- 30 May 2014
As stated on the TrueCrypt website, "Using TrueCrypt is not secure as it may contain unfixed security issues"¹.
Since 1995, BestCrypt by Jetico has delivered reliable security with performance and flexibility for anyone to protect sensitive data – from IT experts at large organizations to people at home concerned about personal privacy.
Last year, Jetico made our security-related source codes available to the public for performing their own analysis and to allow third-party developers to create their own security-related modules for BestCrypt. Since we have received many enquiries on the topic, we formally state that Jetico has never included any 'backdoors' or related weakness to the software.
To learn more about how to migrate from TrueCrypt to BestCrypt, please Contact Us.
Information and Download: http://www.jetico.com/support/bestcrypt-development-kit
> About BestCrypt
Use BestCrypt Container Encryption to store selected files and folders on an active computer, shared workstation or network storage. BestCrypt Container Encryption for Enterprise Data Protection BestCrypt Container Encryption for Personal Privacy
Use BestCrypt Volume Encryption to protect all data on entire hard drives in case of lost computers or stolen laptops (supports Windows 8 and UEFI). BestCrypt Volume Encryption for Enterprise Data Protection BestCrypt Volume Encryption for Personal Privacy
Read PCWorld review of BestCrypt (rated 4.5/5): BestCrypt lives up to its name with excellent features
¹ TrueCrypt [Online], Available: http://truecrypt.sourceforge.net/ [30 May 2014].