Free open source on-the-fly encryption software
If an attacker can physically access the computer hardware and you use it after the attacker has physically accessed it, then TrueCrypt may become unable to secure data on the computer.‡ This is because the attacker may modify the hardware or attach a malicious hardware component to it (such as a hardware keystroke logger) that will capture the password or encryption key (e.g., when you mount a TrueCrypt volume) or otherwise compromise the security of the computer. Therefore, you must not use TrueCrypt on a computer that an attacker has physically accessed. Furthermore, you must ensure that TrueCrypt (including its device driver) is not running when the attacker physically accesses the computer. Additional information pertaining to hardware attacks where the attacker has direct physical access is contained in the section Unencrypted Data in RAM.
Furthermore, even if the attacker cannot physically access the computer hardware directly, he or she may be able to breach the physical security of the computer by remotely intercepting and analyzing emanations from the computer hardware (including the monitor and cables). For example, intercepted emanations from the cable connecting the keyboard with the computer can reveal passwords you type. It is beyond the scope of this document to list all of the kinds of such attacks (sometimes called TEMPEST attacks) and all known ways to prevent them (such as shielding or radio jamming). You must prevent such attacks. It is solely your responsibility to do so. If you do not, TrueCrypt may become unable to secure data on the computer.
‡ In this section (Physical Security), the phrase “data on the computer” means data on internal and external storage devices/media (including removable devices and network drives) connected to the computer.