TrueCrypt 2.0 has been released. It can be downloaded at:
- Data corruption will no longer occur when a TrueCrypt partition is
subjected to heavy parallel usage (usually when copying files to or
from a TrueCrypt partition). This also fixes the problem with
temporarily inaccessible files stored in TrueCrypt partitions.
Note: File-hosted volumes were not affected by this bug.
- After dismounting and remounting a volume, its file system will be
correctly recognized by the operating system and it will be
possible to reuse the same drive letter (Windows 2000 issue).
- The main program window will not be displayed when run in quiet
mode (command line usage).
- Two password entry attempts are no longer necessary to be able to
mount a volume (command line usage).
- All partitions will be visible to TrueCrypt even if one of them is
inaccessible to the operating system (an inaccessible partition
made all successive partitions on the hard disk unavailable to
- Relative path can be specified when mounting a file-hosted volume
(command line usage).
- Incorrect passwords are reported when auto-mounting (command line
- AES-256 (Rijndael) encryption algorithm.
- The command line option /dismountall was renamed to /dismount which
can now be also used to dismount a single volume by specifying its
- Memory pages containing sensitive data are now locked to prevent
them from being swapped to the Windows page file.
- The state of the random pool will never be exported directly so the
pool contents will not be leaked.
- Released under GNU General Public License (GPL)
Planned for Future:
- 'Hidden' container
- Linux version
- Anti-Key-Logger Facilities
- and more.