Quote from: oscarzululondon on June 03, 2012, 12:01 pmAs vlad1m1r wrote you should encrypt your memory stick, Truecrypt is the easiest option although not the best and not 100% secure as it has had law enforcement back doors for about 4 years now. I'm writing a simple guide for the better encryption methods currently and will be publishing it here later this week.Oscarzululondon,While I commend your enthusiasm for encryption and agree Truecrypt is vulnerable to cold boot attacks and bruteforcing as with any other encryption software, why do you say it has law enforcement back doors?The software's open source (http://www.truecrypt.org/downloads2) - I admit my knowledge of C is very limited but I couldn't find any back doors in the source code when I had a peek. Are you sure about this? I've not heard anything about this before.I've taken a quick gander on a few privacy related websites and can't seem to see any cause for worry:http://www.anti-forensics.com/full-disk-encryption-with-truecrypt-on-windows-xphttp://www.privacy-cd.org/downloads/truecrypt_7.0a-analysis-en.pdfThe beauty of open source software is it can be reviewed. The above analysis of Truecrypt 7 didn't find any backdoors.The Truecrypt FAQ also says there is no backdoor (well they would say that wouldn't they?! :-D ) but they do link to an article about the Brazilian government and the FBI US being unable to break their encryption :http://www.webcitation.org/query?url=g1.globo.com/English/noticia/2010/06/not-even-fbi-can-de-crypt-files-daniel-dantas.htmlhttp://news.techworld.com/security/3228701/fbi-hackers-fail-to-crack-truecrypt/In Southampton where I used to live several drug dealers were arrested last week whose machines were encrypted with Truecrypt but so far the Police have had no joy in breaking the encryption on them. Of course in the UK they can resort to RIPA to force people to hand passwords over so it's a bit of a moot point!V.