Sign in to follow this  
Followers 0

88 posts in this topic

Posted

TrueCrypt, leading encryption software touted and used by no less than Edward Snowden and Glenn Greenwald, now appears to be dead, according to its recently updated website, but no one seems to know why

Share this post


Link to post
Share on other sites

Posted

Well only one way to be secure now

/microwaves hdds, put on tin foil hat

3 people like this

Share this post


Link to post
Share on other sites

Posted

Wth? This is weird! What other options are there?

Share this post


Link to post
Share on other sites

Posted

I hope there is some cross-platform alternative to TrueCrypt. I would at least like something I can use on both Windows and Linux.

Share this post


Link to post
Share on other sites

Posted

Wth? This is weird! What other options are there?

Well, according to TrueCrypts own page on SourceForge, another option is BitLocker. Which may be fair enough, but makes this seem all the more strange.

Share this post


Link to post
Share on other sites

Posted

Apparently it's been infected with malware or something

Share this post


Link to post
Share on other sites

Posted

Wth? This is weird! What other options are there?

Built in BitLocker with any supported version of Windows, OSX has FileVault, there's a fair number of alternatives too, for an example list:

http://en.wikipedia.org/wiki/Comparison_of_disk_encryption_software

Share this post


Link to post
Share on other sites

Posted

I think truecrypt shut down years ago, it was on 7.1 forever...

 

but bitlocker? not every computer has a TPM chip in it


Well, according to TrueCrypts own page on SourceForge, another option is BitLocker. Which may be fair enough, but makes this seem all the more strange.

yeah I found it odd also, Bitlocker is an odd suggestion from a 3rd party security point of view

Share this post


Link to post
Share on other sites

Posted

but bitlocker? not every computer has a TPM chip in it

It's not a set-in-stone requirement, you can bypass the restriction via group policy.

Share this post


Link to post
Share on other sites

Posted

????

Share this post


Link to post
Share on other sites

Posted

It's not a set-in-stone requirement, you can bypass the restriction via group policy.

you shouldn't have to bypass anything

Share this post


Link to post
Share on other sites

Posted

you shouldn't have to bypass anything

It's just a setting, one among hundreds... by default it's set to the more secure configuration. Would you prefer they didn't give you the option or have it less secure out of the box?

Share this post


Link to post
Share on other sites

Posted

also a little odd that version 7.2 which they just put out is smaller by a good bit than 7.1a

Share this post


Link to post
Share on other sites

Posted

Since TrueCrypt had an official code review, I guess they decided fixing the issues was not feasible.

 

I'm still using 7.1a on Windows 8.1, and I am not having any issues, so for the time being will continue to do so. But at the same time, I will do some research into BitLocker as well.

Share this post


Link to post
Share on other sites

Posted

ok, something is seriously wrong with the 7.2 code, installed it in a protected VM environment and it's doing some odd things network wise... I don't think file that is begin served right now is legit... I've never had truecrypt try to make network connections in the past

1 person likes this

Share this post


Link to post
Share on other sites

Posted

ok, something is seriously wrong with the 7.2 code, installed it in a protected VM environment and it's doing some odd things network wise... I don't think file that is begin served right now is legit... I've never had truecrypt try to make network connections in the past

 

I wouldn't be surprised if the site was hacked and you have just installed an infected boot/root kit.

 

Lucky you used a VM.

Share this post


Link to post
Share on other sites

Posted

I wouldn't be surprised if the site was hacked and you have just installed an infected boot/root kit.

 

Lucky you used a VM.

that's why I did it in a VM...... we never trust security software until we audit it first

Share this post


Link to post
Share on other sites

Posted

Wth? This is weird! What other options are there?

 

ROT-13 or 1024-bit NSAKey

2 people like this

Share this post


Link to post
Share on other sites

Posted

ROT-13 or 1024-bit NSAKey

lol NSAKey :shiftyninja:

Share this post


Link to post
Share on other sites

Posted

Still my favorite method of sanitizing hard drives.  This hard drive was beginning to fail, so I sanitized it before trashing it.

post-125978-0-59116600-1401319724.jpg

Share this post


Link to post
Share on other sites

Posted

Still my favorite method of sanitizing hard drives.  This hard drive was beginning to fail, so I sanitized it before trashing it.

 

eh, we use Acetylene Tourches and melt the things into a ball... makes work fun *LOL*

5 people like this

Share this post


Link to post
Share on other sites

Posted

Yeah this looks like a domain/sourceforge page hijack...

Share this post


Link to post
Share on other sites

Posted

bitlocker has an NSA backdoor built-in. Documents leaked to cryptome.org about 2yrs ago showed that law enforcement can unencrypt it.

Share this post


Link to post
Share on other sites

Posted

bitlocker has an NSA backdoor built-in. Documents leaked to cryptome.org about 2yrs ago showed that law enforcement can unencrypt it.

 

Link?

 

Are you sure they can unencrypt it without your key? last I heard was they were cold-booting them and getting the key from memory.

Share this post


Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!


Register a new account

Sign in

Already have an account? Sign in here.


Sign In Now
Sign in to follow this  
Followers 0

  • Recently Browsing   0 members

    No registered users viewing this page.