![]() ![]() ![]() Naturally, both for those who use continue using TrueCrypt 7.1a (the final full-featured version) and for those who want to develop or use a fork of TrueCrypt, it’s important to know with confidence that the software is secure and safe to use. Another fork, CipherShed, is currently offered under the TrueCrypt License but intends to eventually undergo a complete code rewrite so that it can legally cut ties with that license and officially be relicensed as truly free (as in freedom) open-source software. One fork, VeraCrypt, brazenly defies this prohibition and claims that VeraCrypt is offered under both the TrueCrypt License and the Microsoft Public License. There has been some debate about how acceptable it is to create a public fork of the TrueCrypt codebase under its unique source code license, which threatens legal prosecution if the copyright holder feels that some part of the license was not followed precisely, and expressly forbids relicensing the software under any other license. Still others continue using TrueCrypt for its unique features, including cross-platform encrypted disks (a feature that’s still being utilized by Amazon Web Services today), and the plausible deniability hidden operating system feature for Windows users, which allows a user who’s under duress to use an alternative boot password to log into a different operating system that doesn’t contain incriminating information.Īnother subset of those still interested in TrueCrypt, and thus its ongoing security audit, are programmers who are continuing to develop TrueCrypt independent of the original creators-an undertaking which is known in the software development field as forking a project. Windows’ BitLocker and OS X’s FileVault 2, respectively more about the latter later) due to paranoia about whether these major U.S.-based corporations may be beholden to-or compromised by-the government or intelligence agencies such as the NSA. ![]() Some still prefer it over Microsoft and Apple’s built-in full-disk encryption alternatives (e.g. One subset of those people includes the die-hard believers in TrueCrypt who continue to view it as the best software of its kind, in spite of public concerns about its security. It is extremely unlikely that there will ever be another official version of the software under the trademarked TrueCrypt name (and if one should ever surface, it would be viewed with such intense skepticism after last year’s brouhaha that very few people would likely use it).īut some people view TrueCrypt’s demise more positively: “TrueCrypt is dead long live TrueCrypt.” Long live TrueCrypt? The short answer is that, yes, TrueCrypt itself is dead in the sense that it’s not being developed anymore by its original creators. What’s the point of auditing software that’s no longer being developed? Is TrueCrypt really dead? It might surprise readers, then, to see recent headlines about the second phase of TrueCrypt’s security audit having been completed. Security & Privacy + Security News TrueCrypt Has Been Audited! Should You Use It?Ĭlose to a year ago, I wrote an article entitled “ TrueCrypt is Dead What Does This Mean for Mac Users?” after the developers of the source-available * disk encryption software abruptly terminated the project. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |