TrueCrypt released for MacOSX, using MacFuse

Yesterday TrueCrypt version 5.0 has been released. Nothing special you might say, but then again, you might not be running Mac OSX. TrueCrypt has been released for the Mac as well. The cool thing about it is that it uses MacFuse.

Download TrueCrypt here.
You will find several options suitable for your system.

MacFuse is a kernel extension for the OSX operating system allowing mounting of file systems in user space. With MacFuse a user can mount a file system dynamically without needing super user privileges. MacFuse is based on the original Fuse kernel extension for Linux based operating systems. With MacFuse/Fuse you can do cool things like an mounting a remote file system over SSH, a screenshot file system dynamically generating screen shots of all active windows on your desktop or just about any other piece of data that can be mashed in to a hierarchical layout or read/write NTFS file systems. You probably think this is boring. But the thing is, it’s all dynamic. Without MacFuse I guess implementing TrueCrypt for Mac would have been a whole lot harder.

With the release of the latest TrueCrypt using a secure portable drive is finally a decent option for me. Sure OS X already has the concept of secure DMG files. But those are kinda Mac only. And I have to be able to carry stuff between my Mac and several Windows machines.

One word of caution though, remember that you do need to make some form of back-up of all your encrypted data. Back-up the individual files or the entire encrypted disk image. Because if only one bit falls over in your encrypted disk, the entire disk will be corrupted. Correction supplied by Honza in the comments. The behaviour of TrueCrypt is more like a real hard drive. If a bit falls over, only the file containing the tainted section will fail.

One Reply to “TrueCrypt released for MacOSX, using MacFuse”

  1. I know your post is a year old now, but it was the top hit in google with “macfuse truecrypt” – I just wanted to point out an incorrect statement: “Because if only one bit falls over in your encrypted disk, the entire disk will be corrupted.”

    This is not true, at least not now. If one bit is corrupt then you will just lose the data in that block (which is maybe 128 or 256 bits long). The rest of the files in your filesystem are still OK, and even the file with the corrupted block may be recoverable. More info in the Truecrypt documentation on Truecrypt.org.

Comments are closed.