I did everything and got an error message in the end after format so no encrypted file was made. Don't know why but I will try again ltr. Now I need to keep reading Linux Basics for Hackers. 👍 OTW, you rock!
Nice video. Is truecryp still usable or is true it no longer safe to use. The only way i know it was cracked was by cryogenic the ram in a running system and get the hash from it... so kind of almost impossible.
BitLocker and VeraCrypt both offer strong encryption, but they cater to different needs. BitLocker, integrated into Windows, is user-friendly and ideal for less technical users or enterprises, providing seamless full disk encryption. VeraCrypt, being open-source, offers more customization like hidden volumes and supports multiple operating systems, making it preferable for those requiring higher security or cross-platform compatibility. BitLocker performs better due to hardware support, while VeraCrypt’s flexibility comes with slightly lower performance.
Hi guys, great video thanks, Just curious, if this veracrypt file gets damaged, is the whole lot lost, can you recover the file, or should we make a couple back ups of this? I use a program to backup my files called syncback pro, can this directly backup to the encrypted file? sorry for the dumb questions, but I'd like to know. I watch most of your videos and hit the like button :)
@GhOs7-Operator thanks for your reply, I use a spare harddrive on the pc, and I copy there what I want backed up. Then I use syncback pro to copy off to 3 separate external drives, I have a docking station, which I just swap over 1 at a time. SBP is set to copy or delete what I have kept on the main spare drive. If I encrypt that drive, and just one sector gets damaged, it sounds like I would lose the lot. If I was going to encrypt, I think I would do folders only. So, if one folder crashes, hopefully, all the other folders will be safe. I haven't tried encryption yet. Is there an encryption test to see if everything inside it ok?
There are ways ofc but its too broad to answer it here. having said that, if someone wants to hack you and is a professional, you cant really prevent it.
AES-256 remains a highly secure encryption standard with no current successor. However, to address future threats like quantum computing, the U.S. National Institute of Standards and Technology (NIST) is developing post-quantum cryptographic (PQC) algorithms. These new algorithms aren't direct successors but are designed to complement existing encryption methods by providing enhanced security against emerging threats.
The quality and video montage , with the background music is amazing ❤ i like the new way of your videos
Thx man
😮 Amazing The best Chanel in the World!
Thank you for hosting Master OTW
OTW Is The Best!! Awesome video
Indeed, thank you for watching
Great content! It's amazing how much goodness can be packed into 30 minutes
Thx a lot. Very happy you liked it
תמשיך להעלות עוד סרטונים כאלה אני נהנה לצפות בהם וללמוד מהם!
Thx a lot , appreciate it
Funny but unfortunately to real joke when u were naming the folder. Always love the content you guys share!
Thx man
nice video but i am long enough to remember how truecrypt started and ended :D
yeah what is this fake mainstream show here ?
great video!!!
Thank so much
Please create video with otw on bitcoin tracing please please🙏🙏🙏🙏🙏🙏🙏🙏
I’m planning this yes
OTW is such an amazing guest
The best of the bests
OTW is Master❤
Indeed
I did everything and got an error message in the end after format so no encrypted file was made. Don't know why but I will try again ltr. Now I need to keep reading Linux Basics for Hackers. 👍 OTW, you rock!
Thx a lot. Try to use FAT instead and let me know just if pass
amazing channel love it
Thx a lot for watching
Nice video.
Is truecryp still usable or is true it no longer safe to use.
The only way i know it was cracked was by cryogenic the ram in a running system and get the hash from it... so kind of almost impossible.
I use bitlocker in windows to encrypt my volume, do you recommend to use veracrypt instead of bitlocker, or bitlocker is fine too to use also ?
BitLocker and VeraCrypt both offer strong encryption, but they cater to different needs. BitLocker, integrated into Windows, is user-friendly and ideal for less technical users or enterprises, providing seamless full disk encryption. VeraCrypt, being open-source, offers more customization like hidden volumes and supports multiple operating systems, making it preferable for those requiring higher security or cross-platform compatibility. BitLocker performs better due to hardware support, while VeraCrypt’s flexibility comes with slightly lower performance.
@@yanivhoffman Thank you very much for the detailed answer
Yaniv my own personal guy ❤! Assalamualakum
Thank you 🙏
Hi guys, great video thanks, Just curious, if this veracrypt file gets damaged, is the whole lot lost, can you recover the file, or should we make a couple back ups of this?
I use a program to backup my files called syncback pro, can this directly backup to the encrypted file? sorry for the dumb questions, but I'd like to know. I watch most of your videos and hit the like button :)
@GhOs7-Operator thanks for your reply, I use a spare harddrive on the pc, and I copy there what I want backed up. Then I use syncback pro to copy off to 3 separate external drives, I have a docking station, which I just swap over 1 at a time. SBP is set to copy or delete what I have kept on the main spare drive. If I encrypt that drive, and just one sector gets damaged, it sounds like I would lose the lot. If I was going to encrypt, I think I would do folders only. So, if one folder crashes, hopefully, all the other folders will be safe. I haven't tried encryption yet. Is there an encryption test to see if everything inside it ok?
is there a waycto proctect i phone from hack or dies it exist a phone that is very safe against hackers and still are compatible with most of the app?
There are ways ofc but its too broad to answer it here. having said that, if someone wants to hack you and is a professional, you cant really prevent it.
@@yanivhoffman thank you and which os i safest in phones?
Thank you!
Thank you for watching
Woow!!! 😮
Thank you for watching
What's next after AES-256?
AES-256 remains a highly secure encryption standard with no current successor. However, to address future threats like quantum computing, the U.S. National Institute of Standards and Technology (NIST) is developing post-quantum cryptographic (PQC) algorithms. These new algorithms aren't direct successors but are designed to complement existing encryption methods by providing enhanced security against emerging threats.
Does it still work and bypass protection?
COOL!😃👍
Thank you for watching
Background music is so distracting
sorry it bothered you. we checked it few times and sound good for us, but appreciate your feedback. we will be more sensitive next time
hehehe just dodged a bullet there ay
🎉
Thank you for watching
wow
Thank you for watching