shanky887614
Distinguished
better use ccleaners gutman before i take a trip to america then
anyway why you talking about truecrypt as being broken?
i use Serpent-Twofish-AES
http
/www.truecrypt.org/docs/
if they can break through this quickly ill be suprised considering i use a 22 password with a mix of characters and numbers
(from truecrypts website)
Three ciphers in a cascade [15, 16] operating in XTS mode (see the section Modes of Operation). Each 128-bit block is first encrypted with AES (256-bit key) in XTS mode, then with Twofish (256-bit key) in XTS mode, and finally with Serpent (256-bit key) in XTS mode. Each of the cascaded ciphers uses its own key. All encryption keys are mutually independent (note that header keys are independent too, even though they are derived from a single password – see the section Header Key Derivation, Salt, and Iteration Count). See above for information on the individual cascaded ciphers.
anyway why you talking about truecrypt as being broken?
i use Serpent-Twofish-AES
http

if they can break through this quickly ill be suprised considering i use a 22 password with a mix of characters and numbers
(from truecrypts website)
Three ciphers in a cascade [15, 16] operating in XTS mode (see the section Modes of Operation). Each 128-bit block is first encrypted with AES (256-bit key) in XTS mode, then with Twofish (256-bit key) in XTS mode, and finally with Serpent (256-bit key) in XTS mode. Each of the cascaded ciphers uses its own key. All encryption keys are mutually independent (note that header keys are independent too, even though they are derived from a single password – see the section Header Key Derivation, Salt, and Iteration Count). See above for information on the individual cascaded ciphers.