I was not even aware that TrueCrypt project had ended.
I've just checked the project web page and it makes sense.
Without wanting to start a conspiracy theory, what they stated is that the WinXP support ended, and the other windows platforms have integrated encryption, so because they don't want to develop and patch further the truecrypt software, they consider it "unsafe".
This doesn't even mean that the software have flaws, it just means that further develop ended and if some flaws are discovered in the future they will not be patched and you might end up with a false sense of security.
You stated that the truecrypt software can no longer encrypt ? Did you try this ?
http://sourceforge.net/projects/truecry ... e/download
I'm not feeling in the mood of using those versions, just in case.
If you have the older software from the time the project was still running, I guess that there is no point in using the "new" versions, just in case something fishy is going on .....
Without entering on the conspiracy mode, I think that if I were developing TrueCrypt and I wanted to stop developing it, this would be the way I would proceed.
If the TrueCrypt people were to be paid by some agency it would have been more likely that they would insert a backdoor on the software instead of stopping the project this way, because the majority of people will just run the software and will not bother to check the source code.
Spildit wrote:I wouldn't use the "VeraCrypt", I would use older versions of TrueCrypt instead.
- TrueCrypt does work as I know for a fact that security agencies fought and loose against it, as long as the password is BIG and a combination of random letters and numbers not in the dictionary.
- VeraCrypt might look stronger but might as well have backdoors.
- Older versions of TrueCrypt like 7 will format the "encrypted" partition the same way newer version will do. That is why when you install 7.2 to open volumes done by 7.1 it will not say the volume is not safe and you should encrypt it in other way. Meaning that the software itself is improved, but the encrypted data would still be the same among those versions. If you can't crack one you can't crack the other, and you will have more chances not to be affected by a possible backdoor in older versions.
- Iterations of the key just mean that it will take more time to test them when you have less iterations. So it would take more time to brute force because the time to test each key is way bigger when you have more iterations. At any rate TrueCrypt have enough iterations to keep any bruteforce attacker busy, as long as you use a big key.
Spildit wrote:Well, thanks for the comment and I liked the grain of SALT joke (salting hashes to avoid rainbow table attacks) !
LostAdaptives wrote:Spildit wrote:Well, thanks for the comment and I liked the grain of SALT joke (salting hashes to avoid rainbow table attacks) !
Very smart you're... have a nice weekend in the dream land
Users browsing this forum: No registered users and 1 guest