86
Security Requirements and Precautions
IMPORTANT
: If
you want to use TrueCrypt, you must follow the security requirements and
security precautions listed in this chapter.
The sections in this chapter specify security requirements for using TrueCrypt
and give information
about things that adversely affect or limit the ability of TrueCrypt to secure data and to provide
plausible deniability. Disclaimer: This chapter is not guaranteed
to contain a list of
all
security
issues and attacks that might adversely affect or limit the ability of TrueCrypt to secure data and to
provide plausible deniability.
Dostları ilə paylaş: