found the worst vulnerability ever) which made them do such a thing. take down or death) or to TrueCrypt itself (i.e. Why I think so: strange key change, why bitlocker?Īssumption #2 Something bad happened to TrueCrypt developers (i.e. On the SourceForge, the keys were changed before any TrueCrypt files uploaded, but now they are deleted and the old keys got reverted back. All old versions are wiped, the repository is wiped too.Īssumption #1 The website is presumed hacked, the keys are presumed compromised. The binary is signed with the valid (usual) key. The binary on the website is capable only to decode encrypted data, not encode, and may contain trojan (seems like it doesn't, but don't believe me). Quoting TrueCrypt Developer David: “There is no longer interest.”
#Truecrypt official website windows#
TrueCrypt Developer “David”: Said “Bitlocker is ‘good enough’ and Windows was original ‘goal of the project.’ ”
![truecrypt official website truecrypt official website](https://file.alternativein.com/img/6610/truecrypt-thumb-1.png)
Steven Barnhart: “Also said no government contact except one time inquiring about a ‘support contract.’ ” Steven Barnhart: “I asked and it was clear from the reply that "he" believes forking's harmful because only they are really familiar w/code.” Steven Barnhart: (Paraphrasing) Developer “personally” feels that fork is harmful: “The source is still available as a reference though.” We worked hard on this for 10 years, nothing lasts forever.”
![truecrypt official website truecrypt official website](http://tech-files.com/wp-content/uploads/2016/04/503__trueCrypt3.png)
Steven Barnhart wrote to an eMail address he had used before and received several replies from “David.” The following snippets were taken from a twitter conversation which then took place between Steven Barnhart and Matthew Green Developer “David”: “We were happy with the audit, it didn't spark anything. Am I reading too much into this?ĮDIT2: I'm talking about this image that can be found here What if, as /u/TocasLaFlauta puts it, they are warning us to stay away from their product as best as they can whilst avoiding being backlashed by the unidentified force that's pushing them to do this?īetter even, what if this is actually a very detailed warning? Like "Stay off of BitLocker if you're windows." and "Stay the fuck off of OSX altogether!!"? Meaning, Bitlocker has an accessible backdoor and OSX Encrytion doesn't but the system has one that enables access to users' files. Again, I'm not an OSX user so maybe there's something I'm not aware of but still it doesn't seem right.īut then, while reading other comments in here, it got me thinking. Those instructions tell you to:Įt voilá, you've got a an encrypted image.
#Truecrypt official website for mac#
That same page where you saw that ridiculous linux recommendation has instructions for mac users too. I already said this on r/privacy but I think it's relevant here. Will also delete on comment score of -1 or less.
Parent commenter can toggle ^NSFW or ^delete. Interesting: Warrant ^(law) | ^Cypherpunk | Patriot Act, Title ^V | American Civil Liberties Union v. Image i - Library warrant canary relying on active removal designed by Jessamyn West The intention is to allow the provider to inform users of the existence of a subpoena passively without disclosing to others that the government has sought or obtained access to information or records under a secret subpoena. If the canary has not been updated in the time period specified by the host, users are to assume that the host has been served with such a subpoena. A warrant canary may be posted by the provider to inform users of dates that they have not been served a secret subpoena. §2709(c) of the USA Patriot Act, provide criminal penalties for disclosing the existence of the warrant to any third party, including the service provider's users. Secret subpoenas, including those covered under 18 U.S.C. A warrant canary is a method by which a communications service provider informs its users that the provider has not been served with a secret United States government subpoena.