History of encryption. Rivalry between encryption and special agencies.
Encrypted file-hosted volumes
A brief history of TrueCrypt. Unprovability of encrypted file-hosted volumes.
Your TrueCrypt is spying on you
Installing and setting up basic security in TrueCrypt
How to install and set up basic security in VeraCrypt
VeraCrypt. VeraCrypt vs TrueCrypt.
Creating and using a secure encrypted file-hosted volume with TrueCrypt / VeraCrypt
Encryption of external data storage devices with TrueCrypt and VeraCrypt
Secrets of working safely with encrypted file-hosted volumes TrueCrypt and VeraCrypt
AES Crypt. A straightforward, cross-platform solution for file encryption.
Encrypting files with AES Crypt on Windows and macOS
Emergency destruction of encrypted file-hosted volumes
The methods of breaking encrypted file-hosted volumes and how to protect yourself from them