Linux]]
! [[FreeBSD]]
! [[
! [[NetBSD]]
|-
!{{Rh}}| Aloaha Crypt Disk
| {{dunno}}
| {{yes}}
| {{dunno}}
| {{no}}
| {{no}}
Line 505 ⟶ 481:
| {{no}}
| {{no}}
|-
!{{Rh}}| [[BestCrypt]] Volume Encryption
| {{dunno}}
| {{yes}}
| {{dunno}}
| {{yes}}
| {{no}}<ref>{{cite web|url=http://www.jetico.com/products/enterprise-data-protection/bestcrypt-volume-encryption|title=Whole Hard Disk Encryption Software - BestCrypt Volume Encryption - Jetico Inc. Oy}}</ref>
| {{no}}
| {{no}}
| {{no}}
|-
!{{Rh}}| BitArmor DataControl
| {{dunno}}
| {{yes}}
| {{dunno}}
| {{no}}
| {{no}}
Line 529 ⟶ 501:
| {{no}}
| {{no}}
|-
!{{Rh}}| [[BitLocker]]
| {{no}}
| {{yes}}
| {{
| {{Partial}}<ref name=dislocker />
| {{Partial}}<ref name=dislocker>https://github.com/Aorimn/dislocker FUSE driver to read/write Windows BitLocker-ed volumes under Linux / Mac OSX</ref>
| {{no}}
| {{no}}
| {{no}}
|-
!{{Rh}}| Bloombase StoreSafe
| {{dunno}}
| {{yes}}
| {{
| {{yes}}
| {{yes}}
Line 554 ⟶ 521:
| {{yes}}
| {{yes}}
|-
!{{Rh}}| Boxcryptor
| {{yes}}
| {{
| {{
| {{yes}}
| {{yes}}
Line 567 ⟶ 531:
| {{no}}
| {{no}}
|-
!{{Rh}}| CenterTools DriveLock
| {{dunno}}
| {{yes}}
| {{dunno}}
| {{no}}
| {{no}}
Line 577 ⟶ 541:
| {{no}}
| {{no}}
|-
!{{Rh}}| CGD
| {{dunno}}
| {{no}}
| {{dunno}}
| {{no}}
| {{no}}
Line 589 ⟶ 551:
| {{no}}
| {{yes}}
|-
!{{Rh}}| Check Point Full Disk Encryption
| {{dunno}}
| {{yes}}
| {{dunno}}
| {{yes}}
| {{yes}}<ref>{{cite web |url=http://www.checkpoint.com/products/full-disk-encryption/DS_FullDisk_Encryption_120614.pdf |title=Archived copy |access-date=2014-12-14 |url-status=dead |archive-url=https://web.archive.org/web/20150923202446/http://www.checkpoint.com/products/full-disk-encryption/DS_FullDisk_Encryption_120614.pdf |archive-date=2015-09-23 }}</ref>
| {{no}}
| {{no}}
| {{no}}
|-
!{{Rh}}| [[CipherShed]]
| {{yes}}<ref name="play.google.com">https://play.google.com/store/apps/details?id=com.sovworks.edslite Third party app allows to open containers encryptes with AES-256, SHA-512 hash and FAT file system</ref>
| {{yes}}
| {{
| {{yes}}
| {{yes}}
| {{no}}<ref>http://www.truecrypt.org/misc/freebsd Although CipherShed can be built under FreeBSD, it is not recommended to run it because of bugs and instabilities when CipherShed is attempted to be used</ref>
| {{no}}
| {{no}}
|-
!{{Rh}}| CrossCrypt
| {{no}}
| {{yes}}<ref>CrossCrypt - Only for the Microsoft Windows XP/2000 operating systems</ref>
| {{dunno}}
| {{no}}
| {{no}}
Line 625 ⟶ 581:
| {{no}}
| {{no}}
|-
!{{Rh}}| CryFS
| {{no}}
| {{yes}}
| {{dunno}}
| {{yes}}
| {{yes}}
Line 639 ⟶ 591:
| {{no}}
| {{yes}}
|-
!{{Rh}}| Cryhod
| {{dunno}}
| {{yes}}
| {{
| {{no}}
| {{yes}}
Line 650 ⟶ 601:
| {{no}}
| {{no}}
|-
!{{Rh}}| Cryptainer
| {{dunno}}
| {{yes}}
| {{dunno}}
| {{no}}
| {{no}}
Line 662 ⟶ 611:
| {{no}}
| {{no}}
|-
!{{Rh}}| CryptArchiver
| {{dunno}}
| {{yes}}
| {{dunno}}
| {{no}}
| {{no}}
Line 673 ⟶ 621:
| {{no}}
| {{no}}
|-
!{{Rh}}| Cryptic Disk
| {{no}}
| {{yes}}
| {{no}}
| {{no}}
Line 691 ⟶ 633:
|-
!{{Rh}}| [[Cryptoloop]]
| {{dunno}}
| {{yes}}<ref name="freeotfe.org">http://www.freeotfe.org/docs/Main/Linux_volumes.htm FreeOTFE supports cryptoloop, dm-crypt/[[cryptsetup]]/[[dmsetup]], and dm-crypt/LUKS volumes</ref>
| {{
| {{no}}
| {{yes}}
Line 698 ⟶ 641:
| {{no}}
| {{no}}
|-
!{{Rh}}| [
| {{yes}}
| {{yes}}<ref name="cryptomator.org">{{Cite web | url=http://www.cryptomator.org |title = Cryptomator - Free Cloud Encryption}}</ref>
| {{
| {{yes}}
| {{yes}}
Line 711 ⟶ 651:
| {{no}}
| {{no}}
|-
!{{Rh}}| CryptoPro Secure Disk Enterprise
| {{no}}
| {{yes}}
| {{dunno}}
| {{no}}
| {{no}}
Line 721 ⟶ 661:
| {{no}}
| {{no}}
|-
!{{Rh}}| CryptoPro Secure Disk for BitLocker
| {{no}}
| {{yes}}
| {{dunno}}
| {{no}}
| {{no}}
Line 733 ⟶ 671:
| {{no}}
| {{no}}
|-
!{{Rh}}| [[Cryptsetup]] / [[Dmsetup]]
| {{dunno}}
| {{yes}}<ref name="freeotfe.org"/>
| {{
| {{no}}
| {{yes}}
Line 746 ⟶ 681:
| {{no}}
| {{no}}
|-
!{{Rh}}| CryptSync
| {{no}}
| {{yes}}
| {{dunno}}
| {{yes}}
| {{yes}}
Line 759 ⟶ 691:
| {{no}}
| {{no}}
|-
!{{Rh}}| Discryptor
| {{dunno}}
| {{no}}
| {{dunno}}
| {{no}}
| {{no}}
Line 769 ⟶ 701:
| {{no}}
| {{no}}
|-
!{{Rh}}| [[DiskCryptor]]
| {{dunno}}
| {{yes}}
| {{dunno}}
| {{no}}
| {{no}}
Line 781 ⟶ 711:
| {{no}}
| {{no}}
|-
!{{Rh}}| DISK Protect
| {{dunno}}
| {{yes}}
| {{dunno}}
| {{no}}
| {{no}}
Line 793 ⟶ 721:
| {{no}}
| {{no}}
|-
!{{Rh}}| [[Dm-crypt]] / [[LUKS]]
| {{dunno}}
| {{yes}}<ref name="freeotfe.org"/>
| {{dunno}}
| {{no}}
| {{yes}}
Line 806 ⟶ 731:
| {{no}}
| {{no}}
|-
!{{Rh}}| [[DriveSentry]] GoAnywhere 2
| {{dunno}}
| {{yes}}
| {{dunno}}
| {{no}}
| {{no}}
Line 829 ⟶ 741:
| {{no}}
| {{no}}
|-
!{{Rh}}| [[E4M]]
| {{dunno}}
| {{yes}}
| {{dunno}}
| {{no}}
| {{no}}
Line 841 ⟶ 751:
| {{no}}
| {{no}}
|-
!{{Rh}}| e-Capsule Private Safe
| {{dunno}}
| {{yes}}
| {{dunno}}
| {{no}}
| {{no}}
Line 853 ⟶ 761:
| {{no}}
| {{no}}
|-
!{{Rh}}| [[eCryptfs]]
| {{dunno}}
| {{no}}
| {{
| {{no}}
| {{yes}}
Line 866 ⟶ 771:
| {{no}}
| {{no}}
|-
!{{Rh}}| EgoSecure HDD Encryption
| {{dunno}}
| {{yes}}
| {{dunno}}
| {{no}}
| {{no}}
Line 877 ⟶ 781:
| {{no}}
| {{no}}
|-
!{{Rh}}| [[EncFS]]
| {{yes}}<ref name="boxcryptor">{{cite web|url=https://www.boxcryptor.com/|title=Boxcryptor - Encryption for cloud storage - Window, Mac, Android, iOS}}</ref>
| {{yes}}<ref name="save">{{cite web|url=http://www.getsafe.org/|title=Safe - Protect Your Files|access-date=2016-03-29|archive-url=https://web.archive.org/web/20160421064348/http://www.getsafe.org/|archive-date=2016-04-21|url-status=dead}}</ref>
| {{dunno}}
| {{yes}}<ref name="save" />
| {{yes}} (FUSE)
| {{yes}} ([[Filesystem in Userspace|FUSE]])
| {{yes}} (FUSE)
| {{yes}} (FUSE)
|-
!{{Rh}}| EncryptStick
| {{dunno}}
| {{Yes}}
| {{dunno}}
| {{Yes}}
| {{yes}}
| {{no}}
| {{no}}
| {{no}}
|-
!{{Rh}}| EncryptUSB
| {{dunno}}
| {{Yes}}
| {{dunno}}
| {{Yes}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
|-
!{{Rh}}| [[FileVault]]
| {{dunno}}
| {{no}}
| {{dunno}}
| {{yes}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
|-
!{{Rh}}| [[FileVault|FileVault 2]]
| {{dunno}}
| {{no}}
| {{
| {{
| {{partial}}<ref>https://code.google.com/p/libfvde/ libfvde supports reading FileVault2 Drive Encryption (FVDE) encrypted volumes</ref>
| {{no}}
| {{no}}
| {{no}}
|-
!{{Rh}}| FREE CompuSec
| {{dunno}}
| {{yes}}
| {{dunno}}
| {{no}}
| {{no}}
Line 949 ⟶ 841:
| {{no}}
| {{no}}
|-
!{{Rh}}| [[FreeOTFE]]
| {{no}}
| {{yes}}
| {{
| {{no}}
| {{partial}}<ref>http://www.freeotfe.org/docs/Main/Linux_volumes.htm Supports Linux volumes</ref>
Line 962 ⟶ 851:
| {{no}}
| {{no}}
|-
!{{Rh}}| [[GBDE]]
| {{dunno}}
| {{no}}
| {{dunno}}
| {{no}}
| {{no}}
Line 972 ⟶ 861:
| {{no}}
| {{no}}
|-
!{{Rh}}| [[Geli (software)|GELI]]
| {{dunno}}
| {{no}}
| {{dunno}}
| {{no}}
| {{no}}
Line 984 ⟶ 871:
| {{no}}
| {{no}}
|-
!{{Rh}}| Knox
| {{dunno}}
| {{no}}
| {{dunno}}
| {{yes}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
|-
!{{Rh}}| LibreCrypt
| {{yes}}<ref>https://play.google.com/store/apps/details?id=com.nemesis2.luksmanager&hl=en_GB Third party app allows a user to open LibreCrypt compatible LUKS containers</ref>
| {{yes}}
| {{
| {{no}}
| {{partial}}<ref>https://github.com/t-d-k/LibreCrypt/blob/master/docs/Linux_volumes.md Supports Linux volumes</ref>
Line 1,010 ⟶ 891:
| {{no}}
| {{no}}
|-
!{{Rh}}| Loop-AES
| {{dunno}}
| {{no}}
| {{
| {{no}}
| {{yes}}
Line 1,022 ⟶ 901:
| {{no}}
| {{no}}
|-
!{{Rh}}| McAfee Drive Encryption (SafeBoot)
| {{dunno}}
| {{yes}}
| {{dunno}}
| {{yes}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
|-
!{{Rh}}| n-Crypt Pro
| {{dunno}}
| {{yes}}
| {{dunno}}
| {{no}}
| {{no}}
Line 1,063 ⟶ 923:
|-
!{{Rh}}| [[PGPDisk]]
| {{dunno}}
| {{yes}}
| {{dunno}}
| {{yes}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
|-
!{{Rh}}| [[PGP Whole Disk Encryption]]
| {{dunno}}
| {{yes}}
| {{
| {{yes}}
| {{yes}}
Line 1,083 ⟶ 941:
| {{no}}
| {{no}}
|-
!{{Rh}}| [[Private Disk]]
| {{dunno}}
| {{yes}}
| {{dunno}}
| {{no}}
| {{no}}
Line 1,093 ⟶ 951:
| {{no}}
| {{no}}
|-
!{{Rh}}| ProxyCrypt
| {{no}}
| {{yes}}
| {{dunno}}
| {{no}}
| {{no}}
Line 1,105 ⟶ 961:
| {{no}}
| {{no}}
|-
!{{Rh}}| R-Crypto
| {{dunno}}
| {{yes}}
| {{dunno}}
| {{no}}
| {{no}}
Line 1,117 ⟶ 971:
| {{no}}
| {{no}}
|-
!{{Rh}}| SafeGuard Easy
| {{dunno}}
| {{yes}}
| {{dunno}}
| {{no}}
| {{no}}
Line 1,129 ⟶ 981:
| {{no}}
| {{no}}
|-
!{{Rh}}| SafeGuard Enterprise
| {{dunno}}
| {{yes}}
| {{dunno}}
| {{yes}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
|-
!{{Rh}}| SafeGuard PrivateDisk
| {{dunno}}
| {{yes}}
| {{dunno}}
| {{no}}
| {{no}}
Line 1,153 ⟶ 1,001:
| {{no}}
| {{no}}
|-
!{{Rh}}| SafeHouse Professional
| {{dunno}}
| {{yes}}
| {{dunno}}
| {{no}}
| {{no}}
Line 1,165 ⟶ 1,011:
| {{no}}
| {{no}}
|-
!{{Rh}}| [[Scramdisk]]
| {{dunno}}
| {{yes}}
| {{
| {{no}}
| {{yes}}
Line 1,178 ⟶ 1,021:
| {{no}}
| {{no}}
|-
!{{Rh}}| [[Scramdisk]] 4 Linux
| {{dunno}}
| {{no}}
| {{
| {{no}}
| {{yes}}
Line 1,190 ⟶ 1,031:
| {{no}}
| {{no}}
|-
!{{Rh}}| SecuBox
| {{dunno}}
| {{no}}
| {{
| {{no}}
| {{no}}
Line 1,202 ⟶ 1,041:
| {{no}}
| {{no}}
|-
!{{Rh}}| SecureDoc
| {{dunno}}
| {{yes}}
| {{
| {{yes}}
| {{yes}}
Line 1,215 ⟶ 1,051:
| {{no}}
| {{no}}
|-
!{{Rh}}| [[Sentry 2020]]
| {{dunno}}
| {{yes}}
| {{dunno}}
| {{no}}
| {{no}}
Line 1,225 ⟶ 1,061:
| {{no}}
| {{no}}
|-
!{{Rh}}| [[Seqrite]] Volume Encryption
| {{no}}
| {{yes}}
| {{no}}
| {{no}}
Line 1,243 ⟶ 1,073:
|-
!{{Rh}}| Softraid / RAID C
| {{dunno}}
| {{no}}
| {{
| {{no}}
| {{no}}
Line 1,251 ⟶ 1,081:
| {{yes}}
| {{no}}
|-
!{{Rh}}| SpyProof!
| {{dunno}}
| {{yes}}
| {{dunno}}
| {{no}}
| {{no}}
Line 1,261 ⟶ 1,091:
| {{no}}
| {{no}}
|-
!{{Rh}}| Svnd / Vnconfig
| {{dunno}}
| {{no}}
| {{
| {{no}}
| {{no}}
Line 1,275 ⟶ 1,101:
| {{yes}}
| {{no}}
|-
!{{Rh}}| [[NortonLifeLock|Symantec]] Endpoint Encryption
| {{dunno}}
| {{yes}}
| {{
| {{yes}}
| {{no}}<ref>{{cite web|url=https://www.broadcom.com/products/cybersecurity|title=Endpoint Encryption Powered by PGP Technology - Symantec}}</ref>
| {{no}}
| {{no}}
| {{no}}
|-
!{{Rh}}| Tcplay
| {{no}}
| {{no}}
| {{dunno}}
| {{no}}
| {{yes}}
Line 1,298 ⟶ 1,121:
| {{no}}
| {{no}}
|-
!{{Rh}}| [[Trend Micro]] Endpoint Encryption
| {{no}}
| {{yes}}
| {{dunno}}
| {{yes}}
| {{no}}
Line 1,312 ⟶ 1,131:
| {{no}}
| {{no}}
|-
!{{Rh}}| [[TrueCrypt]]
| {{yes}}<ref name="play.google.com"/>
| {{yes}}
| {{yes}}
| {{yes}}
| {{yes}}
| {{no}}<ref>http://www.truecrypt.org/misc/freebsd Although TrueCrypt can be built under FreeBSD, it is not recommended to run it because of bugs and instabilities when TrueCrypt is attempted to be used</ref>
| {{no}}
| {{no}}
|-
!{{Rh}}| USBCrypt
| {{no}}
| {{yes}}
| {{dunno}}
| {{no}}
| {{no}}
Line 1,333 ⟶ 1,151:
| {{no}}
| {{no}}
|-
!{{Rh}}| [[VeraCrypt]]
| {{yes}}<ref>https://play.google.com/store/apps/details?id=com.sovworks.eds.android Third party app allows to encrypt and decrypt VeraCrypt containers (only available in the paid version)</ref>
| {{yes}}
| {{yes}}<ref>https://apps.apple.com/de/app/disk-decipher/id516538625 Third party app allows to encrypt and decrypt VeraCrypt containers (only available in the paid version)</ref>
| {{yes}}
| {{yes}}
Line 1,346 ⟶ 1,161:
| {{no}}
| {{no}}
|-
!{{Rh}}| CyberSafe Top Secret
| {{yes}}
| {{yes}}
| {{dunno}}
| {{no}}
| {{no}}
Line 1,357 ⟶ 1,171:
| {{no}}
| {{no}}
|-class="sortbottom"
! Name
! [[Android (operating system)|Android]]
! [[Windows NT]]
! [[iOS]]
! [[Mac OS X]]
! [[Linux]]
! [[FreeBSD]]
! [[
! [[NetBSD]]
|}
Line 1,381 ⟶ 1,189:
* '''Custom authentication''': Whether custom authentication mechanisms can be implemented with third-party applications.{{clarify|e.g. perhaps link to WP's article re: 1-time password (OTP) tokens? See Talk Page: someone else also was confused about exactly what this includes; pls give some examples & links.|date=January 2011}}
* '''Multiple keys''': Whether an encrypted volume can have more than one active [[Key (cryptography)|key]].
* '''Passphrase strengthening''': Whether [[key strengthening]] is used with plain text passwords to frustrate [[dictionary attack]]s, usually using [[PBKDF2]] or [[Argon2]].
* '''Hardware acceleration''': Whether dedicated [[cryptographic accelerator]] expansion cards can be taken advantage of.
* '''[[Trusted Platform Module]]''': Whether the implementation can use a TPM [[cryptoprocessor]].
Line 1,413 ⟶ 1,221:
|-
! ArchiCrypt Live
| {{yes}}<ref name="ArchiCrypt">Secret-containers and Camouflage files [http://www.archicrypt-shop.com/ArchiCrypt-Live.htm ArchiCrypt Live Description] {{Webarchive|url=https://web.archive.org/web/20110824163518/http://www.archicrypt-shop.com/ArchiCrypt-Live.htm |date=2011-08-24 }}</ref>
| {{no}}
| {{n/a}}
Line 1,436 ⟶ 1,244:
| {{yes}}<ref>Supported by the BestCrypt Volume Encryption software</ref>
|-
!
| {{no}}
| {{yes}}
Line 1,477 ⟶ 1,285:
| {{n/a}}
| {{yes}}<ref name=cgd-paper>{{Cite journal |author=Roland C. Dowdeswell, John Ioannidis |title=The CryptoGraphic Disk Driver |journal=CGD Design Paper |url=http://www.imrryr.org/~elric/cgd/cgd.pdf |access-date=2006-12-24 }}</ref>
| {{yes}}<ref name=inside-cgd>{{cite web |author=Federico Biancuzzi |date=2005-12-21 |title=Inside NetBSD's CGD |work=interview with Roland Dowdeswell |url=http://www.onlamp.com/pub/a/bsd/2005/12/21/netbsd_cgd.html?page=1 |publisher=ONLamp.com |access-date=2006-12-24 |archive-date=2007-09-29 |archive-url=https://web.archive.org/web/20070929091538/http://www.onlamp.com/pub/a/bsd/2005/12/21/netbsd_cgd.html?page=1 |url-status=dead }}</ref>
| {{yes}}<ref name=cgd-paper/>
| {{no}}
Line 1,532 ⟶ 1,340:
| {{no}}
|-
!
| {{no}}
| {{no}}
Line 1,592 ⟶ 1,400:
| {{dunno}}
|-
! [[Cryptomator]]
| {{no}}
| {{no}}
Line 1,661 ⟶ 1,469:
| {{yes}}
| {{yes}}
| {{yes |NTFS, FAT32}}
| {{yes}}
|-
Line 1,673 ⟶ 1,481:
| {{yes}}
| {{partial|Partial}}<ref name=dm-crypt_tpm>{{cite web |title=cryptsetup Frequently Asked Questions |url=https://gitlab.com/cryptsetup/cryptsetup/wikis/FrequentlyAskedQuestions |access-date=2016-01-07 }}</ref> {{r|group=Note|dm-cryptTPM}}
| {{yes|Any supported by OS}}
| {{yes}}
Line 1,713 ⟶ 1,509:
|-
! e-Capsule Private Safe
| {{yes}}<ref name=ps-mla>{{cite web |title=Multi level access with separate access credentials, each enabling a different set of functional or logical operations |publisher=EISST Ltd. |url=http://www.eisst.com/products/private_safe/compare/ |access-date=2007-07-25 |archive-date=2007-09-28 |archive-url=https://web.archive.org/web/20070928145451/http://www.eisst.com/products/private_safe/compare/ |url-status=dead }}</ref>
| {{no}}
| {{n/a}}
Line 1,834 ⟶ 1,630:
! Loop-AES
| {{no}}
| {{yes}}<ref name=loop-aes>{{cite web |author=Jari Ruusu |title=loop-AES README file |url=
| {{dunno}}
| {{yes}}<ref name=loop-aes/>
Line 1,870 ⟶ 1,666:
! [[PGPDisk]]
| {{no}}
| {{yes}}<ref name=pgp-faq>{{cite web |title=PGP Whole Disk Encryption FAQ |publisher=PGP Corporation |url=http://www.pgp.com/products/wholediskencryption/faq.html |access-date=2006-12-24 |archive-date=2006-12-24 |archive-url=https://web.archive.org/web/20061224231228/http://www.pgp.com/products/wholediskencryption/faq.html |url-status=dead }}</ref>
| {{yes}}
| {{dunno}}
Line 2,131 ⟶ 1,927:
! Filesystems
! Two-factor authentication
|-
!ZzEnc
!No
!Yes
!Yes
!Yes
!Yes
!Yes
!No
!No
!Windows, Legacy BIOS & UEFI
!In UEFI with removable keys store on USB-flash
|}
{{Reflist|group=Note|refs=
Line 2,136 ⟶ 1,944:
<ref name=BitLockerFS>Windows 7 introduces Bitlocker-To-Go which supports NTFS, FAT32 or exFAT, however for hard drive encryption, [[Windows Vista]] and later are limited to be installable only on NTFS volumes</ref>
<ref name=dm-cryptTPM>An external tool can be used to read the key from the TPM and then have the key passed on to dm-crypt/LUKS via the [[standard input]]</ref>
<ref name=TrueCryptMystery>The current situation around TrueCrypt project is controversial. On 28.05.2014 after many years of development and broad usage the open-source (although anonymous) project was suddenly stopped, and all previous official materials and complete (encrypt/decrypt) binaries were withdrawn from its website citing some "unfixed security issues" and Windows XP end of support. The technical information herein is valid only for previous versions of TrueCrypt (v7.1a and some earlier). The latest available version (v7.2) is decrypt only, its authenticity and actual reasons behind the move are unclear, and its usage is not recommended.
]}}
Line 2,180 ⟶ 1,988:
| {{dunno}}
|-
!
| {{no}}
| {{yes}}
Line 2,236 ⟶ 2,044:
| {{dunno}}
|-
!
| {{no}}
| {{no}}
Line 2,330 ⟶ 2,138:
| {{yes}}
| {{yes}}<ref>yes, but the user needs custom scripts: http://www.linuxquestions.org/questions/slackware-14/luks-encryption-swap-and-hibernate-627958/</ref>
| {{dunno}}
|-
Line 2,545 ⟶ 2,345:
| {{n/a}}
| {{no}}
| {{dunno}}
|-
Line 2,689 ⟶ 2,481:
| {{dunno}}
|-
!
| {{no}}
| {{yes}}
Line 2,745 ⟶ 2,537:
| {{dunno}}
|-
!
| {{yes}}
| {{no}}
Line 2,782 ⟶ 2,574:
| {{no}}
| {{no}}
| {{yes}}<ref>{{cite web |title=CIBLE DE SECURITE CRITERES COMMUNS NIVEAU EAL3+ |url=https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-Cible-2022_35fr.pdf }}</ref>
| {{dunno}}
|-
Line 2,812 ⟶ 2,604:
| date = 2018-01-01 | access-date = 2018-05-08
}}</ref>}}
|-
! [[DriveSentry]] GoAnywhere 2
Line 3,138 ⟶ 2,922:
[[Category:Disk encryption|*]]
[[Category:
[[Category:Cryptographic software|*]]
[[Category:Cryptography lists and comparisons|Disk encryption software]]
|