![]() But The Register is reporting that the most recent version of TrueCrypt appears compromised. He said that he had attempted to contact the developers, and not heard back from them yet. The ‘problem’ with Truecrypt is the same problem we have with any popular security software in the post-September-5 era: we don’t know what to trust anymore.We have hard evidence that the NSA is tampering with encryption software and hardware, and common sense tells us that NSA is probably not alone. Matthew Green, who teaches cryptoanalysis at Johns Hopkins and who worked on the audit, tweeted that he thought the change was a legitimate exit on the part of the developer, and not a hack. ![]() Otherwise, iSec said it “found no evidence of backdoors or intentional flaws”. iSec, the firm that did the audit, found 11 flaws, but none that were immediately exploitable. The move was especially puzzling, given that TrueCrypt, a popular security choice for PCWorld users for several years, had recently passed the first round of a security audit. (Note: BitLocker is ony available in the Windows 7 Pro and Ultimate Editions, as well as Windows 8.1 Pro and Windows 8.1 Enterprise, making this a solution of limited use, reader Wesley Novack points out.) The page then goes on to describe how users should migrate their data from TrueCrypt to an encrypted BitLocker drive.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |