Just ignore oscar he is either a troll or a law enforcement disinformation agent. Nearly everything I have seen him say about computer security is a flat out lie. In regards to the FBI not being able to break Truecrypt but Bruce Schneier being able to, they are referring to two totally different things. Bruces team didn't decrypt encrypted Truecrypt partitions, they found a way to show the presence of hidden partitions via operating system and application level leakage. Totally different. Nobody can directly break Truecrypt, including the NSA. The only way around it is to steal the key somehow or exploit application or OS leakage. The key is of course stored in RAM and the crypto system is vulnerable to various forms of attack while it is mounted. I am not sure what secure virtual memory is, maybe encrypted SWAP? Encrypted SWAP can help protect you from the key leaking to the drive from memory, although in a FDE configuration your SWAP is encrypted already anyway. But it will not protect you from the RAM freeze attacks. Your best bet against those is to use encapsulation material and a chassis with intrusion detection features that you configure to shut down into a memory wipe. If LE want to bypass Truecrypt and they know that you are using it they will have a pretty easy time to do so, but if they have a powered down machine with a Truecrypted drive and you used an even half decent password, they are going to be completely out of luck.