Comparison of disk encryption software: Difference between revisions

Content deleted Content added
AnomieBOT (talk | contribs)
Rescuing orphaned refs ("boxcryptor" from rev 1095420492)
Bender the Bot (talk | contribs)
m HTTP to HTTPS for SourceForge
 
(28 intermediate revisions by 20 users not shown)
Line 32:
|-
!{{Rh}}| BitArmor DataControl
| [[BitArmor|BitArmor Systems Inc.]]
| 2008-05
| {{Proprietary}}
Line 44:
|-
!{{Rh}}| Bloombase StoreSafe
| [https://www.bloombase.com/ Bloombase]
| 2012
| {{Proprietary}}
Line 53:
| 2011
| {{Proprietary}}
| {{yesno}}
|-
!{{Rh}}| CGD
Line 79:
| {{no}}
|-
!{{Rh}}| [[CrossCrypt]]
| Steven Scherrer
| 2004-02-10<ref>{{cite web |author=Sarah Dean |date=2004-02-10 |title=OTFEDB entry |url=http://otfedb.sdean12.org/cgi-bin/pub_factsheet.cgi?SYSTEM_ID=46 |access-date=2008-08-10 |url-status=dead |archive-url=https://web.archive.org/web/20081211101509/http://otfedb.sdean12.org/cgi-bin/pub_factsheet.cgi?SYSTEM_ID=46 |archive-date=2008-12-11 }}</ref>
Line 99:
!{{Rh}}| Cryptainer
| Cypherix Software
| 19991998
| {{Proprietary}}
| {{yes}}
Line 121:
| {{no}}
|-
!{{Rh}}| [[Cryptomator]]
| Skymatic UG (haftungsbeschränkt)
| 2016-03-09<ref>{{cite web |url=http://www.cryptomator.org/ |title=Home |website=cryptomator.org}}</ref>
| {{free|[[GPLv3]]}}
| {{yes}}
Line 142:
| Stefan Küng
| 2012
| {{free|[[GplGPL v2]]}}
| {{yes}}
|-
Line 155:
| 2007
| {{free|[[GNU General Public License|GPL]]}}
| {{yesno}}<ref>{{Cite web|url=https://github.com/DavidXanatos/DiskCryptor/releases|title = Releases · DavidXanatos/DiskCryptor|website = [[GitHub]]}}</ref>
|-
!{{Rh}}| DISK Protect
Line 174:
| {{free|[[GNU General Public License|GPL]]}}
| {{yes}}
|-
!{{Rh}}| [https://www.securstar.com/en/drivecrypt.html DriveCrypt]
| SecurStar GmbH
| 2001
| {{Proprietary}}
| {{yes}}<ref>{{cite web |author=SecurStar GmbH |title=DriveCrypt v5.8 Released |url=https://www.securstar.com/en/drivecrypt.html |access-date=2015-10-26 |archive-url=https://web.archive.org/web/20151027223747/https://www.securstar.com/en/drivecrypt.html |archive-date=2015-10-27 |url-status=dead }}</ref>
|-
!{{Rh}}| [[DriveSentry]] GoAnywhere 2
Line 215 ⟶ 209:
| 2003<ref>{{cite web |author=Valient Gough |date=2003 |title= EncFS - an Encrypted Filesystem |work=README.md file |url=https://github.com/vgough/encfs |access-date=2007-01-14 }}</ref>
| {{free|[[GNU Lesser General Public License|LGPLv3]]}}
| {{yesno}}
|-
!{{Rh}}| EncryptStick
| ENC Security Systems
| 2009
| {{Proprietary}}
| {{yes}}
|-
!{{Rh}}| EncryptUSB
| ClevX
| 2016
| {{Proprietary}}
| {{yes}}
Line 310 ⟶ 298:
| n-Trance Security Ltd
| 2005
| {{Proprietary}}
| {{yes}}
|-
!{{Rh}}| [https://netlibsecurity.com/ NetLib Encryptionizer (directory encryption)]
| NetLib Security
| 1987
| {{Proprietary}}
| {{yes}}
|-
!{{Rh}}| [https://www.nodrive.cloud/ Nodrive (Virtual Encrypted Disk)]
| Hidden Solutions
| 2018
| {{Proprietary}}
| {{yes}}
Line 362 ⟶ 338:
|-
!{{Rh}}| SafeGuard PrivateDisk
| [[Sophos]] (Utimaco)<ref name="LenovoPrivateDisk">Rebranded as ThinkVantage Client Security {{citeCite FTP web|url=ftp://ftp.software.ibm.com/pc/pccbbs/thinkcentre_pdf/rr30mst.pdf|server=[[Lenovo]]|url-status=dead|title=ThinkVantage Technologies Deployment Guide|publisher=[[Lenovo]]|access-date=2008-03-05}}{{dead link|date=August 2017 |bot=InternetArchiveBot |fix-attempted=yes }}</ref>
| 2000
| {{Proprietary}}
Line 381 ⟶ 357:
!{{Rh}}| [[Scramdisk]] 4 Linux
| Hans-Ulrich Juettner
| 2005-08-06<ref>{{cite web |title=ScramDisk 4 Linux Releases |url=httphttps://sourceforge.net/project/showfiles.php?group_id=101952&package_id=109447}}</ref>
| {{free|[[GNU General Public License|GPL]]}}
| {{no}}
Line 394 ⟶ 370:
| SECUDE
| 2003
| {{Proprietary}}
| {{yes}}
|-
!{{Rh}}| SecureDoc
| [https://www.winmagic.com WinMagic Inc.]
| 1997
| {{Proprietary}}
| {{yes}}
Line 443 ⟶ 413:
| 2012-01-28<ref>{{cite web|url=https://github.com/bwalex/tc-play/releases|title=bwalex/tc-play|website=[[GitHub]]|date=2019-08-27}}</ref>
| {{free|[[BSD licenses|BSD]]}}
| {{no}}<ref>Last update: 2020-03-02 {{cite web|publisher = Github | title = bwalex/tc-play | url=https://github.com/bwalex/tc-play|date=2023-04-03}}</ref>
| {{yes}}
|-
!{{Rh}}| [[Trend Micro]] Endpoint Encryption (Mobile Armor)
Line 466 ⟶ 436:
| IDRIX
| 2013-06-22<ref>{{cite web|url=https://veracrypt.codeplex.com/SourceControl/list/changesets?page=8|title=VeraCrypt}}</ref>
| {{free|Apache License 2.0}}<ref>{{cite web | title =Apache License 2.0 | publisher =IDRIX | date =2015-06-28 | url =https://veracrypt.codeplex.com/license | access-date = 2015-08-08 | archive-date =2015-07-09 | archive-url =https://web.archive.org/web/20150709234209/https://veracrypt.codeplex.com/license | url-status =dead }}</ref>
TrueCrypt License Version 3.0 (legacy code only)
| {{yes}}
Line 481 ⟶ 451:
!{{Rh}}| Licensing
!{{Rh}}| Maintained?
|-
!ZzEnc
![https://imdtech.ru/ru/technologies/fde/ IMDTech]
!2013
!Commercial
!
|}
 
Line 499 ⟶ 475:
| {{dunno}}
| {{yes}}
| {{dunno}}
| {{no}}
| {{no}}
| {{no}}
Line 508 ⟶ 485:
| {{dunno}}
| {{yes}}
| {{dunno}}
| {{yes}}
| {{no}}<ref>{{cite web|url=http://www.jetico.com/products/enterprise-data-protection/bestcrypt-volume-encryption|title=Whole Hard Disk Encryption Software - BestCrypt Volume Encryption - Jetico Inc. Oy}}</ref>
| {{no}}
Line 517 ⟶ 495:
| {{dunno}}
| {{yes}}
| {{dunno}}
| {{no}}
| {{no}}
| {{no}}
Line 526 ⟶ 505:
| {{no}}
| {{yes}}
| {{dunno}}
| {{Partial}}<ref name=dislocker />
| {{Partial}}<ref name=dislocker>https://github.com/Aorimn/dislocker FUSE driver to read/write Windows BitLocker-ed volumes under Linux / Mac OSX</ref>
| {{no}}
Line 535 ⟶ 515:
| {{dunno}}
| {{yes}}
| {{dunno}}
| {{yes}}
| {{yes}}
| {{yes}}
Line 544 ⟶ 525:
| {{yes}}
| {{yes}}
| {{yes}}
| {{yes}}
| {{yes}}
| {{no}}
Line 553 ⟶ 535:
| {{dunno}}
| {{yes}}
| {{dunno}}
| {{no}}
| {{no}}
| {{no}}
Line 562 ⟶ 545:
| {{dunno}}
| {{no}}
| {{dunno}}
| {{no}}
| {{no}}
| {{no}}
Line 571 ⟶ 555:
| {{dunno}}
| {{yes}}
| {{dunno}}
| {{yes}}
| {{yes}}<ref>{{cite web |url=http://www.checkpoint.com/products/full-disk-encryption/DS_FullDisk_Encryption_120614.pdf |title=Archived copy |access-date=2014-12-14 |url-status=dead |archive-url=https://web.archive.org/web/20150923202446/http://www.checkpoint.com/products/full-disk-encryption/DS_FullDisk_Encryption_120614.pdf |archive-date=2015-09-23 }}</ref>
| {{no}}
Line 580 ⟶ 565:
| {{yes}}<ref name="play.google.com">https://play.google.com/store/apps/details?id=com.sovworks.edslite Third party app allows to open containers encryptes with AES-256, SHA-512 hash and FAT file system</ref>
| {{yes}}
| {{dunno}}
| {{yes}}
| {{yes}}
| {{no}}<ref>http://www.truecrypt.org/misc/freebsd Although CipherShed can be built under FreeBSD, it is not recommended to run it because of bugs and instabilities when CipherShed is attempted to be used</ref>
Line 586 ⟶ 572:
| {{no}}
|-
!{{Rh}}| [[CrossCrypt]]
| {{no}}
| {{yes}}<ref>CrossCrypt - Only for the Microsoft Windows XP/2000 operating systems</ref>
| {{dunno}}
| {{no}}
| {{yes}}<ref>[[CrossCrypt]] - Only for the Microsoft Windows XP/2000 operating systems</ref>
| {{dunno}}| {{no}}
| {{no}}
| {{no}}
Line 598 ⟶ 585:
| {{no}}
| {{yes}}
| {{dunno}}
| {{yes}}
| {{yes}}
| {{yes}}
Line 607 ⟶ 595:
| {{dunno}}
| {{yes}}
| {{dunno}}
| {{no}}
| {{yes}}
| {{no}}
Line 616 ⟶ 605:
| {{dunno}}
| {{yes}}
| {{dunno}}
| {{no}}
| {{no}}
| {{no}}
Line 625 ⟶ 615:
| {{dunno}}
| {{yes}}
| {{dunno}}
| {{no}}
| {{no}}
| {{no}}
Line 634 ⟶ 625:
| {{no}}
| {{yes}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
Line 643 ⟶ 635:
| {{dunno}}
| {{yes}}<ref name="freeotfe.org">http://www.freeotfe.org/docs/Main/Linux_volumes.htm FreeOTFE supports cryptoloop, dm-crypt/[[cryptsetup]]/[[dmsetup]], and dm-crypt/LUKS volumes</ref>
| {{dunno}}
| {{no}}
| {{yes}}
| {{no}}
Line 649 ⟶ 642:
| {{no}}
|-
!{{Rh}}| [http://www.Cryptomator.org [Cryptomator]]
| {{yes}}
| {{yes}}<ref name="cryptomator.org">{{Cite web | url=http://www.cryptomator.org |title = Cryptomator - Free Cloud Encryption}}</ref>
| {{yes}}
| {{yes}}
| {{yes}}
| {{no}}
Line 661 ⟶ 655:
| {{no}}
| {{yes}}
| {{dunno}}
| {{no}}
| {{no}}
| {{no}}
Line 670 ⟶ 665:
| {{no}}
| {{yes}}
| {{dunno}}
| {{no}}
| {{no}}
| {{no}}
Line 679 ⟶ 675:
| {{dunno}}
| {{yes}}<ref name="freeotfe.org"/>
| {{dunno}}
| {{no}}
| {{yes}}
| {{no}}
Line 688 ⟶ 685:
| {{no}}
| {{yes}}
| {{dunno}}
| {{yes}}
| {{yes}}
| {{no}}
Line 697 ⟶ 695:
| {{dunno}}
| {{no}}
| {{dunno}}
| {{no}}
| {{no}}
| {{no}}
Line 706 ⟶ 705:
| {{dunno}}
| {{yes}}
| {{dunno}}
| {{no}}
| {{no}}
| {{no}}
Line 715:
| {{dunno}}
| {{yes}}
| {{dunno}}
| {{no}}
| {{no}}
| {{no}}
Line 724 ⟶ 725:
| {{dunno}}
| {{yes}}<ref name="freeotfe.org"/>
| {{dunno}}| {{no}}
| {{yes}}
| {{no}}
| {{no}}
| {{no}}
|-
!{{Rh}}| [https://www.securstar.com/en/drivecrypt.html DriveCrypt]
| {{dunno}}
| {{no}}
| {{yes}}
| {{dunno}}| {{no}}
| {{no}}
| {{no}}
| {{no}}
Line 742 ⟶ 735:
| {{dunno}}
| {{yes}}
| {{dunno}}
| {{no}}
| {{no}}
| {{no}}
Line 751 ⟶ 745:
| {{dunno}}
| {{yes}}
| {{dunno}}
| {{no}}
| {{no}}
| {{no}}
Line 760 ⟶ 755:
| {{dunno}}
| {{yes}}
| {{dunno}}
| {{no}}
| {{no}}
| {{no}}
Line 769 ⟶ 765:
| {{dunno}}
| {{no}}
| {{dunno}}
| {{no}}
| {{yes}}
| {{no}}
Line 778 ⟶ 775:
| {{dunno}}
| {{yes}}
| {{dunno}}
| {{no}}
| {{no}}
| {{no}}
Line 787 ⟶ 785:
| {{yes}}<ref name="boxcryptor">{{cite web|url=https://www.boxcryptor.com/|title=Boxcryptor - Encryption for cloud storage - Window, Mac, Android, iOS}}</ref>
| {{yes}}<ref name="save">{{cite web|url=http://www.getsafe.org/|title=Safe - Protect Your Files|access-date=2016-03-29|archive-url=https://web.archive.org/web/20160421064348/http://www.getsafe.org/|archive-date=2016-04-21|url-status=dead}}</ref>
| {{dunno}}
| {{yes}}<ref name="save" />
| {{yes}} (FUSE)
| {{yes}} ([[Filesystem in Userspace|FUSE]])
Line 796 ⟶ 795:
| {{dunno}}
| {{Yes}}
| {{dunno}}
| {{Yes}}
| {{yes}}
| {{no}}
Line 805:
| {{dunno}}
| {{Yes}}
| {{dunno}}
| {{Yes}}
| {{no}}
| {{no}}
Line 814 ⟶ 815:
| {{dunno}}
| {{no}}
| {{dunno}}
| {{yes}}
| {{no}}
| {{no}}
Line 823 ⟶ 825:
| {{dunno}}
| {{no}}
| {{dunno}}
| {{yes}}
| {{partial}}<ref>https://code.google.com/p/libfvde/ libfvde supports reading FileVault2 Drive Encryption (FVDE) encrypted volumes</ref>
| {{no}}
Line 832 ⟶ 835:
| {{dunno}}
| {{yes}}
| {{dunno}}
| {{no}}
| {{no}}
| {{no}}
Line 841 ⟶ 845:
| {{no}}
| {{yes}}
| {{dunno}}
| {{no}}
| {{partial}}<ref>http://www.freeotfe.org/docs/Main/Linux_volumes.htm Supports Linux volumes</ref>
| {{no}}
Line 850 ⟶ 855:
| {{dunno}}
| {{no}}
| {{dunno}}
| {{no}}
| {{no}}
| {{yes}}
Line 859 ⟶ 865:
| {{dunno}}
| {{no}}
| {{dunno}}
| {{no}}
| {{no}}
| {{yes}}
Line 868 ⟶ 875:
| {{dunno}}
| {{no}}
| {{dunno}}
| {{yes}}
| {{no}}
| {{no}}
Line 877 ⟶ 885:
| {{yes}}<ref>https://play.google.com/store/apps/details?id=com.nemesis2.luksmanager&hl=en_GB Third party app allows a user to open LibreCrypt compatible LUKS containers</ref>
| {{yes}}
| {{dunno}}
| {{no}}
| {{partial}}<ref>https://github.com/t-d-k/LibreCrypt/blob/master/docs/Linux_volumes.md Supports Linux volumes</ref>
| {{no}}
Line 886 ⟶ 895:
| {{dunno}}
| {{no}}
| {{dunno}}
| {{no}}
| {{yes}}
| {{no}}
Line 895 ⟶ 905:
| {{dunno}}
| {{yes}}
| {{dunno}}
| {{yes}}
| {{no}}
| {{no}}
Line 904 ⟶ 915:
| {{dunno}}
| {{yes}}
| {{dunno}}| {{no}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
|-
!{{Rh}}|[https://netlibsecurity.com/ NetLib Encryptionizer (directory encryption)]
| {{no}}
| {{yes}}
| {{no}}| {{no}}
| {{no}}
| {{no}}
Line 922 ⟶ 925:
| {{dunno}}
| {{yes}}
| {{dunno}}
| {{yes}}
| {{no}}
| {{no}}
Line 931 ⟶ 935:
| {{dunno}}
| {{yes}}
| {{dunno}}
| {{yes}}
| {{yes}}
| {{no}}
Line 940 ⟶ 945:
| {{dunno}}
| {{yes}}
| {{dunno}}
| {{no}}
| {{no}}
| {{no}}
Line 949 ⟶ 955:
| {{no}}
| {{yes}}
| {{dunno}}
| {{no}}
| {{no}}
| {{no}}
Line 958 ⟶ 965:
| {{dunno}}
| {{yes}}
| {{dunno}}
| {{no}}
| {{no}}
| {{no}}
Line 967 ⟶ 975:
| {{dunno}}
| {{yes}}
| {{dunno}}
| {{no}}
| {{no}}
| {{no}}
Line 976 ⟶ 985:
| {{dunno}}
| {{yes}}
| {{dunno}}
| {{yes}}
| {{no}}
| {{no}}
Line 985 ⟶ 995:
| {{dunno}}
| {{yes}}
| {{dunno}}
| {{no}}
| {{no}}
| {{no}}
Line 994 ⟶ 1,005:
| {{dunno}}
| {{yes}}
| {{dunno}}
| {{no}}
| {{no}}
| {{no}}
Line 1,003 ⟶ 1,015:
| {{dunno}}
| {{yes}}
| {{dunno}}
| {{no}}
| {{yes}}
| {{no}}
Line 1,012 ⟶ 1,025:
| {{dunno}}
| {{no}}
| {{dunno}}
| {{no}}
| {{yes}}
| {{no}}
Line 1,021 ⟶ 1,035:
| {{dunno}}
| {{no}}
| {{dunno}}
| {{no}}
| {{no}}
| {{no}}
Line 1,030 ⟶ 1,045:
| {{dunno}}
| {{yes}}
| {{dunno}}
| {{yes}}
| {{yes}}
| {{no}}
Line 1,039 ⟶ 1,055:
| {{dunno}}
| {{yes}}
| {{dunno}}
| {{no}}
| {{no}}
| {{no}}
Line 1,048 ⟶ 1,065:
| {{no}}
| {{yes}}
| {{no}}
| {{no}}
| {{no}}
| {{no}}
Line 1,057 ⟶ 1,075:
| {{dunno}}
| {{no}}
| {{dunno}}
| {{no}}
| {{no}}
| {{no}}
Line 1,066 ⟶ 1,085:
| {{dunno}}
| {{yes}}
| {{dunno}}
| {{no}}
| {{no}}
| {{no}}
Line 1,075 ⟶ 1,095:
| {{dunno}}
| {{no}}
| {{dunno}}
| {{no}}
| {{no}}
| {{no}}
Line 1,084 ⟶ 1,105:
| {{dunno}}
| {{yes}}
| {{dunno}}
| {{yes}}
| {{no}}<ref>{{cite web|url=httphttps://www.symantecbroadcom.com/endpoint-encryption/system-requirementsproducts/cybersecurity|title=Endpoint Encryption Powered by PGP Technology - Symantec}}</ref>
| {{no}}
| {{no}}
Line 1,093 ⟶ 1,115:
| {{no}}
| {{no}}
| {{dunno}}
| {{no}}
| {{yes}}
| {{no}}
Line 1,102 ⟶ 1,125:
| {{no}}
| {{yes}}
| {{dunno}}
| {{yes}}
| {{no}}
| {{no}}
Line 1,111 ⟶ 1,135:
| {{yes}}<ref name="play.google.com"/>
| {{yes}}
| {{yes}}
| {{yes}}
| {{yes}}
| {{no}}<ref>http://www.truecrypt.org/misc/freebsd Although TrueCrypt can be built under FreeBSD, it is not recommended to run it because of bugs and instabilities when TrueCrypt is attempted to be used</ref>
Line 1,120 ⟶ 1,145:
| {{no}}
| {{yes}}
| {{dunno}}
| {{no}}
| {{no}}
| {{no}}
Line 1,129 ⟶ 1,155:
| {{yes}}<ref>https://play.google.com/store/apps/details?id=com.sovworks.eds.android Third party app allows to encrypt and decrypt VeraCrypt containers (only available in the paid version)</ref>
| {{yes}}
| {{yes}}<ref>https://apps.apple.com/de/app/disk-decipher/id516538625 Third party app allows to encrypt and decrypt VeraCrypt containers (only available in the paid version)</ref>
| {{yes}}
| {{yes}}
| {{yes}}
Line 1,138 ⟶ 1,165:
| {{yes}}
| {{yes}}
| {{dunno}}
| {{no}}
| {{no}}
| {{no}}
Line 1,161 ⟶ 1,189:
* '''Custom authentication''': Whether custom authentication mechanisms can be implemented with third-party applications.{{clarify|e.g. perhaps link to WP's article re: 1-time password (OTP) tokens? See Talk Page: someone else also was confused about exactly what this includes; pls give some examples & links.|date=January 2011}}
* '''Multiple keys''': Whether an encrypted volume can have more than one active [[Key (cryptography)|key]].
* '''Passphrase strengthening''': Whether [[key strengthening]] is used with plain text passwords to frustrate [[dictionary attack]]s, usually using [[PBKDF2]] or [[Argon2]].
* '''Hardware acceleration''': Whether dedicated [[cryptographic accelerator]] expansion cards can be taken advantage of.
* '''[[Trusted Platform Module]]''': Whether the implementation can use a TPM [[cryptoprocessor]].
Line 1,193 ⟶ 1,221:
|-
! ArchiCrypt Live
| {{yes}}<ref name="ArchiCrypt">Secret-containers and Camouflage files [http://www.archicrypt-shop.com/ArchiCrypt-Live.htm ArchiCrypt Live Description] {{Webarchive|url=https://web.archive.org/web/20110824163518/http://www.archicrypt-shop.com/ArchiCrypt-Live.htm |date=2011-08-24 }}</ref>
| {{no}}
| {{n/a}}
Line 1,216 ⟶ 1,244:
| {{yes}}<ref>Supported by the BestCrypt Volume Encryption software</ref>
|-
! [[BitArmor]] DataControl
| {{no}}
| {{yes}}
Line 1,312 ⟶ 1,340:
| {{no}}
|-
! [[CrossCrypt]]
| {{no}}
| {{no}}
Line 1,372 ⟶ 1,400:
| {{dunno}}
|-
! [[Cryptomator]]
| {{no}}
| {{no}}
Line 1,441 ⟶ 1,469:
| {{yes}}
| {{yes}}
| {{yes |NTFS, FAT32}}
| {{yes}}
|-
Line 1,453 ⟶ 1,481:
| {{yes}}
| {{partial|Partial}}<ref name=dm-crypt_tpm>{{cite web |title=cryptsetup Frequently Asked Questions |url=https://gitlab.com/cryptsetup/cryptsetup/wikis/FrequentlyAskedQuestions |access-date=2016-01-07 }}</ref> {{r|group=Note|dm-cryptTPM}}
| {{yes|Any supported by OS}}
| {{yes}}
|-
! [https://www.securstar.com/en/drivecrypt.html DriveCrypt]
| {{yes}}<ref name=drivecrypt>{{cite web |title=DriveCrypt features |publisher=SecurStar GmbH |url=http://www.securstar.com/products_drivecrypt.php |access-date=2007-01-03 |archive-url=https://web.archive.org/web/20070101114008/http://www.securstar.com/products_drivecrypt.php |archive-date=2007-01-01 |url-status=dead }}</ref>
| {{yes}}
| {{yes}}
| {{yes}}
| {{yes}}
| {{yes}}
| {{yes}}
| {{no}}
| {{yes|Any supported by OS}}
| {{yes}}
Line 1,493 ⟶ 1,509:
|-
! e-Capsule Private Safe
| {{yes}}<ref name=ps-mla>{{cite web |title=Multi level access with separate access credentials, each enabling a different set of functional or logical operations |publisher=EISST Ltd. |url=http://www.eisst.com/products/private_safe/compare/ |access-date=2007-07-25 |archive-date=2007-09-28 |archive-url=https://web.archive.org/web/20070928145451/http://www.eisst.com/products/private_safe/compare/ |url-status=dead }}</ref>
| {{no}}
| {{n/a}}
Line 1,614 ⟶ 1,630:
! Loop-AES
| {{no}}
| {{yes}}<ref name=loop-aes>{{cite web |author=Jari Ruusu |title=loop-AES README file |url=httphttps://loop-aes.sourceforge.net/loop-AES.README |access-date=2007-04-23 |archive-date=2023-08-23 |archive-url=https://web.archive.org/web/20230823163835/https://loop-aes.sourceforge.net/loop-AES.README |url-status=dead }}</ref>
| {{dunno}}
| {{yes}}<ref name=loop-aes/>
Line 1,650 ⟶ 1,666:
! [[PGPDisk]]
| {{no}}
| {{yes}}<ref name=pgp-faq>{{cite web |title=PGP Whole Disk Encryption FAQ |publisher=PGP Corporation |url=http://www.pgp.com/products/wholediskencryption/faq.html |access-date=2006-12-24 |archive-date=2006-12-24 |archive-url=https://web.archive.org/web/20061224231228/http://www.pgp.com/products/wholediskencryption/faq.html |url-status=dead }}</ref>
| {{yes}}
| {{dunno}}
Line 1,911 ⟶ 1,927:
! Filesystems
! Two-factor authentication
|-
!ZzEnc
!No
!Yes
!Yes
!Yes
!Yes
!Yes
!No
!No
!Windows, Legacy BIOS & UEFI
!In UEFI with removable keys store on USB-flash
|}
{{Reflist|group=Note|refs=
Line 1,916 ⟶ 1,944:
<ref name=BitLockerFS>Windows 7 introduces Bitlocker-To-Go which supports NTFS, FAT32 or exFAT, however for hard drive encryption, [[Windows Vista]] and later are limited to be installable only on NTFS volumes</ref>
<ref name=dm-cryptTPM>An external tool can be used to read the key from the TPM and then have the key passed on to dm-crypt/LUKS via the [[standard input]]</ref>
<ref name=TrueCryptMystery>The current situation around TrueCrypt project is controversial. On 28.05.2014 after many years of development and broad usage the open-source (although anonymous) project was suddenly stopped, and all previous official materials and complete (encrypt/decrypt) binaries were withdrawn from its website citing some "unfixed security issues" and Windows XP end of support. The technical information herein is valid only for previous versions of TrueCrypt (v7.1a and some earlier). The latest available version (v7.2) is decrypt only, its authenticity and actual reasons behind the move are unclear, and its usage is not recommended. httphttps://www.zdnet.com/article/truecrypt-quits-inexplicable-7000029994/</ref>
]}}
 
Line 1,960 ⟶ 1,988:
| {{dunno}}
|-
! [[BitArmor]] DataControl
| {{no}}
| {{yes}}
Line 2,016 ⟶ 2,044:
| {{dunno}}
|-
! [[CrossCrypt]]
| {{no}}
| {{no}}
Line 2,110 ⟶ 2,138:
| {{yes}}
| {{yes}}<ref>yes, but the user needs custom scripts: http://www.linuxquestions.org/questions/slackware-14/luks-encryption-swap-and-hibernate-627958/</ref>
| {{dunno}}
|-
! [https://www.securstar.com/en/drivecrypt.html DriveCrypt]
| {{yes}}
| {{yes}}<ref name=drivecrypt/>
| {{yes}}<ref name=drivecrypt/>
| {{yes}}
| {{yes}}
| {{dunno}}
|-
Line 2,325 ⟶ 2,345:
| {{n/a}}
| {{no}}
| {{dunno}}
|-
! [https://www.winmagic.com/encryption-solutions/enterprise-encryption SecureDoc]
| {{yes}}<ref name=sdoc-faq />
| {{yes}}
| {{yes}}
| {{yes}}
| {{yes}}
| {{dunno}}
|-
Line 2,469 ⟶ 2,481:
| {{dunno}}
|-
! [[BitArmor]] DataControl
| {{no}}
| {{yes}}
Line 2,525 ⟶ 2,537:
| {{dunno}}
|-
! [[CrossCrypt]]
| {{yes}}
| {{no}}
Line 2,562 ⟶ 2,574:
| {{no}}
| {{no}}
| {{yes}}<ref>{{cite web |title=CIBLE DE SECURITE CRITERES COMMUNS NIVEAU EAL3+ |url=https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-Cible-2022_35fr.pdf }}</ref>
| {{no}}
| {{dunno}}
|-
Line 2,592 ⟶ 2,604:
| date = 2018-01-01 | access-date = 2018-05-08
}}</ref>}}
|-
! [https://www.securstar.com/en/drivecrypt.html DriveCrypt]
| {{dunno}}
| {{dunno}}
| {{dunno}}
| {{dunno}}
| {{dunno}}
| {{dunno}}
|-
! [[DriveSentry]] GoAnywhere 2
Line 2,918 ⟶ 2,922:
 
[[Category:Disk encryption|*]]
[[Category:SoftwareSecurity software comparisons|Disk encryption software]]
[[Category:Cryptographic software|*]]
[[Category:Cryptography lists and comparisons|Disk encryption software]]