1 \section{A brief overview of common crypto software}
3 Broadly speaking, modern crypto software can placed into one of the two categories:
6 \item assymetric cryptography
7 \item symmetric cryptography
10 The most common crypto software implementations support both modes cryptosystems.
12 \subsection{Typical cryptography libraries, frameworks and tools}
23 \item Bitlocker % XXX: needs to be discussed! bitlocker is probably backdoored (at least some research suggests it)
24 \item Apple FileVault 2