Pages:
Author

Topic: [Warning] Truecrypt has been discontinued, declared not safe - page 2. (Read 2701 times)

sr. member
Activity: 322
Merit: 250
Decentralize All The Things!

The Bitlocker code is obviously closed source, but I trust in Market forces - unless my computer is storing my plans to release smallpox in the US, Microsoft would be unlikely to take the commercial hit of using any present backdoor, since it would be a use-once backdoor before everyone knew about it.

So they never publically use it. All the big US corporations work with the NSA. Operation Prism. For security reasons it's quite unusable.

But so is windows itself! you can use whatever encryption program you want, with backdoors in Windows it will never be secure anyway.

Of course it will. if you fully (and truly) encrypt a storage device how can a backdoor in the OS help with gaining access to any of the data?

Sniffing your keys. Logging your keystrokes whenever you use/start x program.
legendary
Activity: 2324
Merit: 1125

The Bitlocker code is obviously closed source, but I trust in Market forces - unless my computer is storing my plans to release smallpox in the US, Microsoft would be unlikely to take the commercial hit of using any present backdoor, since it would be a use-once backdoor before everyone knew about it.

So they never publically use it. All the big US corporations work with the NSA. Operation Prism. For security reasons it's quite unusable.

But so is windows itself! you can use whatever encryption program you want, with backdoors in Windows it will never be secure anyway.

Of course it will. if you fully (and truly) encrypt a storage device how can a backdoor in the OS help with gaining access to any of the data?
sr. member
Activity: 322
Merit: 250
Decentralize All The Things!

The Bitlocker code is obviously closed source, but I trust in Market forces - unless my computer is storing my plans to release smallpox in the US, Microsoft would be unlikely to take the commercial hit of using any present backdoor, since it would be a use-once backdoor before everyone knew about it.

So they never publically use it. All the big US corporations work with the NSA. Operation Prism. For security reasons it's quite unusable.

But so is windows itself! you can use whatever encryption program you want, with backdoors in Windows it will never be secure anyway.
legendary
Activity: 2324
Merit: 1125

The Bitlocker code is obviously closed source, but I trust in Market forces - unless my computer is storing my plans to release smallpox in the US, Microsoft would be unlikely to take the commercial hit of using any present backdoor, since it would be a use-once backdoor before everyone knew about it.

So they never publically use it. All the big US corporations work with the NSA. Operation Prism. For security reasons it's quite unusable.
full member
Activity: 224
Merit: 100
Professional anarchist
This doesn't add up at all.  I don't like the post above mine, as it makes me nervous about running v7.1a.  However, I remember when Win7 came out and TrueCrypt.org mentioned supporting Win7.  They said that the versions supporting Win7 would use BitLocker's technology even on home versions where the user didn't have direct access to BitLocker.  It is not uncommon for a third party software to use built-in technology that users otherwise couldn't access, so this didn't surprise or concern me.  This makes me less nervous about BitLocker than v7.1a considering the research post above, however, I'm not familiar with BitLocker and I don't want to try to transfer all of my data to new drives.  The most frustrating part is I was booted into Ubuntu 14.04 yesterday on a live disc (haven't been able to install it on my PC) and downloaded the v7.1a binary for Linux, but didn't save it thinking I could just download it again (and again, and again) when I needed it / if I ever got Ubuntu installed.  OI!

I've been using TC on Windows 7 for ages, works absolutely fine once you bully the Windows installer into installing the OS on one partition. I didn't get it to work on my new dev machine, which is Windows 8.1 - so I went with Bitlocker there. System encryption works in much the same way, preboot environment, and a passphrase - which I combine with a Yubikey to give two-factor auth.

The Bitlocker code is obviously closed source, but I trust in Market forces - unless my computer is storing my plans to release smallpox in the US, Microsoft would be unlikely to take the commercial hit of using any present backdoor, since it would be a use-once backdoor before everyone knew about it.
hero member
Activity: 807
Merit: 500
This doesn't add up at all.  I don't like the post above mine, as it makes me nervous about running v7.1a.  However, I remember when Win7 came out and TrueCrypt.org mentioned supporting Win7.  They said that the versions supporting Win7 would use BitLocker's technology even on home versions where the user didn't have direct access to BitLocker.  It is not uncommon for a third party software to use built-in technology that users otherwise couldn't access, so this didn't surprise or concern me.  This makes me less nervous about BitLocker than v7.1a considering the research post above, however, I'm not familiar with BitLocker and I don't want to try to transfer all of my data to new drives.  The most frustrating part is I was booted into Ubuntu 14.04 Tuesday on a live disc (haven't been able to install it on my PC) and downloaded the v7.1a binary for Linux, but didn't save it thinking I could just download it again (and again, and again) when I needed it / if I ever got Ubuntu installed.  OI!

ETA: The warning on truecrypt.org says "Using TrueCrypt is not secure as it may contain unfixed security issues." This only implies that it is no longer being maintained.  I meant to mention this in my post, and it is why I wish I had kept the Linux binary.  TrueCrypt is probably secure enough for me even if there is an issue, and moving everything from RAID10 to spare discs to re-encrypt the RAID10 seems like unnecessary risk and work for the data I am protecting.  However, the point of this second incoherent rambling is that it hasn't been declared not safe, just declared potentially not safe in the future.

I also almost downloaded the PGP keys Tuesday for comparison to the versions I already have, but failed to do so.  Ugh!
legendary
Activity: 882
Merit: 1000
Quote
The binary on the website is capable only to decode encrypted data, not encode, and may contain trojan (seems like it doesn't, but don't believe me). The binary is signed with the valid (usual) key. All old versions are wiped, the repository is wiped too.
Assumption #1 The website is presumed hacked, the keys are presumed compromised. Please do not download or run it. And please don't switch to bitlocker.
Latest working version is 7.1a. Version 7.2 is a hoax
On the SourceForge, the keys were changed before any TrueCrypt files uploaded, but now they are deleted and the old keys got reverted back.
Why I think so: strange key change, why bitlocker?
Assumption #2 Something bad happened to TrueCrypt developers (i.e. take down or death) or to TrueCrypt itself (i.e. found the worst vulnerability ever) which made them do such a thing. So this version is legit
Why I think so: all files are with valid signatures, all the releases are available (Windows; Linux x86, x86_64, console versions, Mac OS, sources), the binaries seems like was built on the usual developer PC (there are some paths like c:\truecrypt-7.2\driver\obj_driver_release\i386\truecrypt.pdb, which were the same for 7.1a). License text is changed too (see the diff below).
Why is it ridiculous for TrueCrypt developers to suggest moving to BitLocker? Well, TrueCrypt was strictly against of using TPM[1] because it may contain extra key chains which allow agencies like NSA to extract your private key. So why would they suggest such a thing and not other open-source alternatives? It looks like a clear sign that the developer can't say he's in danger so he did this. As many suppose, this could be the sort of warrant canary[2]
Assumption #2 is more likely true than assumption #1. Sad but true.
Assumption #3 7.1a is backdoored and the developer wants all users to stop using it.
Why I think so: there is a website http://truecryptcheck.wordpress.com[3] which contains all the hash sums for TrueCrypt 7.1a. Is has only 1 blog record from August 15, 2013, only for TrueCrypt and only for 7.1a. It's a bit strange to make a website with the hash sums for only one program and only one version of it.
SourceForge sent emails on 22 May, they said they changed password algorithms and everybody should change their passwords.
SourceForge claims everything is as usual (from https://news.ycombinator.com/item?id=7813121):[4]
Providing some details from SourceForge:
We have had no contact with the TrueCrypt project team (and thus no complaints).
We see no indicator of account compromise; current usage is consistent with past usage.
Our recent SourceForge forced password change was triggered by infrastructure improvements not a compromise. FMI see http://sourceforge.net/blog/forced-password-change/[5]
Thank you,
The SourceForge Team [email protected][6]
TrueCrypt developers are unknown and currently there is no way to know who is who and who should we listen to.
From wikileaks twitter https://twitter.com/wikileaks/status/471769936038461440:[7]
(1/4) Truecrypt has released an update saying that it is insecure and development has been terminated http://truecrypt.sf.net[8]
(2/4) the style of the announcement is very odd; however we believe it is likely to be legitimate and not a simple defacement
(3/4) the new executable contains the same message and is cryptographically signed. We believe that there is either a power conflict..
(4/4) in the dev team or psychological issues, coersion of some form, or a hacker with access to site and keys.
From Matthew Green (one of TrueCrypt auditor) twitter https://twitter.com/matthew_d_green/status/471752508147519488:[9]
@SteveBellovin @mattblaze @0xdaeda1a I think this is legit.
TrueCrypt Setup 7.1a.exe:
sha1: 7689d038c76bd1df695d295c026961e50e4a62ea
md5: 7a23ac83a0856c352025a6f7c9cc1526
TrueCrypt 7.1a Mac OS X.dmg:
sha1: 16e6d7675d63fba9bb75a9983397e3fb610459a1
md5: 89affdc42966ae5739f673ba5fb4b7c5
truecrypt-7.1a-linux-x86.tar.gz:
sha1: 0e77b220dbbc6f14101f3f913966f2c818b0f588
md5: 09355fb2e43cf51697a15421816899be
truecrypt-7.1a-linux-x64.tar.gz:
sha1: 086cf24fad36c2c99a6ac32774833c74091acc4d
md5: bb355096348383987447151eecd6dc0e
Diff between latest version and the hoax one: https://github.com/warewolf/truecrypt/compare/master...7.2[10]
Screenshot: http://habrastorage.org/getpro/habr/post_images/da1/1bf/6a5/da11bf6a5225fa718987ba4e54038fc1.png[11] 
Topics: https://news.ycombinator.com/item?id=7812133[12]
http://www.reddit.com/r/netsec/comments/26pz9b/truecrypt_development_has_ended_052814/[13]
http://www.reddit.com/r/sysadmin/comments/26pxol/truecrypt_is_dead/[14]
http://www.reddit.com/r/crypto/comments/26px1i/truecrypt_shutting_down_development_of_truecrypt/[15]
http://arstechnica.com/security/2014/05/truecrypt-is-not-secure-official-sourceforge-page-abruptly-warns/[16]
http://krebsonsecurity.com/2014/05/true-goodbye-using-truecrypt-is-not-secure/[17]
Twitter stream: https://twitter.com/search?q=truecrypt&src=typd[18]
You may join IRC #[email protected][19] , although there is no OPs right now.

- http://www.reddit.com/r/sysadmin/comments/26pxol/truecrypt_is_dead/chtexzg


That post seems to be the most up to date, and seems to have pretty valid information.
sr. member
Activity: 462
Merit: 250
I'm a Truecrypt user and I'm shocked that this is happening. Sad

I don't trust BitLocker nearly as much as Truecrypt considering that it's proprietary and developed by Microsoft. Yes, the Truecrypt code is messy and confusing but that's still much better than a closed-source solution. Not to mention most home users won't have BitLocker on their PCs since it only comes with the professional and enterprise versions of Windows.

I'll still be using Truecrypt. I just hope the audit will be over and the results of it will be published soon. If the audit reveals that the code is secure then hopefully the project will be taken over by a different team. If it turns out that the code is not secure then I'll have to find another solution (ideally something that works with Windows XP).
full member
Activity: 224
Merit: 100
Professional anarchist
Yea I've asked Matthew for his thoughts on it.

There are a lot of theories flying around. The audit is unrelated, but there is a suspicion about an NSA letter having been sent. Although I would be surprised if the devs were US based.

The official reason, that Windows XP is no longer supported by Microsoft, doesn't make any sense.
legendary
Activity: 1148
Merit: 1014
In Satoshi I Trust
maybe some clever people can fork it. i guess its like lavabit 2.0.


http://arstechnica.com/security/2014/05/truecrypt-is-not-secure-official-sourceforge-page-abruptly-warns/

matthew green (Dev of Zerocoin) has wrote an email to the truecrypt guys. time will tell.
full member
Activity: 224
Merit: 100
Professional anarchist
I know this isn't Bitcoin related, but it is worth noting, since many people use Truecrypt to protect the systems on which they keep their Bitcoins.

Truecrypt has been pulled. It's website now redirects to the SourceForge page, where it now details instructions on how to migrate to Bitlocker. A new version has been released which does nothing but decrypt.

I'm talking to the guy in charge of the recent security audit of the Truecrypt source to see if the two are related.

The official reason is the end of life of Windows XP, which smells about as fishy as can be.

Lavabit redux? Or just an admission of the difficulties in tackling UEFI? But then why not let the community take it over?

http://www.truecrypt.org

Edit: The discontinuation is unrelated to the audit. Also, licensing issues may prevent this from being picked up by the community.
Pages:
Jump to: