Difference between revisions of "Fcrypt"
Line 21: | Line 21: | ||
'''[https://www.gnu.org/help/help.html Helping the GNU Project and the Free Software Movement]''' | '''[https://www.gnu.org/help/help.html Helping the GNU Project and the Free Software Movement]''' | ||
---- | ---- | ||
+ | ---- | ||
+ | |||
+ | If you have corrections to this entry or questions about it, please contact: mailto:maintainers@gnu.org | ||
---- | ---- | ||
|Decommissioned or Obsolete=Yes | |Decommissioned or Obsolete=Yes | ||
− | |Decommissioned details=If you have time and interest in resurrecting this GNU package, please contact: mailto:maintainers@gnu.org | + | |Decommissioned details=If you have time and interest in resurrecting this GNU package, please contact: mailto:maintainers@gnu.org |
|Donate=https://my.fsf.org/donate/ | |Donate=https://my.fsf.org/donate/ | ||
|Keywords=disk encryption, crypt, crypto, encryption, plausible deniability | |Keywords=disk encryption, crypt, crypto, encryption, plausible deniability | ||
Line 29: | Line 32: | ||
|Version status=stable | |Version status=stable | ||
|Last review by=Bendikker | |Last review by=Bendikker | ||
− | |Last review date= | + | |Last review date=2019/01/01 |
|Submitted by=Donaldr3 | |Submitted by=Donaldr3 | ||
|Submitted date=2013/01/18 | |Submitted date=2013/01/18 | ||
Line 67: | Line 70: | ||
|Resource kind=Mailing List | |Resource kind=Mailing List | ||
|Resource URL=https://lists.gnu.org/mailman/listinfo/gnu-system-discuss/ | |Resource URL=https://lists.gnu.org/mailman/listinfo/gnu-system-discuss/ | ||
+ | }} | ||
+ | {{Resource | ||
+ | |Resource kind=General | ||
+ | |Resource URL=https://savannah.gnu.org/people/ | ||
}} | }} | ||
{{Software category | {{Software category |
Latest revision as of 16:01, 1 January 2019
fcrypt
https://www.gnu.org/software/fcrypt/
Encrypt partitions and access them transparent.
GNU fcrypt is a utility that allows you to have encrypted partitions and accesses them in a transparent way. You can have many secret partitions and, if forced, you can gradually reveal them to the attacker. The attacker should not be able to know if you have any secret partition. If the data is very secret, you can use random passwords. Good if your computer is connected 24 hours, because you can instantly "delete" lots of data. Because the computer is connected 24 hours your data will not be lost despite the random password and are lost when the computer is turned off.
Licensing
License
Verified by
Verified on
Notes
Leaders and contributors
Contact(s) | Role |
---|---|
Fabio J. Gonzalez | developer |
Resources and communication
Audience | Resource type | URI |
---|---|---|
General | https://savannah.gnu.org/people/ | |
Mailing List | https://lists.gnu.org/mailman/listinfo/gnu-system-discuss/ | |
Savannah (Ref) | https://savannah.gnu.org/projects/fcrypt/ | |
VCS Repository Webview | https://web.cvs.savannah.gnu.org/viewvc/fcrypt/fcrypt/?hideattic=0 | |
VCS Repository Webview | https://git.savannah.gnu.org/git/web/fcrypt.git/ | |
VCS Repository Webview | https://git.savannah.gnu.org/git/fcrypt.git/ |
Software prerequisites
Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.3 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the page “GNU Free Documentation License”.
The copyright and license notices on this page only apply to the text on this page. Any software or copyright-licenses or other similar notices described in this text has its own copyright notice and license, which can usually be found in the distribution or license text itself.