![]() So it’s *possible* that this whole thing is a hoax. I think it unlikely that an unknown hacker (a) identified the Truecrypt devs, (b) stole their signing key, (c) hacked their site. Takes a while for email to reach the sub. The anonymous Truecrypt dev team, from their submarine hideout. The audit did not find anything - or rather, nothing that we haven’t already published. I hope someone forks it if this is for real. The sad thing is that after all this time I was just starting to like Truecrypt. I sent an email to our contact at Truecrypt. ![]() "I have no idea what’s up with the Truecrypt site, or what ‘security issues’ they’re talking about. Unfortunately, this is major news - Steve Gibson of GRC.com just published in his blog ( ) a series of previously Tweeted messages by cryptographer expert Professor Matthew Green, of Johns Hopkins Uni, who recently collaborated in the TrueCrypt Audit: ![]() Whether the TrueCrypt Foundation really did stop developing TC is unknown, but this kind of announcement is straight out a badly written novel. I am forced to agree with Midas and Userfriendly. The software links direct users to the new download page. Sixth link is the same as the second link.īottom link is the same as the first link. Third link is the same as the second link.įifth link is the same as the second link. When I checked every referral link in the current TrueCrypt/sourceforge webpage, this is what I found: I use the latest version of DiskCryptor and I have no problems with it! Why someone or some group went to all this effort to take down all the previous versions from the site and update (!) TrueCrypt to version 7.2 is beyond weird. I have never trusted this flaky software.
0 Comments
Leave a Reply. |