How much will full-disk encryption slow down a netbook?
I've been comfortable using TrueCrypt volumes to protect various sets of files on my computers. But I've gathered there can be more convenience and security to be had be encrypting the full hard disk, since everything will be encrypted.
I purchased a netbook recently (an Acer Aspire One), and wonder how much of an impact an always-on encryption process will have. The netbook has a somewhat slow processor, but runs acceptably as it is. Visual Studio is usable, an important criteria.
On any decent machine, with faster, and multiple, processors, this is likely a minor issue. But given the slower processors in netbooks, will full-disk encryption with TrueCrypt have any serious effect?
Solution 1:
according to http://www.ghacks.net/2009/11/26/bitlocker-versus-true-crypt-performance/ you will experience somewhat between 20% and 30% percent slowdown.
according to http://technet.microsoft.com/de-de/library/ee449438(WS.10).aspx#BKMK_Performance you will experience less than 10% slowdown.
(bitlocker and truecrypt put similar workload to the system)
the truth will be more towards the 20% penalty.
Solution 2:
The performance hit is not noticeable. I clocked the compilation of 310,00 lines of C++ from 700 source files which produces over 150 MB of output. I did a clean build 5 times in a row on a non-encrypted drive, encrypted the drive with TrueCrypt, and did again a clean build 5 more times. I was unable to notice any difference on my notebook. My notebook does not have the AES-NI instructions, so if your notebook is recent, the encryption will be about 10 times faster. A friend of mine has a notebook where the processor supports the AES-NI instructions, and get a benchmark of 2.5 GB per second for encryption and decryption speed.
Solution 3:
Running Truecrypt on a Netbook will pose a few interesting issues. First, if you are using TrueCrypt to encrypt the entire system drive, then you will likely notice some slowness as other folks have noted. This is especially going to be true if you have an SSD. (It's not that encrypting/decrypting from an SSD is slower than it is from an HD, but just that an SSD is a lot faster than an HD, so the relative slowdown is much greater for an SSD.)
To get an idea of how fast you will be able to read/write an HD encrypted with Truecrypt, you can run a benchmark from within the Truecrypt program. The value you get from this benchmark will tell you the most throughput you can expect when reading your drive. Average throughput will likely be somewhat slower than this, as your CPU will usually be doing more things than just encrypting/decrypting.
There is, however, another thing to consider when running Truecrypt on SSDs. In order to extend their lives, manufacturers use a technology known as wear leveling. https://secure.wikimedia.org/wikipedia/en/wiki/Wear_leveling Since you can only rewrite each memory cell on an SSD drive a certain number of times before it wears out, drive manufacturers spread writes out over the drive. This way, if there is a particular file that you modify frequently, the portion of the drive that holds that file won't wear out, because the drive will move that file to a new location each time it's rewritten.
However, when you tell Truecrypt to encrypt the entire drive, it encrypts the entire drive. This includes all the data on the drive, and all of the empty space. If the drive is an SSD, when you write to the drive, the SSD has no choice but to save files where they were, because as far as it's concerned, the drive is full. So, the wear leveling feature can't work, and you are likely to start to lose portions of your drive much faster than if it wasn't encrypted.
Good luck. figuring out how to use Truecrypt on a Netbook can be a challenge.