smakme7757
Golden Member
I received the following email a few minutes ago, for your information:
So far i don't see anything to worry about. Sloppy code is unfortunate, but not a deal breaker.
Not using the burn() function to securely wipe sensitive areas of memory in certain places seems strange to me when they have developed the function themselves. However, again, not a deal breaker.
The rounds used in their PBKDF2 algorithm to derive the Volume Header encryption key are slightly too low - 1000 or 2000 depending on the algorithm used to generate the key. Something that would be easy to change in source, but with the amount of work required to recompile the application i can't be bothered.
Compiling was also pointed out as a weakness. Relying on antique libraries to compile the source. One specified in the report was last updated in 1993.
So everything seems to be in order so far 🙂.
Project Link: https://www.indiegogo.com/projects/the-truecrypt-auditHello!
We are pleased to announce that Phase I of the audit is complete. 11 vulnerabilities were found, all rated Low to Medium severity. To date, we have found no 0-Day critical vulnerabilities or "backdoors" (intentional or otherwise) in the code. In Phase II, we will conduct a formal cryptanalysis, as well as examine the OSX and Linux ports.
The full report can be downloaded here: https://opencryptoaudit.org/reports...dit_Project_TrueCrypt_Security_Assessment.pdf
We want to give a special thanks to Tom Ritter and his team at iSec Labs.
iSec has released a summary statement here: https://isecpartners.github.io/news/2014/04/14/iSEC-Completes-Truecrypt-Audit.html
Within the next few days, we will announce the details and more information about the team leading Phase II. Finally, we have signed DVDs, and t-shirt and stickers are in process. Our best ETA for shipping is mid-May. As we've hit this major milestone in the project, we wanted to say thank you again so much for your patience and amazing support!
Is TrueCryptAuditedYet? Yes, in part!
Best,
Kenn and Matt
So far i don't see anything to worry about. Sloppy code is unfortunate, but not a deal breaker.
Not using the burn() function to securely wipe sensitive areas of memory in certain places seems strange to me when they have developed the function themselves. However, again, not a deal breaker.
The rounds used in their PBKDF2 algorithm to derive the Volume Header encryption key are slightly too low - 1000 or 2000 depending on the algorithm used to generate the key. Something that would be easy to change in source, but with the amount of work required to recompile the application i can't be bothered.
Compiling was also pointed out as a weakness. Relying on antique libraries to compile the source. One specified in the report was last updated in 1993.
So everything seems to be in order so far 🙂.
Last edited: