TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

TrueCrypt 7.0 released, now with hardware-accelerated AES support

61 点作者 keyist将近 15 年前

2 条评论

marchdown将近 15 年前
There are several significant problems with TrueCrypt. Somehow, they fall into different domains, so for most users only one of them really matters.<p>For FOSS-champions thing is that TrueCrypt developers are sneaky and don't accept contributions, so that in practice there is little outside control, and "given enough eyeballs are bugs are shallow" doesn't quite work.<p>For technical users, admins and frugal geeks TrueCrypt hides several unpleasant surprises, such as the encryption being undoable without a huge spare disk.<p>For casual users interface is cumbersome and counter-intuitive at times. It's almost as if developers have never considered usage scenarios. You have to type your passwords more often than strictly necessary, and sometimes you have to remember to do it, with risk of losing your data.
评论 #1533674 未加载
评论 #1533633 未加载
评论 #1533582 未加载
评论 #1533620 未加载
Groxx将近 15 年前
&#62;<i>By default, TrueCrypt uses hardware-accelerated AES on computers that have a processor where the Intel AES-NI instructions are available.</i> [sans key-generating instructions]<p>Example supported processors include (select) ones from the i5/i7 desktop and mobile Intel processors, but anything which has that instruction set <i>should</i> work, apparently.<p>(from: "hardware acceleration" chapter, link near the top of the article)