In addition to the requirements and precautions described in this chapter (Security Requirements and Precautions), you must follow and keep in mind the security requirements, precautions, and limitations listed in the following chapters and sections:
See also: Digital Signatures
By Andrew Y. (@andryou) - no affiliation with TrueCrypt - fair use - site for non-monetary, reference purposes only