Content deleted Content added
No edit summary |
m HTTP to HTTPS for SourceForge |
||
(22 intermediate revisions by 15 users not shown) | |||
Line 32:
|-
!{{Rh}}| BitArmor DataControl
|
| 2008-05
| {{Proprietary}}
Line 44:
|-
!{{Rh}}| Bloombase StoreSafe
| [https://www.bloombase.com/ Bloombase]
| 2012
| {{Proprietary}}
Line 79:
| {{no}}
|-
!{{Rh}}|
| Steven Scherrer
| 2004-02-10<ref>{{cite web |author=Sarah Dean |date=2004-02-10 |title=OTFEDB entry |url=http://otfedb.sdean12.org/cgi-bin/pub_factsheet.cgi?SYSTEM_ID=46 |access-date=2008-08-10 |url-status=dead |archive-url=https://web.archive.org/web/20081211101509/http://otfedb.sdean12.org/cgi-bin/pub_factsheet.cgi?SYSTEM_ID=46 |archive-date=2008-12-11 }}</ref>
Line 99:
!{{Rh}}| Cryptainer
| Cypherix Software
|
| {{Proprietary}}
| {{yes}}
Line 121:
| {{no}}
|-
!{{Rh}}| [[Cryptomator]]
| Skymatic UG (haftungsbeschränkt)
| 2016-03-09<ref>{{cite web |url=http://www.cryptomator.org/ |title=Home |website=cryptomator.org}}</ref>
Line 142:
| Stefan Küng
| 2012
| {{free|[[
| {{yes}}
|-
Line 174:
| {{free|[[GNU General Public License|GPL]]}}
| {{yes}}
|-
!{{Rh}}| [[DriveSentry]] GoAnywhere 2
Line 220 ⟶ 214:
| ENC Security Systems
| 2009
| {{Proprietary}}
| {{yes}}
Line 310 ⟶ 298:
| n-Trance Security Ltd
| 2005
| {{Proprietary}}
| {{yes}}
Line 362 ⟶ 338:
|-
!{{Rh}}| SafeGuard PrivateDisk
| [[Sophos]] (Utimaco)<ref name="LenovoPrivateDisk">Rebranded as ThinkVantage Client Security {{
| 2000
| {{Proprietary}}
Line 381 ⟶ 357:
!{{Rh}}| [[Scramdisk]] 4 Linux
| Hans-Ulrich Juettner
| 2005-08-06<ref>{{cite web |title=ScramDisk 4 Linux Releases |url=
| {{free|[[GNU General Public License|GPL]]}}
| {{no}}
Line 394 ⟶ 370:
| SECUDE
| 2003
| {{Proprietary}}
| {{yes}}
Line 443 ⟶ 413:
| 2012-01-28<ref>{{cite web|url=https://github.com/bwalex/tc-play/releases|title=bwalex/tc-play|website=[[GitHub]]|date=2019-08-27}}</ref>
| {{free|[[BSD licenses|BSD]]}}
| {{no}}<ref>Last update: 2020-03-02 {{cite web|publisher = Github | title = bwalex/tc-play | url=https://github.com/bwalex/tc-play|date=2023-04-03}}</ref>
|-
!{{Rh}}| [[Trend Micro]] Endpoint Encryption (Mobile Armor)
Line 481 ⟶ 451:
!{{Rh}}| Licensing
!{{Rh}}| Maintained?
|-
!ZzEnc
![https://imdtech.ru/ru/technologies/fde/ IMDTech]
!2013
!Commercial
!
|}
Line 596 ⟶ 572:
| {{no}}
|-
!{{Rh}}|
| {{no}}
| {{yes}}<ref>
| {{dunno}}
| {{no}}
Line 666 ⟶ 642:
| {{no}}
|-
!{{Rh}}| [
| {{yes}}
| {{yes}}<ref name="cryptomator.org">{{Cite web | url=http://www.cryptomator.org |title = Cryptomator - Free Cloud Encryption}}</ref>
Line 752 ⟶ 728:
| {{no}}
| {{yes}}
| {{no}}
| {{no}}
Line 950 ⟶ 916:
| {{yes}}
| {{dunno}}
| {{no}}
| {{no}}
Line 1,151 ⟶ 1,107:
| {{dunno}}
| {{yes}}
| {{no}}<ref>{{cite web|url=
| {{no}}
| {{no}}
Line 1,233 ⟶ 1,189:
* '''Custom authentication''': Whether custom authentication mechanisms can be implemented with third-party applications.{{clarify|e.g. perhaps link to WP's article re: 1-time password (OTP) tokens? See Talk Page: someone else also was confused about exactly what this includes; pls give some examples & links.|date=January 2011}}
* '''Multiple keys''': Whether an encrypted volume can have more than one active [[Key (cryptography)|key]].
* '''Passphrase strengthening''': Whether [[key strengthening]] is used with plain text passwords to frustrate [[dictionary attack]]s, usually using [[PBKDF2]] or [[Argon2]].
* '''Hardware acceleration''': Whether dedicated [[cryptographic accelerator]] expansion cards can be taken advantage of.
* '''[[Trusted Platform Module]]''': Whether the implementation can use a TPM [[cryptoprocessor]].
Line 1,265 ⟶ 1,221:
|-
! ArchiCrypt Live
| {{yes}}<ref name="ArchiCrypt">Secret-containers and Camouflage files [http://www.archicrypt-shop.com/ArchiCrypt-Live.htm ArchiCrypt Live Description] {{Webarchive|url=https://web.archive.org/web/20110824163518/http://www.archicrypt-shop.com/ArchiCrypt-Live.htm |date=2011-08-24 }}</ref>
| {{no}}
| {{n/a}}
Line 1,288 ⟶ 1,244:
| {{yes}}<ref>Supported by the BestCrypt Volume Encryption software</ref>
|-
!
| {{no}}
| {{yes}}
Line 1,384 ⟶ 1,340:
| {{no}}
|-
!
| {{no}}
| {{no}}
Line 1,444 ⟶ 1,400:
| {{dunno}}
|-
! [[Cryptomator]]
| {{no}}
| {{no}}
Line 1,513 ⟶ 1,469:
| {{yes}}
| {{yes}}
| {{yes |NTFS, FAT32}}
| {{yes}}
|-
Line 1,525 ⟶ 1,481:
| {{yes}}
| {{partial|Partial}}<ref name=dm-crypt_tpm>{{cite web |title=cryptsetup Frequently Asked Questions |url=https://gitlab.com/cryptsetup/cryptsetup/wikis/FrequentlyAskedQuestions |access-date=2016-01-07 }}</ref> {{r|group=Note|dm-cryptTPM}}
| {{yes|Any supported by OS}}
| {{yes}}
Line 1,565 ⟶ 1,509:
|-
! e-Capsule Private Safe
| {{yes}}<ref name=ps-mla>{{cite web |title=Multi level access with separate access credentials, each enabling a different set of functional or logical operations |publisher=EISST Ltd. |url=http://www.eisst.com/products/private_safe/compare/ |access-date=2007-07-25 |archive-date=2007-09-28 |archive-url=https://web.archive.org/web/20070928145451/http://www.eisst.com/products/private_safe/compare/ |url-status=dead }}</ref>
| {{no}}
| {{n/a}}
Line 1,686 ⟶ 1,630:
! Loop-AES
| {{no}}
| {{yes}}<ref name=loop-aes>{{cite web |author=Jari Ruusu |title=loop-AES README file |url=
| {{dunno}}
| {{yes}}<ref name=loop-aes/>
Line 1,722 ⟶ 1,666:
! [[PGPDisk]]
| {{no}}
| {{yes}}<ref name=pgp-faq>{{cite web |title=PGP Whole Disk Encryption FAQ |publisher=PGP Corporation |url=http://www.pgp.com/products/wholediskencryption/faq.html |access-date=2006-12-24 |archive-date=2006-12-24 |archive-url=https://web.archive.org/web/20061224231228/http://www.pgp.com/products/wholediskencryption/faq.html |url-status=dead }}</ref>
| {{yes}}
| {{dunno}}
Line 1,983 ⟶ 1,927:
! Filesystems
! Two-factor authentication
|-
!ZzEnc
!No
!Yes
!Yes
!Yes
!Yes
!Yes
!No
!No
!Windows, Legacy BIOS & UEFI
!In UEFI with removable keys store on USB-flash
|}
{{Reflist|group=Note|refs=
Line 1,988 ⟶ 1,944:
<ref name=BitLockerFS>Windows 7 introduces Bitlocker-To-Go which supports NTFS, FAT32 or exFAT, however for hard drive encryption, [[Windows Vista]] and later are limited to be installable only on NTFS volumes</ref>
<ref name=dm-cryptTPM>An external tool can be used to read the key from the TPM and then have the key passed on to dm-crypt/LUKS via the [[standard input]]</ref>
<ref name=TrueCryptMystery>The current situation around TrueCrypt project is controversial. On 28.05.2014 after many years of development and broad usage the open-source (although anonymous) project was suddenly stopped, and all previous official materials and complete (encrypt/decrypt) binaries were withdrawn from its website citing some "unfixed security issues" and Windows XP end of support. The technical information herein is valid only for previous versions of TrueCrypt (v7.1a and some earlier). The latest available version (v7.2) is decrypt only, its authenticity and actual reasons behind the move are unclear, and its usage is not recommended.
]}}
Line 2,032 ⟶ 1,988:
| {{dunno}}
|-
!
| {{no}}
| {{yes}}
Line 2,088 ⟶ 2,044:
| {{dunno}}
|-
!
| {{no}}
| {{no}}
Line 2,182 ⟶ 2,138:
| {{yes}}
| {{yes}}<ref>yes, but the user needs custom scripts: http://www.linuxquestions.org/questions/slackware-14/luks-encryption-swap-and-hibernate-627958/</ref>
| {{dunno}}
|-
Line 2,397 ⟶ 2,345:
| {{n/a}}
| {{no}}
| {{dunno}}
|-
Line 2,541 ⟶ 2,481:
| {{dunno}}
|-
!
| {{no}}
| {{yes}}
Line 2,597 ⟶ 2,537:
| {{dunno}}
|-
!
| {{yes}}
| {{no}}
Line 2,634 ⟶ 2,574:
| {{no}}
| {{no}}
| {{yes}}<ref>{{cite web |title=CIBLE DE SECURITE CRITERES COMMUNS NIVEAU EAL3+ |url=https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-Cible-2022_35fr.pdf }}</ref>
| {{dunno}}
|-
Line 2,664 ⟶ 2,604:
| date = 2018-01-01 | access-date = 2018-05-08
}}</ref>}}
|-
! [[DriveSentry]] GoAnywhere 2
|