This archive contains TrueCrypt 2.0 setup and documentation. Copyright (c) 2004 TrueCrypt Foundation (not associated with TrueCrypt Team, the authors of TrueCrypt 1.0) WHAT IS NEW IN TRUECRYPT 2.0 Bug fixes: - Data corruption will no longer occur when a TrueCrypt partition is subjected to heavy parallel usage (usually when copying files to or from a TrueCrypt partition). This also fixes the problem with temporarily inaccessible files stored in TrueCrypt partitions. Note: File-hosted volumes were not affected by this bug. - After dismounting and remounting a volume, its file system will be correctly recognized by the operating system and it will be possible to reuse the same drive letter (Windows 2000 issue). - The main program window will not be displayed when run in quiet mode (command line usage). - Two password entry attempts are no longer necessary to be able to mount a volume (command line usage). - All partitions will be visible to TrueCrypt even if one of them is inaccessible to the operating system (an inaccessible partition made all successive partitions on the hard disk unavailable to TrueCrypt). - Relative path can be specified when mounting a file-hosted volume (command line usage). - Incorrect passwords are reported when auto-mounting (command line usage). New features: - AES-256 (Rijndael) encryption algorithm. - The command line option /dismountall was renamed to /dismount which can now be also used to dismount a single volume by specifying its drive letter. Improvements: - Memory pages containing sensitive data are now locked to prevent them from being swapped to the Windows page file. - The state of the random pool will never be exported directly so the pool contents will not be leaked. Miscellaneous: - Released under GNU General Public License (GPL) FUTURE - 'Hidden' container - Linux version - Anti-Key-Logger Facilities - HMAC-RIPEMD-160 - Keyfiles and more. INSTALLATION Before installing TrueCrypt, you may want to read the TrueCrypt User's Guide. It is located in the folder called "Setup Files". To view or print it, you will need Adobe Acrobat Reader (freely available at www.adobe.com). Note that the program documentation will also be automatically installed into the program folder, and will later be accessible via the Start menu and the program user interface. To install TrueCrypt, run "TrueCrypt Setup.exe". REQUIREMENTS - Free disk space: approximately 1.5 MB - One of the following operating systems: Windows XP, Windows 2000, Windows 2003 - Administrator privileges DISCLAIMER Before installing this product (TrueCrypt), you must agree to the following terms and conditions: - YOU UNDERSTAND THAT THIS PRODUCT UTILIZES STRONG CRYPTOGRAPHY, AND THAT SHOULD THIS TECHNOLOGY BE REGULATED OR ILLEGAL IN YOUR COUNTRY, THE AUTHORS OF THE PRODUCT WILL NOT BE RESPONSIBLE FOR ANY CONSEQUENCES THAT YOUR IMPORTING AND/OR USING IT IN SUCH A COUNTRY MIGHT HAVE. - YOU UNDERSTAND THAT THE AUTHORS OF THE PRODUCT CANNOT BE HELD RESPONSIBLE FOR LOSS OF YOUR DATA OR ANY OTHER DAMAGE, DIRECT OR INDIRECT, CAUSED BY USING OR INSTALLING THE PRODUCT. - YOU UNDERSTAND THAT THIS PRODUCT CONTAINS NO "BACKDOOR", THAT WOULD ALLOW PARTIAL OR COMPLETE RECOVERY OF YOUR DATA WITHOUT KNOWING THE CORRECT PASSWORD. - YOU UNDERSTAND THAT THE AUTHORS OF THE PROGRAM CANNOT HELP YOU TO RECOVER YOUR DATA SHOULD YOU FORGET YOUR PASSWORD. You must also agree to the license displayed in the TrueCrypt Setup window.