Both PGP WDE and BitLocker maintain a relatively small portion of the disk
that is unencrypted. This is unavoidable (for all software-based FDE/WDE
solutions), else the machine would not be bootable.
BitLocker really shines when machines are equipped with TPM chips (chips
must be 1.2 compliant and enabled in the BIOS). Else, using USB sticks is
the only way to authenticate. With TPM chips, you can use "basic" mode
(transparent operation... machine boots normally if no boot components have
been modified), or various authentication options (PIN, USB, or PIN+USB).
PGP might be worth it if you are already familiar with it, if you don't have
TPM chips, if you use other features (like email encryption), etc.
Windows 7 Enterprise and Ultimate editions have BitLocker. The other
versions, including the Professional edition, do not have BitLocker.
---
Just to correct something below, the TPM chip does not "decrypt the drive."
The TPM chip is a chip that securely stores cryptographic information, such
as keys required to decrypt data on the hard disk, as well as hashes of boot
components (PCRs).
--------------------------------------------------
From: "Youngquist, Jason R." <
jryoun...@ccis.edu>
Sent: Tuesday, November 24, 2009 11:18 AM
To: <
squar...@googlegroups.com>
Subject: PGP WDE vs. Windows 7 Bitlocker
> --
>
> You received this message because you are subscribed to the Google Groups
> "Encryption and Cryptography Mailing List" group.
> To post to this group, send email to
squar...@googlegroups.com.
> To unsubscribe from this group, send email to
>
squareroot+...@googlegroups.com.
> For more options, visit this group at
>
http://groups.google.com/group/squareroot?hl=en.
>
>
>