The author, Sarah Dean, went absent as of 2011. The FreeOTFE website is unreachable as of June 2013 and the domain name is now registered by a domain squatter. The original program can be downloaded from a mirror at Sourceforge. In June 2014, a fork of the project now named LibreCrypt appeared on GitHub.[3]
Overview
FreeOTFE was initially released by Sarah Dean in 2004, and was the first open source code disk encryption system that provided a modular architecture allowing 3rd parties to implement additional algorithms if needed. Older FreeOTFE licensing required that any modification to the program be placed in the public domain. This does not conform technically to section 3 of the Open Source definition. Newer program licensing omits this condition. The FreeOTFE license has not been approved by the Open Source Initiative and is not certified to be labeled with the open-source certification mark.
This software is compatible with Linux encrypted volumes (e.g. LUKS, cryptoloop, dm-crypt), allowing data encrypted under Linux to be read (and written) freely. It was the first open source transparent disk encryption system to support Windows Vista and PDAs.[4][5][6][7]
FreeOTFE also allows any number of "hidden volumes" to be created, giving plausible deniability and deniable encryption, and also has the option of encrypting full partitions or disks (but not the system partition).[9]
Portable use
FreeOTFE can be used in "portable" (or "traveller") mode, which allows it to be kept on a USB drive or other portable media, together with its encrypted data, and carried around. This allows it to be used under Microsoft Windows without installation of the complete program to "mount" and access the encrypted data through a virtual disk.
The use of this mode requires installing device drivers (at least temporarily) to create virtual disks, and as a consequence administrator rights are needed to start this traveller mode. As with most open source software that uses device drivers, the user must enable test signing[10] when running Windows Vista x64 and Windows 7 x64 systems.[11]
Driverless operation
Packaged with FreeOTFE is another program called "FreeOTFE Explorer",[12] which provides a driverless system that allows encrypted disks to be used without administrator rights.
This allows FreeOTFE encrypted data to be used on (for example) public computers found in libraries or computer kiosks (interactive kiosks), where administrator rights are unavailable.
Unlike FreeOTFE, FreeOTFE Explorer does not provide on-the-fly encryption through a virtual drive.[12] Instead it lets files be stored and extracted from encrypted disk images, in a similar manner as ZIP and RAR archives, by using a Windows Explorer like interface.
Algorithms implemented
Due to its architecture, FreeOTFE provides great flexibility to the user with its encryption options.
FreeOTFE originally offered encryption using cipher-block chaining (CBC) with encrypted salt-sector initialization vector (ESSIV), though from v3.00 introduced LRW and also the more secure XTS mode, which supersedes LRW in the IEEE P1619 standard for disk encryption.
Hashes
As with its cipher options, FreeOTFE offers many different hash algorithms:
^Michael Mandaville, Citizen-Soldier Handbook: 101 Ways Every American Can Fight Terrorism, Dog Ear Publishing, 2009 ISBN1-59858-671-8, page 253.
^Gregory B. White, Wm. Arthur Conklin, Dwayne Williams, Roger L. Davis, Chuck Cothren, CompTIA Security+ All-in-One Exam Guide, Second Edition, McGraw Hill Professional, 2008, ISBN0-07-160127-9, page 103.
^Bryan Burns, Jennifer Stisa Granick, Steve Manzuik, Paul Guersch, Dave Killion, Nicolas Beauchesne, Security power tools, O'Reilly Media, Inc., 2007, ISBN0-596-00963-1, page 523.