Difference between revisions of "TrueCrypt"

From Wikispooks
Jump to navigation Jump to search
(fix about license)
(One intermediate revision by the same user not shown)
Line 5: Line 5:
 
|website=http://truecrypt.sourceforge.net
 
|website=http://truecrypt.sourceforge.net
 
|constitutes=software, encryption
 
|constitutes=software, encryption
|description=Widely praised disk encryption software, abruptly discontinued in 2015. Version 7.1 (''not'' 7.2) is the latest fully functional version.
+
|description=Widely praised disk encryption software, abruptly discontinued in 2015. Version 7.1a (''not'' 7.2) is the latest fully functional version.
 
}}
 
}}
 
==Sudden discontinuation==
 
==Sudden discontinuation==
Line 12: Line 12:
  
 
===Warrant Canary?===
 
===Warrant Canary?===
Some speculated that "<u>n</u>ot <u>s</u>ecure <u>a</u>s" may be a coded reference to the [[National Security Agency]].<ref>https://www.schneier.com/blog/archives/2014/05/truecrypt_wtf.html</ref> This was followed up by the observation that the whole phrase may contain a hidden acronym: "<u>U</u>sing <u>T</u>rueCrypt <u>i</u>s <u>n</u>ot <u>s</u>ecure <u>a</u>s <u>i</u>t <u>m</u>ay <u>c</u>ontain <u>u</u>nfixed <u>s</u>ecurity <u>i</u>ssues" ~ Uti NSA im cusi. The meaning of this is debated, as well as the language, but it is generaly understood as a [[warrant canary]].<ref>https://www.livebusinesschat.com/smf/index.php?topic=5629.0</ref><ref>http://www.reddit.com/r/conspiracy/comments/289070/hidden_message_on_the_new_sourceforge_truecrypt/</ref>
+
Some speculated that "<u>n</u>ot <u>s</u>ecure <u>a</u>s" may be a coded reference to the [[National Security Agency]].<ref>https://www.schneier.com/blog/archives/2014/05/truecrypt_wtf.html</ref> This was followed up by the observation that the whole phrase may contain a hidden acronym: "<u>U</u>sing <u>T</u>rueCrypt <u>i</u>s <u>n</u>ot <u>s</u>ecure <u>a</u>s <u>i</u>t <u>m</u>ay <u>c</u>ontain <u>u</u>nfixed <u>s</u>ecurity <u>i</u>ssues" ~ "Uti NSA im cu si". The language and meaning of this is debated, but many interpret it as a [[warrant canary]].<ref>https://www.livebusinesschat.com/smf/index.php?topic=5629.0</ref><ref>http://www.reddit.com/r/conspiracy/comments/289070/hidden_message_on_the_new_sourceforge_truecrypt/</ref>
  
 
==Legal status==
 
==Legal status==

Revision as of 07:34, 4 October 2015

Concept.png TrueCrypt
(software,  encryption)Rdf-entity.pngRdf-icon.png
TrueCrypt.jpg
Typetechnology
Widely praised disk encryption software, abruptly discontinued in 2015. Version 7.1a (not 7.2) is the latest fully functional version.

Sudden discontinuation

The software's Sourceforge page was abruptly edited in May 2015, to begin with the following red warning:

WARNING: Using TrueCrypt is not secure as it may contain unfixed security issues.

since it is proprietary, closed-source software, the site's recommendation to switch to Microsoft's BitLocker

[1]

Warrant Canary?

Some speculated that "not secure as" may be a coded reference to the National Security Agency.[2] This was followed up by the observation that the whole phrase may contain a hidden acronym: "Using TrueCrypt is not secure as it may contain unfixed security issues" ~ "Uti NSA im cu si". The language and meaning of this is debated, but many interpret it as a warrant canary.[3][4]

Legal status

The code had a non-standard open source licence, and did allow derivative products, although the developers later commented discouraging this practice. It has been forked by other developers and the original code is being treated as abandonware. Perhaps the most notable fork is VeraCrypt.

Security

TrueCrypt Version 7.1a was the last fully featured software. (7.2 was released only to encourage users to decrypt existing volumes.) In April 2015, TrueCrypt Version 7.1a successfully passed the second phase of a security audit, finding "no evidence of deliberate backdoors, or any severe design flaws that will make the software insecure in most instances."[5][6] Mirrors of the truecrypt download page quickly appeared. GRC reports that Google were generating false-positive malware infection warnings about their mirror download page.[7]

Bug reports

It was reported in September 2015 that James Forshaw had found two bugs in the software, named CVE-2015-7358 and CVE-2015-7359, of which the former was "critical". Details of the bugs were not immediately released, but Forshaw advised switching to a forked version of the code, VeraCrypt.[8]

Many thanks to our Patrons who cover ~2/3 of our hosting bill. Please join them if you can.


References