Your Name wrote, on Fri, 30 Jan 2015 19:02:17 +1300:
> What "mount point"?? When you stop using the device, it simply locks
> (depending on user preferences). You then have to unlock it when you
> want to use it again.
That's not my use model.
For me, my use model is that the device is unlocked and there is
a single directory for storage of sensitive files (that's what I called
a "mount point" since, on Windows, it's a file that appears as a
new drive, and on Linux, it's a file that appears as a mount point).
Then, anything I want encrypted goes into that mount point (or drive,
on Windows). The encryption/decryption happens automatically, once I
type the initial password, so, everything works perfectly.
Then, when I'm done, I unmount the mount point, voilà, that mount
point reverts to an encrypted file.
That's the most common use model, anyway, for both Truecrypt and
cryptmount (and GnuPg I think) encryption. There are other use models,
but that's the most convenient for me.
I certainly don't want the ENTIRE thing encrypted. Been there, done
that. Lost too much data, over time, mostly due to OS crap (Windows
and Linux) so I'll NEVER encrypt the entire disk ever again.
I just want a mount point encrypted.