Free open source on-the-fly encryption software
In addition to the requirements and precautions described in this chapter (Security Requirements and Precautions), you must follow and keep in mind the security requirements, precautions, and limitations listed in the following chapters and sections:
See also: Digital Signatures