![]() Windows 8/7/Vista and later offer integrated support for encrypted disks and virtual disk images. The development of TrueCrypt was ended in 5/2014 after Microsoft terminated support of Windows XP. This page exists only to help migrate existing data encrypted by TrueCrypt. Here is an excerpt from the TrueCrypt download page: WARNING: Using TrueCrypt is not secure as it may contain unfixed security issues ![]() VeraCrypt is the successor of TrueCrypt once it was condemned and has passed security audits. While I'm not sure if file containers themselves are affected, it would be a much better option to use VeraCrypt. Given that TrueCrypt has been mysteriously discontinued by it's developers for security concerns and has not been maintained, it is likely to have some issues. To implement new crypto-algoritm (which Vera does) is a simple task. This is a documentation bug, which hasn't beend fixed in the VeraCrypt docs yet. "The keyfile pool is not XOR'ed with the passphrase but modulo-256 summed." He hasn't even fixed the known bugs discovered by the tc-play developer and noted in README. If you compare VeraCrypt code and TrueCrypt code, you realize that VeraCrypt maintainer hasn't added anything interesting. The possible backdoor could be hidden anywhere, and it would be complicated to find it. If you look at the VeraCrypt sources, you realize it contains thousands of lines of code and 99% of the code is GUI. Many people have been thinking about TC security which could be nother proof. You can find even another reimplementation in linux cryptosetup. It's short, and I was able to read it and understand it completely. I would bet my second testicle that the tc-play is safe. The only question is, whether the particular True/Vera-crypt implementation is safe. However, it uses just standard crypto-primitives. The only difference (as mentioned) is key derivation. So, if LUKS is safe than TrueCrypt is safe as well. It's the pretty same code as is used by LUKS - Linux crypto. It uses standard symmetric key encryption implemented in the Linux kernel. It reads the volume header, derives the encryption key from your password/keyfiles and seed stored in the volume header and uses the key and linux dev-mapper to mount the volume container. It uses standard Linux kernel device mapper for mounting the TC volume. I spent some time seriously digging into the Truecrypt/Veracrypt source code and studying the issued audit, and I would bet one of my testicles that the container format is secure.Ī simple TC reimplementation exists at.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |