TrueCrypt is a computer software program whose primary purposes are to:
TrueCrypt does not:
Under Windows, a user without administrator privileges can (assuming the default TrueCrypt and operating system configurations):
Under Linux, a user without administrator privileges can (assuming the default TrueCrypt and operating system configurations):
Under Mac OS X, a user without administrator privileges can (assuming the default TrueCrypt and operating system configurations):
TrueCrypt does not support the set-euid root mode of execution.
Additional information and details regarding the security model are contained in the chapter Security Requirements and Precautions.
* In this section (Security Model), the phrase “data on a computer” means data on internal and external storage devices/media (including removable devices and network drives) connected to the computer.
† In this section (Security Model), the phrase “administrator privileges” does not necessarily refer to a valid administrator account. It may also refer to an attacker who does not have a valid administrator account but who is able (for example, due to improper configuration of the system or by exploiting a vulnerability in the operating system or a third-party application) to perform any action that only a user with a valid administrator account is normally allowed to perform (for example, to read or modify an arbitrary part of a drive or the RAM, etc.)
‡ “TrueCrypt volume” also means a TrueCrypt-encrypted system partition/drive (see the chapter System Encryption).
By Andrew Y. (@andryou) - no affiliation with TrueCrypt - fair use - site for non-monetary, reference purposes only