Red Squirrel
No Lifer
Yeah I still find this is very fishy. I have a feeling the government is involved somehow, and the devs' lives are at risk. They probably can't tell the truth about the situation.
Bruce Schneier uses Truecrypt and for all we know he could be a Dev of TC. After all, he only helped make Blowfish and Twofish. I will monitor Bruce Schneier's blog and see what he recommends after TC's demise.
Symantec PGP is as far as i know open for audit as PGP is open source in nature.Schneier's recommendation is Symantec's encryption product.
But at that point, I'd say Apple or Microsoft is as trust worthy as Symantec.
For people who are so concerned about the unauditability of those solutions...well...why are you using Windows? Switch to Linux and use the native Linux encryption solution. Heck, Android and ChromeOS use it too.
Steven Barnhart (@stevebarnhart) wrote to an eMail address he had used before and received several replies from David. The following snippets were taken from a twitter conversation which then took place between Steven Barnhart (@stevebarnhart) and Matthew Green (@matthew_d_green):
TrueCrypt Developer David: We were happy with the audit, it didn't spark anything. We worked hard on this for 10 years, nothing lasts forever.
Steven Barnhart (Paraphrasing): Developer personally feels that fork is harmful: The source is still available as a reference though.
Steven Barnhart: I asked and it was clear from the reply that "he" believes forking's harmful because only they are really familiar w/code.
Steven Barnhart: Also said no government contact except one time inquiring about a support contract.
TrueCrypt Developer David said: Bitlocker is good enough and Windows was original goal of the project.
Quoting TrueCrypt Developer David: There is no longer interest.
I'd say your spot on!Thinking about things some more, I think that rage quit is probably close to the answer; perhaps, not so much "rage quit" as "boredom quit".
The market for encryption products is crowded, with many commercial products offering various certifications, support, etc. There are also other open source crypto systems, with better support options (truecrypt never offered support, and in general have not been willing to offer support even on a paid basis), albeit not as capable of truecrypt.
Further truecrypt is known to have relatively poor code quality (not so much as to significantly affect security, but enough to make it a serious problem to maintain); certainly, I once had a look through the code a while ago, and I found significant parts almost impenetrable. Further, it has a long list of known bugs, it may well be that these simply aren't feasibly fixable without a total rewrite.
So the problem then is, just who is using truecrypt? Business-oriented editions of windows support bitlocker, so corporate/govt customers will tend to be using a supported/certified system. The only people for whom truecrypt is indispensible is those who need a cross-platform encrypted container - a niche market indeed, when in most use cases an encrypted ZIP/RAR file is more easily handled. The other people using truecrypt will tend to be home users, who rarely are willing to donate for the cost of the software.
I suspect that the developers simply lost interest or found the bug fixes simply too hard - and without any money coming in via donations, they decided that it wasn't worth continuing.
Sure it is. The pen trap order was for a specific account. Lavabit refused to provide it, and then provided only encrypted information. So they got a warrant for the SSL key. Just because the key opens a bunch of other stuff too doesn't mean they are not allowed to use it to open stuff covered by the pen trap order. In applying for it they agreed it would only be used to access the information sought.
Look, I get that lots of people don't like it. But the law is actually pretty clear here. With probable cause for a warrant an email provider can be required to provide the contents of an account. If the contents are encrypted they can be required to decrypt it. And just because Lavabit setup their system so that the only way they could comply was by handing over the SSL key doesn't mean they don't still have to comply.
https://s3.amazonaws.com/s3.documentcloud.org/documents/1114251/lavabit-usca4-op.pdf
http://www.theguardian.com/commentisfree/2014/may/20/why-did-lavabit-shut-down-snowden-email
I guess it depends on who do you believe more. Feds say they only wanted metadata and only for specific person. Levison says they wanted access to all customer data from the get go. Given the past history I wouldn't trust NSA/feds on this matter.
http://www.theguardian.com/commentisfree/2014/may/20/why-did-lavabit-shut-down-snowden-email
I guess it depends on who do you believe more. Feds say they only wanted metadata and only for specific person. Levison says they wanted access to all customer data from the get go. Given the past history I wouldn't trust NSA/feds on this matter.
Shoot, this is the problem with forks and splinters, some dork on tcNext (Truecrypt.ch) forums already declares that he is going to bring GeekCrypt forth. I expect the tree to look like Linux pretty quick:It looks like this will be the rally point for those who want to possibly fork TrueCrypt into a full OSS project. Two guys in Switzerland are organizing this.
http://truecrypt.ch/
I expect the tree to look like Linux pretty quick
Bitlocker is a fine choice for most people. It's not a bad recommendation. It's going to keep almost anyone out of your stuff. If you have something to hide or are breaking the law, then it might not be the best choice in case it does have a backdoor.Any updates on this story? I find it fascinating. The simplest solution (the developers just being done with it) sounds fine but it doesn't explain recommending bitlocker (which is closed source and almost certainly compromised) or any other closed source product. It would have made much more sense to just say "look, we've taken this as far as we want to, we're done, and be advised that there could be issues with security of this product since it's not being maintained anymore". That would have made perfect sense. Pushing bitlocker or some other (likely) compromised product smells like a warrant canary, but that's just pure speculation.
I will continue to use tc 7.1a unless anything significant is found in the audit. I don't mind paying for a product either, but only if it is open source -- I don't think it makes sense to trust anyone with encryption unless it's transparent (open).
You would use manage-bde, the command line tool. No idea why it's not included in the GUI.Bitlockers a bit lacking to me.
How do I relock a drive after unlocking it?
Bitlockers a bit lacking to me.
How do I relock a drive after unlocking it?
Yeah it's astoundingly unuserfriendly for a Microsoft product.You would use manage-bde, the command line tool. No idea why it's not included in the GUI.
So for example:
manage-bde -lock d:
You can also get info on the drive as well.
manage-bde -status
Normally used on Server-Core installs, but works in Windows 7/8 aswell.
Just one particular internal HDD.Best if you have a tpm module present. but, what sort of drive, a flash drive? external hdd? simply disconnect it and it's locked.
Yeah it's astoundingly unuserfriendly for a Microsoft product.
Just one particular internal HDD.
