Review of Veracrypt, the Truecrypt alternative and successor

Veracrypt enteres market within months after Truecrypt died. Veracrypt, a Truecrypt alternative, is also an open source project and file encryption software, is built upon the code of Truecrypt, but with enhancements to further secure your data. You can use it to encrypt single files, folders or entire drives at a time. This Veracrypt review, does not discuss its usage, as usage of Veracrypt is not much different than Truecrypt. It is more about advantages of Veracrypt over Truecrypt.

Veracrypt review

Veracrypt Encryption Software Review

Encrypting and Using Veracrypt

The methods are same as the Truecrypt: you can create individual file containers and mount them as drives so that you can keep your files encrypted. A container is actually a place that when mounted as a drive using the main screen of Veracrypt, offers encryption to the contents of the virtual drive. Suppose you create a file container using the application’s wizard to create container and then use the main page of the app to mount it as a drive, you can copy or move files to that drive. As soon as you copy or move your files to that drive, they are encrypted.

You can also use Veracrypt for flash drives. You can encrypt entire flash drives or create a container on Flash drives. In the latter case, where you create container, you have to mount it as a separate volume every time you connect the flash drive to your computer.

Encryption and Decryption in Veracrypt

You can use files from containers directly when you use Veracrypt. When the file is accessed by other apps, parts of the files are decrypted using the key you create while encrypting the drive or while creating the container. These files are not decrypted in whole at a time as it would appear. Rather, as said by Veracrypt on their website, only the portion of file you are working on, is decrypted and placed in RAM for use by processor and user. When you move to another portion of the file, that particular portion is decrypted and later encrypted again after writing changes to the disk.

Encryption is many times stronger than the Truecrypt and the makers of Veracrypt say that though built upon Truecrypt code, it has eliminated the negatives of Truecrypt to make a very powerful encrypting tool. Here is an excerpt from their homepage:

“As an example, when the system partition is encrypted, TrueCrypt uses PBKDF2-RIPEMD160 with 1000 iterations whereas in VeraCrypt we use 327661. And for standard containers and other partitions, TrueCrypt uses at most 2000 iterations but VeraCrypt uses 655331 for RIPEMD160 and 500000 iterations for SHA-2 and Whirlpool.

This enhanced security adds some delay only to the opening of encrypted partitions without any performance impact to the application use phase. This is acceptable to the legitimate owner but it makes it much harder for an attacker to gain access to the encrypted data.”

Interface of Veracrypt

It would be hard for a first time user to make out how to use the tool. The interface is neat but is not self-explanatory. One needs to read the online documentation if not already familiar with the technical terms used by the Veracrypt encryption tool in its interface. Especially, while creating a container, I got confused if hitting “Format” would create a container or format my drive. I had to consult the online documentation before proceeding. The Documentation is good with plenty of screenshots and things are explained in an easy to understand method.


Veracrypt is easy to use for people with good knowledge of encryption tools. Otherwise, people have to refer to the documentation for help, which is ample and then, it is easy to use. The security provided by Veracrypt is good and many times higher than that of Truecrypt. It also lets you mount TrueCrypt volumes.

The tool is highly recommended over Truecrypt as the latter has its own weaknesses. I made a switch from Truecrypt to Veracrypt for two reasons: 1) The security is better and 2) the whole thing is free to use and can be verified as it is open source. Though I am not into coding, I can say it is safe as there have been no visible complaints by other coders as of the date of writing this article.

Download it from the Veracrypt homepage.

Check out some more free TrueCrypt alternatives like AESCrypt, FreeOTFE and DiskCryptor, and let us know which you think is the best.

Download this VPN to secure all your Windows devices and browse anonymously
Posted by on , in Category Downloads with Tags
Arun Kumar is a Microsoft MVP alumnus, obsessed with technology, especially the Internet. He deals with the multimedia content needs of training and corporate houses. Follow him on Twitter @PowercutIN


  1. This looks exactly the same as Truecrypt and with no-one actually explaining the real reason for Truecrypt’s vulnerabilities. Who’s to say those vulnerabilities haven’t carried over?

  2. Allen

    II have used Truecrypt for years with no problems. It appears that both programs have the same characteristic I don’t like, anyone can move or delete the containers. Then all is lost! To solve this I use “IsyLock” to create a folder, then I store my container inside the folder and lock the folder with IsyLock. Then nothing can be moved or deleted. Works with my hard drive or USB. It is also free.

  3. Allen

    P.S. Both truecrypt and IsyLock are free and both are portable. Truecrypt portable can be put inside the IsyLock Locker this way no one will se you have truecrypt on your USB. Once you unlock your locker with your IsyLock password then you can see your container and use truecrypt.

  4. Athinira

    The TC vulnerabilites are well-documented in the TrueCrypt Audit Project. Some of them might carry over, but there are definite security enhancements in place in the increased iteration-rounds.

    I’m not gonna transition to VeraCrypt before it’s more throuroughly tested and verified to be working properly, but i like the prospects.

  5. Athinira

    What do you mean by ‘anyone’?

    If you mean ‘any user’, then you can restrict user access to files and folders.
    If you mean ‘anyone with access to your computer’, then I regret to tell you this, but a tool like IsyLock is easily bypassed.

  6. tony

    It’s a good idea, since I have an axcrypted file or truecrypt container (for some websites’ passwords) in a flash drive together with quite other things like music, photos…., “anyone” in my family can access and delete by mistake !…..easily bypasses by FBI is OK!

  7. tony

    Can you protect TC container from deletion by mistake? beside hiding it in some dark corner?

  8. Athinira

    There are several ways to prevent files from being deleted by accident.
    1) Backup, preferably automated and with deletion redudancy.
    2) Keep a clean file and folder structure so you know where your data are.
    3) There are software tools that protect against accidental deletion
    4) File and folder-permissions that write-protects the file. Requires you to run TrueCrypt as administrator unless you mount the file as read-only.

    Deletion by mistake rarely happens if you actually keep a clean file and folder structure. I’ve been running complex structures for years, and the only accidental deletion I’ve ever done was inside a software (Shift+Delete in iTunes instead of just Delete. The former deletes the media from the iTunes library and hard drive, while the latter only deletes from playlist).

  9. Susan

    It always seems like TrueCrypt was discontinued due to pressure from the government. How do we know that Veracrypt just doesn’t cave in and give the government what it needs?

  10. Ano nyme

    Veracrypt is developed by a French company named Idrix, and is open-source.

Leave a Reply

Your email address will not be published. Required fields are marked *

1 + 1 =