Knowledge (XXG)

TrueCrypt

Source 📝

323:. TrueCrypt Team member David Tesařík stated that Le Roux informed the team that there was a legal dispute between himself and SecurStar, and that he received legal advisement not to comment on any issues of the case. Tesařík concluded that should the TrueCrypt Team continue distributing TrueCrypt, Le Roux may ultimately be held liable and be forced to pay consequent damages to SecurStar. To continue in good faith, he said, the team would need to verify the validity of the E4M license. However, because of Le Roux's need to remain silent on the matter, he was unable to confirm or deny its legitimacy, keeping TrueCrypt development in limbo. 845:, a malicious person needs physical access to the user's TrueCrypt-encrypted hard disk: in this context this is needed to modify the user's TrueCrypt MBR with that of the Stoned bootkit and then place the hard disk back on the unknowing user's PC, so that when the user boots the PC and types his/her TrueCrypt password on boot, the "Stoned" bootkit intercepts it thereafter because, from that moment on, the Stoned bootkit is loaded before TrueCrypt's MBR in the boot sequence. The first type of attack can be prevented as usual by good security practices, e.g. avoid running non-trusted 632:, and others store information on unencrypted disks, which might compromise TrueCrypt's plausible deniability. The study suggested the addition of a hidden operating system functionality; this feature was added in TrueCrypt 6.0. When a hidden operating system is running, TrueCrypt also makes local unencrypted filesystems and non-hidden TrueCrypt volumes read-only to prevent data leaks. The security of TrueCrypt's implementation of this feature was not evaluated because the first version of TrueCrypt with this option had only recently been released. 4278: 230: 1172:...it is not at all appropriate for to describe itself as "open source". This use of the term "open source" to describe something under a license that's not only unapproved by OSI but known to be subject to issues is unacceptable. ... As OSI director and open source expert Karl Fogel said, "The ideal solution is not to have them remove the words 'open source' from their self-description, but rather for their software to be under an OSI-approved open source license." 862:(TPM) cannot be relied upon for security, because if the attacker has physical or administrative access to the computer and you use it afterwards, the computer could have been modified by the attacker e.g. a malicious component—such as a hardware keystroke logger—could have been used to capture the password or other sensitive information. Since the TPM does not prevent an attacker from maliciously modifying the computer, TrueCrypt will not support the TPM. 1014:. Contents of the drive were encrypted by TrueCrypt, which authorities said "renders the material extremely difficult to access". Detective Superintendent Caroline Goode stated the hard drive contained around 60 gigabytes of data, "of which only 20 have been accessed to date." She further stated the process to decode the material was complex and "so far only 75 documents have been reconstructed since the property was initially received." 5652: 4710: 37: 903:, Steven Barnhart wrote to an email address for a TrueCrypt Foundation member he had used in the past and received several replies from "David". According to Barnhart, the main points of the email messages were that the TrueCrypt Foundation was "happy with the audit, it didn't spark anything", and that the reason for the announcement was that "there is no longer interest ." 5662: 657:
message to misdirect an observer such as, "Non-system disk" or "disk error"), these reduce the functionality of the TrueCrypt boot loader and do not hide the content of the TrueCrypt boot loader from offline analysis. Here again, the use of a hidden operating system is the suggested method for retaining deniability.
368:(GPL). However, given the wide range of components with differing licenses making up the software, and the contested nature of the legality of the program's release, a few weeks later on 21 June, version 2.1 was released under the original E4M license to avoid potential problems relating to the GPL license. 413:, and that Linux and OS X had similar built-in solutions, which the message states renders TrueCrypt unnecessary. The page recommends any data encrypted by TrueCrypt be migrated to other encryption setups and offered instructions on moving to BitLocker. The SourceForge project page for the software at 648:
to attempt to identify TrueCrypt volumes. Although these features give reason to suspect a file to be a TrueCrypt volume, there are, however, some programs which exist for the purpose of securely erasing files by employing a method of overwriting file contents, and free disk space, with purely random
1192:
28 May 2014 announcement of discontinuation of TrueCrypt also came with a new version 7.2 of the software. Among the many changes to the source code from the previous release were changes to the TrueCrypt License — including removal of specific language that required attribution of TrueCrypt as well
963:
TrueCrypt user could not be compelled to decrypt several of his hard drives. The court's ruling noted that FBI forensic examiners were unable to get past TrueCrypt's encryption (and therefore were unable to access the data) unless Doe either decrypted the drives or gave the FBI the password, and the
1196:
Cryptographer Matthew Green, who had help raise funds for TrueCrypt's audit noted a connection between TrueCrypt's refusal to change the license and their departure-time warning. "They set the whole thing on fire, and now maybe nobody is going to trust it because they'll think there's some big evil
1048:
asking the court to allow them to retain possession of Miranda's belongings. The grounds for the request were that they could not break the encryption, and were only able to access 75 of the documents that he was carrying, which Greenwald said "most of which were probably ones related to his school
849:
with administrative privileges. The second one can be successfully neutralized by the user if he/she suspects that the encrypted hard disk might have been physically available to someone he/she does not trust, by booting the encrypted operating system with TrueCrypt's Rescue Disk instead of booting
698:
was found to be similar regardless of whether mid-range or state-of-the-art hardware is in use, and this impact was "quite acceptable". In another article the performance cost was found to be unnoticeable when working with "popular desktop applications in a reasonable manner", but it was noted that
315:
from SecurStar as an employee. It was further stated that Le Roux illegally distributed E4M, and authored an illegal license permitting anyone to base derivative work on the code and distribute it freely. Hafner alleges all versions of E4M always belonged only to SecurStar, and Le Roux did not have
749:
TrueCrypt stores its keys in RAM; on an ordinary personal computer the DRAM will maintain its contents for several seconds after power is cut (or longer if the temperature is lowered). Even if there is some degradation in the memory contents, various algorithms can intelligently recover the keys.
615:
The TrueCrypt documentation lists many ways in which TrueCrypt's hidden volume deniability features may be compromised (e.g. by third-party software which may leak information through temporary files, thumbnails, etc., to unencrypted disks) and possible ways to avoid this. In a paper published in
174:
English, Arabic, Basque, Belarusian, Bulgarian, Burmese, Catalan, Chinese (Simplified), Chinese (Hong Kong), Chinese (Taiwan), Czech, Danish, Dutch, Estonian, Finnish, French, Georgian, German, Greek, Hungarian, Indonesian, Italian, Japanese, Korean, Latvian, Norwegian (Nynorsk), Persian, Polish,
656:
replaces the normal boot loader, an offline analysis of the drive can positively determine that a TrueCrypt boot loader is present and so lead to the logical inference that a TrueCrypt partition is also present. Even though there are features to obfuscate its purpose (i.e. displaying a BIOS-like
306:
Original release of TrueCrypt was made by anonymous developers called "the TrueCrypt Team". Shortly after version 1.0 was released in 2004, the TrueCrypt Team reported receiving email from Wilfried Hafner, manager of SecurStar, a computer security company. According to the TrueCrypt Team, Hafner
895:
Cryptography Services. This audit "found no evidence of deliberate backdoors, or any severe design flaws that will make the software insecure in most instances". The French National Agency for the Security of Information Systems (ANSSI) stated that while TrueCrypt 6.0 and 7.1a have previously
762:
TrueCrypt documentation states that TrueCrypt is unable to secure data on a computer if an attacker physically accessed it and TrueCrypt is used on the compromised computer by the user again (this does not apply to a common case of a stolen, lost, or confiscated computer). The attacker having
643:
When analyzed, TrueCrypt volumes appear to have no header and contain random data. TrueCrypt volumes have sizes that are multiples of 512 due to the block size of the cipher mode and key data is either 512 bytes stored separately in the case of system encryption or two 128 kB headers for
1200:
On 16 June 2014, the only alleged TrueCrypt developer still answering email replied to a message by Matthew Green asking for permission to use the TrueCrypt trademark for a fork released under a standard open source license. Permission was denied, which led to the two known forks being named
877:
A crowdfunding campaign attempting to conduct an independent security audit of TrueCrypt was successfully funded in October 2013. A non-profit organization called the Open Crypto Audit Project (OCAP) was formed, calling itself "a community-driven global initiative which grew out of the first
729:) can damage the TrueCrypt bootloader on Windows partitions/drives encrypted by TrueCrypt and render the drive unbootable. This is caused by the inappropriate design of FlexNet Publisher writing to the first drive track and overwriting whatever non-Windows bootloader exists there. 783:, allowing the attacker to capture unencrypted data (including encryption keys and passwords), or to decrypt encrypted data using captured passwords or encryption keys. Therefore, physical security is a basic premise of a secure system. Attacks such as this are often called " 1164:(OSI)'s license-discuss mailing list in October 2013 suggests that the TrueCrypt License has made progress towards compliance with the Open Source Definition but would not yet pass if proposed for certification as Open Source software. According to current OSI president 409:, which warned that the software may contain unfixed security issues, and that development of TrueCrypt was ended in May 2014, following Windows XP's end of support. The message noted that more recent versions of Windows have built-in support for disk encryption using 882:
of the widely used encryption software TrueCrypt". The organization established contact with TrueCrypt developers, who welcomed the audit. Phase I of the audit was successfully completed on 14 April 2014, finding "no evidence of backdoors or malicious code".
1104:
into a US department or agency computer and one count of conspiring to do the same. The government confiscated all of his electronics and demanded he provide them with the necessary keys to decrypt the devices. Love refused. On 10 May 2016 a District Judge
890:
One day after TrueCrypt's end of life announcement, OCAP confirmed that the audit would continue as planned, with Phase II expected to begin in June 2014 and wrap up by the end of September. The Phase II audit was delayed, but was completed 2 April 2015 by
334:, another free encryption program. The company states that with those products, SecurStar "had a long tradition of open source software", but that "competitors had nothing better to do but to steal our source code", causing the company to make its products 275:
and recommended users find alternative solutions. Though development of TrueCrypt has ceased, an independent audit of TrueCrypt (published in March 2015) has concluded that no significant flaws are present. Two projects forked from TrueCrypt:
1145:, under the "TrueCrypt License," which is unique to the TrueCrypt software. As of version 7.1a (the last full version of the software, released Feb 2012), the TrueCrypt License was version 3.0. It is not part of the panoply of widely used 1128:
The special prosecutor said the hidden volumes were especially difficult to deal with. He decrypted some of encrypted files by trying words and phrases the druking group had used elsewhere as parts of the passphrase in order to make
326:
Thereafter, would-be visitors reported trouble accessing the TrueCrypt website, and third-party mirrors appeared online making the source code and installer continually available, outside of official sanction by the TrueCrypt Team.
427:
posted an announcement titled "Yes... TrueCrypt is still safe to use" and a Final Release Repository to host the last official non-crippled version 7.1a of TrueCrypt. They no longer host the final release repository as of 2022.
935:, who was suspected of financial crimes. The Brazilian National Institute of Criminology (INC) tried unsuccessfully for five months to obtain access to his files on the TrueCrypt-protected disks. They enlisted the help of the 3728: 3763: 608:, by allowing a single "hidden volume" to be created within another volume. In addition, the Windows versions of TrueCrypt have the ability to create and run a hidden encrypted operating system whose 677:
read/write operations (a form of asynchronous processing) to reduce the performance hit of encryption and decryption. On newer processors supporting the AES-NI instruction set, TrueCrypt supports
2400:
Piccinelli, Mario, and Paolo Gubian. "Detecting Hidden Encrypted Volume Files via Statistical Analysis." International Journal of Cyber-Security and Digital Forensics (IJCSDF) 3.1 (2014): 30-37.
754:(which would apply in particular to a notebook computer obtained while in power-on, suspended, or screen-locked mode), has been successfully used to attack a file system protected by TrueCrypt. 420:
Initially, the authenticity of the announcement and new software was questioned. Multiple theories attempting to explain the reason behind the announcement arose throughout the tech community.
1109:) rejected a request by the NCA that Love be forced to turn over his encryption keys or passwords to TrueCrypt files on an SD card and hard drives that were among the confiscated property. 577:
with older volumes using LRW mode and CBC mode. Later versions produce a security warning when mounting CBC mode volumes and recommend that they be replaced with new volumes in XTS mode.
1022:
contributor Naomi Colvin concluded the statements were misleading, stating that it was possible Goode was not even referring to any actual encrypted material, but rather deleted files
3503: 4690: 4520: 3571: 1240:
was registered in the US by a person named David Tesarik. The TrueCrypt Foundation non-profit organization last filed tax returns in 2010, and the company was dissolved in 2014.
649:
data (i.e. "shred" & "scrub"), thereby creating reasonable doubt to counter pointed accusations declaring a file, made of statistically random data, to be a TrueCrypt file.
1146: 417:
was updated to display the same initial message, and the status was changed to "inactive". The page also announced a new software version, 7.2, which only allows decryption.
3549: 1007: 4750: 906:
According to a study released 29 September 2015, TrueCrypt includes two vulnerabilities in the driver that TrueCrypt installs on Windows systems allowing an attacker
3637: 2855: 741:. To prevent those, the documentation distributed with TrueCrypt requires users to follow various security precautions. Some of those attacks are detailed below. 4373: 3963: 3936: 2886: 635:
There was a functional evaluation of the deniability of hidden volumes in an earlier version of TrueCrypt by Schneier et al. that found security leaks.
2487: 4131: 1106: 298:(Encryption for the Masses). Several versions and many additional minor releases have been made since then, with the most current version being 7.1a. 2029: 837:
Two types of attack scenarios exist in which it is possible to maliciously take advantage of this bootkit: in the first one, the user is required to
467:(not supported) and Mac OS X 10.6 Snow Leopard (runs as a 32-bit process). The version for Windows 7, Windows Vista, and Windows XP can encrypt the 2361: 652:
If a system drive, or a partition on it, has been encrypted with TrueCrypt, then only the data on that partition is deniable. When the TrueCrypt
4238: 3155: 874:
published a detailed online report, in which he states that he has confirmed the integrity of the distributed Windows binaries of version 7.1a.
5269: 1249: 830:
encryption software is affected by this kind of attack if the encryption software does not rely on hardware-based encryption technologies like
2663: 1842: 5716: 3124: 1761: 1704: 4894: 4743: 4101: 3444: 2513:
I use pre-boot authentication. Can I prevent a person (adversary) that is watching me start my computer from knowing that I use TrueCrypt?
1512: 681:
to further improve performance. The performance impact of disk encryption is especially noticeable on operations which would normally use
5721: 5025: 3579: 2826: 1081: 3357: 2797: 5726: 5444: 4075: 3319: 3101: 1547: 1491: 3519: 2901: 2388: 5499: 4366: 3293: 2924: 1927: 2330: 2239: 5711: 5691: 5665: 2410: 345:
Le Roux himself has denied developing TrueCrypt in a court hearing in March 2016, in which he also confirmed he had written E4M.
5696: 5655: 4736: 3376:"oss-sec: CVE-2016-1281: TrueCrypt and VeraCrypt Windows installers allow arbitrary code execution with elevation of privilege" 2952: 822:
Technical Security Conference USA 2009, has been shown capable of tampering TrueCrypt's MBR, effectively bypassing TrueCrypt's
559: 3323: 570:
in versions 4.0 and earlier. XTS mode is thought to be more secure than LRW mode, which in turn is more secure than CBC mode.
5701: 4569: 2300: 4212: 964:
court then ruled that Doe's Fifth Amendment right to remain silent legally prevented the Government from making them do so.
1621: 1584: 737:
TrueCrypt is vulnerable to various known attacks which are also present in other disk encryption software releases such as
319:
This led the TrueCrypt Team to immediately stop developing and distributing TrueCrypt, which they announced online through
3669: 3647: 2711: 1605: 954: 841:
the bootkit with administrative privileges once the PC has already booted into Windows; in the second one, analogously to
3242: 1641: 616:
2008 and focused on the then latest version (v5.1a) and its plausible deniability, a team of security researchers led by
4990: 4965: 4359: 3543: 2154: 1730: 1281: 932: 516: 5571: 2863: 2633: 2600: 2360:
Alexei Czeskis; David J. St. Hilaire; Karl Koscher; Steven D. Gribble; Tadayoshi Kohno; Bruce Schneier (18 July 2008).
357:
from that of the original TrueCrypt Team, with the developers now being referred to as "the TrueCrypt Foundation." The
5615: 4975: 4685: 4640: 4453: 4336: 3870: 3830: 3729:"Hacker Charged with Breaching Multiple Government Computers and Stealing Thousands of Employee and Financial Records" 3331: 2601:"Freeze when you reboot a Windows system that has TrueCrypt Disk Encryption software and Adobe applications installed" 900: 776: 532: 531:
algorithms are available: AES-Twofish, AES-Twofish-Serpent, Serpent-AES, Serpent-Twofish-AES and Twofish-Serpent. The
424: 79: 2121: 1176:
As a result of its questionable status with regard to copyright restrictions and other potential legal issues, major
896:
attained ANSSI certification, migration to an alternate certified product is recommended as a precautionary measure.
3967: 2440: 4564: 3740: 1453: 1101: 979: 973: 365: 175:
Portuguese (Brazil), Russian, Slovak, Slovenian, Spanish, Swedish, Turkish, Ukrainian, Uzbek (Cyrillic), Vietnamese
1531: 5369: 5005: 4680: 3932: 3008: 2547: 2362:"Defeating Encrypted and Deniable File Systems: TrueCrypt v5.1a and the Case of the Tattling OS and Applications" 1165: 685:(DMA), as all data must pass through the CPU for decryption, rather than being copied directly from disk to RAM. 289: 2767: 2495: 5706: 5605: 5509: 5479: 5174: 4952: 4851: 4670: 4660: 4515: 4049: 4024: 3988: 3810: 3053: 2697: 1150: 907: 544: 339: 187: 109: 3889: 1377: 3764:"Judge Rejects Attempt To Force Lauri Love To Decrypt His Computers, Despite Never Charging Him With A Crime" 1568: 1475: 1193:
as a link to the official website to be included on any derivative products — forming a license version 3.1.
850:
it directly from the hard disk. With the rescue disk, the user can restore TrueCrypt's MBR to the hard disk.
644:
non-system containers. Forensics tools may use these properties of file size, apparent lack of a header, and
5600: 5469: 5339: 5055: 4665: 4655: 4458: 4418: 4411: 4401: 4396: 3874: 3858: 1399: 859: 831: 265: 3267: 834:, or if the attack is made with administrative privileges while the encrypted operating system is running. 5686: 5627: 5620: 5459: 5234: 4406: 3394: 3035: 2574: 1960: 1161: 1121:
in South Korea, the special prosecutor decrypted some of the files encrypted by TrueCrypt by guessing the
1061: 563: 3049: 2671: 5632: 4713: 4559: 4505: 4036: 3216: 3189: 1154: 1097: 838: 695: 605: 567: 253: 2745: 2372: 4840: 4675: 4599: 2605: 2073: 1885: 911: 871: 823: 795:
TrueCrypt documentation states that TrueCrypt cannot secure data on a computer if it has any kind of
682: 674: 335: 3468: 2977: 5424: 4912: 4830: 4820: 4815: 4759: 4438: 1617: 1580: 1543: 1487: 1003: 991: 819: 678: 609: 593: 574: 528: 362: 261: 182: 2529: 1076:. His computer, encrypted with TrueCrypt, was seized, and DeSilva refused to reveal the password. 229: 5414: 5219: 5209: 4544: 4528: 4475: 2938: 1693: 1613: 1576: 1539: 1483: 1177: 1077: 842: 812: 330:
In the FAQ section of its website, SecurStar maintains its claims of ownership over both E4M and
4105: 2074:"[dm-devel] [PATCH 2/2] dm-crypt: Add TCW IV mode for old CBC TCRYPT containers" 3916: 1935: 1901: 353:
Months later on 7 June 2004, TrueCrypt 2.0 was released. The new version contained a different
5182: 5063: 4810: 4795: 4604: 4594: 4465: 3904: 3643: 1792: 1069: 1031: 940: 887:, one of the auditors, added "I think it's good that we didn't find anything super critical." 714: 708: 690: 354: 257: 117: 2338: 5154: 4539: 4097: 3814: 3474: 2418: 1609: 1572: 1535: 1479: 1142: 987: 884: 784: 751: 666: 520: 358: 249: 243: 203: 194: 124: 36: 3499: 2191:. Institute for Computer Languages, Theory and Logic Group, Vienna University of Technology 1818: 1416: 5474: 5404: 5334: 5263: 5229: 5214: 5126: 5093: 5068: 4187: 4000: 3842: 3701: 3601: 3523: 3516: 1985: 983: 827: 726: 718: 670: 645: 432: 382: 2247: 2008:"Fedora Review Request: tcplay - Utility to create/open/map TrueCrypt-compatible volumes" 1793:"TrueCrypt, encryption tool used by Snowden, shuts down due to alleged 'security issues'" 3079: 2308: 5164: 4960: 4614: 4534: 4495: 4443: 4428: 4277: 3736: 3614: 3607:
Greenwald: UK's Detention of My Partner Was Incredibly Menacing Bid to Stop NSA Reports
3539: 2741: 2693: 2185: 1130: 1041: 1036: 1011: 995: 629: 625: 617: 3696: 3605: 2210: 2095: 931:
In July 2008, several TrueCrypt-secured hard drives were seized from Brazilian banker
5680: 5610: 5409: 5083: 4695: 4650: 4609: 4589: 4485: 4448: 4423: 4141: 4012: 3893: 3185: 3165: 3134: 2719: 2611: 2007: 1872: 1852: 1771: 1181: 1023: 879: 768: 722: 621: 480: 2030:"index : kernel/git/stable/linux-stable.git - path: root/drivers/md/dm-crypt.c" 1820:
TrueCrypt considered HARMFUL – downloads, website meddled to warn: 'It's not secure'
5349: 5141: 4904: 4767: 4645: 4490: 4480: 4470: 4433: 4382: 4332: 4308: 4136: 3831:
http://www.yonhapnews.co.kr/bulletin/2018/07/18/0200000000AKR20180718142500004.HTML
3674: 3335: 3160: 3129: 2162: 1847: 1766: 1672: 1329: 1285: 1205:
and CipherShed as well as a re-implementation named tc-play rather than TrueCrypt.
1018: 308: 2641: 1352: 2978:"Some encryption programs use TPM to prevent attacks. Will TrueCrypt use it too?" 2269: 943:
against Dantas' disks for over 12 months, but were still unable to decrypt them.
5439: 5359: 5304: 5224: 4624: 3470:
Forcing Defendant to Decrypt Hard Drive Is Unconstitutional, Appeals Court Rules
3195: 2129: 1734: 694:, although TrueCrypt is slower compared to an unencrypted disk, the overhead of 653: 375: 312: 4132:"Following TrueCrypt's bombshell advisory, developer says fork is "impossible"" 2444: 2051: 799:
installed. Malware may log keystrokes, thus exposing passwords to an attacker.
5545: 5489: 5419: 5294: 5289: 5239: 5204: 5197: 5159: 5149: 5088: 4874: 4785: 4775: 4584: 4554: 4549: 4510: 4317: 4076:"TrueCrypt Goes the Way of Lavabit as Developers Shut it Down Without Warning" 3798: 3417: 1649: 1122: 1093: 1065: 846: 536: 47: 3191:
Mysterious announcement from Truecrypt declares the project insecure and dead
1738: 596:
and 1000 or 2000 iterations, depending on the underlying hash function used.
5386: 5376: 5354: 5319: 5284: 5279: 5192: 5098: 5000: 4932: 4869: 4780: 4574: 4312: 3942: 3423: 1202: 1045: 1027: 915: 892: 764: 763:
physical access to a computer can, for example, install a hardware/software
738: 410: 331: 277: 148: 3846: 3446:
Court: Fifth Amendment Protects Suspects from Having to Decrypt Hard Drives
3036:"How I compiled TrueCrypt 7.1a for Win32 and matched the official binaries" 2775: 585:
The header key and the secondary header key (XTS mode) are generated using
294:
TrueCrypt was initially released as version 1.0 in February 2004, based on
3639:'True Crypt' Encryption Software Stumps MCSO Detectives in Child-Porn Case 3375: 2955:. TrueCrypt Foundation mail in response to Peter Kleissner on 18 July 2009 5561: 5535: 5464: 5324: 5314: 5299: 5244: 5121: 5073: 5040: 5015: 4995: 4980: 4825: 4790: 4728: 4619: 4579: 4050:"truecrypt-archive/License-v3.1.txt at master · DrWhax/truecrypt-archive" 3885: 3875:
http://news.tvchosun.com/site/data/html_dir/2018/07/18/2018071890102.html
3859:
http://www.alphr.com/features/371158/top-ten-password-cracking-techniques
3768: 3300:. Agence nationale de la sécurité des systèmes d'information. 2 June 2014 2491: 1385: 1073: 959: 556: 491: 406: 246: 206: 154: 17: 3009:"TrueCrypt Foundation is a joke to the security industry, pro Microsoft" 1843:"Bombshell TrueCrypt advisory: Backdoor? Hack? Hoax? None of the above?" 435:. Their exclusion policy says they exclude pages at site owner request. 256:(OTFE). It can create a virtual encrypted disk within a file, encrypt a 5584: 5579: 5530: 5344: 5078: 5045: 5035: 5010: 4970: 4942: 4922: 4864: 4805: 4799: 3794: 3773: 2466: 1118: 815: 808: 796: 780: 540: 524: 468: 464: 444: 141: 129: 3938:
TrueCrypt or false? Would-be open source project must clean up its act
3156:"TrueCrypt security audit presses on, despite developers jumping ship" 3012: 1436: 1184:: TrueCrypt is not included with Debian, Ubuntu, Fedora, or openSUSE. 463:
versions of these operating systems are supported, except for Windows
338:, forcing potential customers to place a substantial order and sign a 5637: 5484: 5394: 5030: 4985: 4937: 4889: 4500: 4342: 4321: 3826: 1762:""TrueCrypt is not secure," official SourceForge page abruptly warns" 1421: 999: 586: 512: 460: 456: 320: 4271: 3125:"TrueCrypt audit finds "no evidence of backdoors" or malicious code" 2052:"dm-crypt: Linux kernel device-mapper crypto target - IV generators" 1307: 307:
claimed in the email that the acknowledged author of E4M, developer
218: 4289: 2985: 1225:
and a trademark on the "key" logo was registered under the name of
918:, but it remains unpatched in TrueCrypt's unmaintained installers. 914:
via DLL hijacking. In January 2016, the vulnerability was fixed in
573:
Although new volumes can only be created in XTS mode, TrueCrypt is
113: 5540: 5514: 5454: 5429: 5187: 5131: 5116: 5020: 4927: 4884: 4879: 4859: 4326: 1513:"The Strange Origins of TrueCrypt, ISIS's Favored Encryption Tool" 484: 452: 448: 137: 133: 271:
On 28 May 2014, the TrueCrypt website announced that the project
5329: 5108: 3964:"TrueCrypt license (not OSI-approved; seeking history, context)" 3572:"#Miranda: Where is the UK Government getting its numbers from?" 818:
presented by Austrian software developer Peter Kleissner at the
479:
There is an independent, compatible implementation, tcplay, for
4732: 4355: 2508: 1026:
from unencrypted, unallocated space on the hard drive, or even
371:
Version 2.1a of the software was released on 1 October 2004 on
5399: 5309: 4917: 3706: 3057: 974:
David Miranda (politician) § Global surveillance activism
936: 772: 590: 295: 4283: 4161: 2953:"Stoned bootkit attacking TrueCrypt's full volume encryption" 2467:"diskscrub - disk overwrite utility - Google Project Hosting" 2902:"TrueCrypt vs Peter Kleissner, Or Stoned BootKit Revisited." 1476:"P. Le Roux (author of E4M) accused by W.Hafner (SecurStar)" 1006:
said to be containing sensitive documents pertaining to the
4343:
Partial mirror of the original TrueCrypt 7.1a online manual
4295: 1034:. Greenwald supported this assessment in an interview with 378:. By May 2005, the original TrueCrypt website returned and 3358:"Newly found TrueCrypt flaw allows full system compromise" 431:
Truecrypt.org has been excluded from the Internet Archive
4286:– non-profit organization promoting an audit of TrueCrypt 3989:
Tom Callaway of Red Hat about TrueCrypt licensing concern
3815:
http://news.mk.co.kr/newsRead.php?year=2018&no=538301
858:
The FAQ section of the TrueCrypt website states that the
423:
Shortly after the end of life announcement of TrueCrypt,
4037:
non-OSI compliant packages in the openSUSE Build Service
2698:"Lest We Remember: Cold Boot Attacks on Encryption Keys" 2535:(7.1a ed.). TrueCrypt Foundation. 7 February 2012. 1060:
In February 2014, an Arizona Department of Real Estate
4521:
Cryptographically secure pseudorandom number generator
342:
before being allowed to review the code for security.
2939:"Windows-Hacking: TrueCrypt Verschlüsselung umgangen" 27:
Discontinued source-available disk encryption utility
4347: 3324:"And then the TrueCrypt developers were heard from!" 3294:"Possible abandon de TrueCrypt par ses développeurs" 2389:
Schneier, UW Team Show Flaw In TrueCrypt Deniability
1064:
department employee, James DeSilva, was arrested on
5593: 5570: 5554: 5523: 5498: 5438: 5385: 5262: 5173: 5140: 5107: 5054: 4951: 4903: 4850: 4839: 4766: 4633: 4389: 2552:
System Encryption: BitLocker And TrueCrypt Compared
1928:"Operating Systems Supported for System Encryption" 703:
Incompatibility with FlexNet Publisher and SafeCast
494:module included in default Linux kernel supports a 213: 193: 181: 160: 147: 123: 105: 78: 56: 46: 2211:"Header Key Derivation, Salt, and Iteration Count" 1417:"CipherShed/SRC at master · CipherShed/CipherShed" 3534: 3532: 2887:"The dark side of open source software is Stoned" 1276: 1274: 1272: 1270: 1268: 1266: 1264: 3697:"Briton Lauri Love faces new US hacking charges" 2834:Black Hat Technical Security Conference USA 2009 2805:Black Hat Technical Security Conference USA 2009 1642:"Is the source code of your software available?" 1084:were unable to gain access to his stored files. 1072:through the sharing of explicit images over the 709:FlexNet Publisher § Issues with bootloaders 397:On 28 May 2014, the TrueCrypt official website, 4188:"77165797 - Markeninformation USPTO - via tmdb" 3670:"Briton Lauri Love faces hacking charges in US" 3545:UK asked N.Y. Times to destroy Snowden material 2925:"Bootkit hebelt Festplattenverschlüsselung aus" 527:. Additionally, five different combinations of 3102:"TrueCrypt Audit Endorsed by Development Team" 2972: 2970: 2746:""Evil Maid" Attacks on Encrypted Hard Drives" 2573:Schmid, Patrick; Roos, Achim (28 April 2010). 2546:Schmid, Patrick; Roos, Achim (28 April 2010). 2234: 2232: 498:target called "tcw" since Linux version 3.13. 316:any right to release it under such a license. 4744: 4367: 4213:"Entity Details - Secretary of State, Nevada" 2524: 2522: 2520: 2369:3rd USENIX Workshop on Hot Topics in Security 272: 199: 8: 4177:(search trademark directory for "TrueCrypt") 2032:. Kernel.org cgit. 20 January 2014. Line 241 1955: 1953: 1569:"Truecrypt for David T. from Truecrypt-Team" 1532:"Summary of current TrueCrypt situation...?" 1117:In the special prosecutor investigation for 4162:"Trademark Electronic Search System (TESS)" 3799:http://newspim.com/news/view/20180827000369 3247:A Few Thoughts on Cryptographic Engineering 3221:A Few Thoughts on Cryptographic Engineering 2295: 2293: 2291: 955:United States 11th Circuit Court of Appeals 717:or SafeCast (which are used for preventing 713:Installing third-party software which uses 4847: 4751: 4737: 4729: 4374: 4360: 4352: 4348: 4276: 3927: 3925: 3809:특검 "김경수, 킹크랩 개발·운영 허락...댓글 8800만건 조작 관여", 3050:"Welcome to the Open Crypto Audit Project" 2331:"Security Requirements for Hidden Volumes" 1092:In October 2013, British–Finnish activist 228: 35: 31: 1980: 1978: 1896: 1894: 1703:. TrueCrypt Foundation. 7 February 2005. 1160:Discussion of the licensing terms on the 3917:Various Licenses and Comments about Them 3847:http://voda.donga.com/3/all/39/1394189/1 3841:"드루킹 댓글조작 1/3 암호...FBI도 못 푸는 트루크립트 사용", 2149: 2147: 1469: 1467: 1465: 1463: 1461: 1353:"Applications/Kryptos - MorphOS Library" 1323: 1321: 1319: 1317: 3857:"Top ten password cracking techniques, 3395:"Brazilian banker's crypto baffles FBI" 3243:"Another update on the Truecrypt audit" 2856:"Bootkit bypasses hard disk encryption" 2664:"Security Requirements and Precautions" 2411:"TrueCrypt Volume Format Specification" 1260: 3793:'드루킹 특검' 종료..."수사 종료 자체 판단...외압 없었다", 3034:Xavier de Carné de Carnavalet (2013). 2984:. TrueCrypt Foundation. Archived from 2941:(in German). Gulli News. 30 July 2009. 2774:. TrueCrypt Foundation. Archived from 2718:. TrueCrypt Foundation. Archived from 2670:. TrueCrypt Foundation. Archived from 2640:. TrueCrypt Foundation. Archived from 2417:. TrueCrypt Foundation. Archived from 2337:. TrueCrypt Foundation. Archived from 2307:. TrueCrypt Foundation. Archived from 2246:. TrueCrypt Foundation. Archived from 2161:. TrueCrypt Foundation. Archived from 2128:. TrueCrypt Foundation. Archived from 1934:. TrueCrypt Foundation. Archived from 1384:. TrueCrypt Foundation. Archived from 1284:. TrueCrypt Foundation. Archived from 1250:Comparison of disk encryption software 1180:do not consider the TrueCrypt License 3268:"Truecrypt Phase Two Audit Announced" 2885:David M Williams (7 September 2009). 2186:"New Methods in Hard Disk Encryption" 1710:from the original on 30 December 2008 1331:TrueCrypt, the final release, archive 280:(active) and CipherShed (abandoned). 7: 5661: 3869:'FBI도 못 푼다'는 암호 풀자 드루킹 측근들 태도가 변했다, 3825:"드루킹 일당이 걸어둔 암호 풀어라"...특검, 전문가 총동원, 2862:. Heise Media UK Ltd. Archived from 2827:"Stoned bootkit Presentation Slides" 1701:TrueCrypt User's Guide, version 3.1a 1008:2013 global surveillance disclosures 604:TrueCrypt supports a concept called 3467:Kravets, David (24 February 2012), 3443:Palazzolo, Joe (23 February 2012), 3419:FBI hackers fail to crack TrueCrypt 3328:TrueCrypt Latest Release Repository 3241:Green, Matthew (18 February 2015). 2184:Fruhwirth, Clemens (18 July 2005). 1886:Wayback Machine General Information 1567:Carsten Krueger (7 February 2004). 1441:TrueCrypt User's Guide, version 1.0 1188:End of life and license version 3.1 535:available for use in TrueCrypt are 407:HTTP 301 "Moved Permanently" status 41:TrueCrypt on Windows (discontinued) 3668:Halliday, Josh (29 October 2013). 1604:Andraia Matrix (6 February 2004). 1474:TrueCrypt Team (3 February 2004). 566:in versions 4.1 through 4.3a, and 25: 4257:(search database for "TrueCrypt") 3962:Fontana, Richard (October 2013). 3011:. Peter Kleissner. Archived from 3007:Kleissner, Peter (21 July 2009). 2579:Protect Your Data With Encryption 1443:. TrueCrypt Team. 2 February 2004 1217:was registered under the name of 775:, or install any other malicious 5660: 5651: 5650: 4709: 4708: 4284:Open Crypto Audit Project (OCAP) 4001:Debian Bug report logs - #364034 3570:Colvin, Naomi (31 August 2013). 3552:from the original on 6 July 2014 3123:Farivar, Cyrus (14 April 2014), 1961:"DragonFly On-Line Manual Pages" 1817:McAllister, Neil (28 May 2014), 1791:O'Neill, Patrick (28 May 2014). 1231:TrueCrypt Developers Association 1223:TrueCrypt Developers Association 1082:Maricopa County Sheriff's Office 745:Encryption keys stored in memory 562:. Prior to this, TrueCrypt used 471:partition or entire boot drive. 401:, began redirecting visitors to 4003:. Accessed on: 12 January 2009. 3576:Extraordinary Popular Delusions 3215:Green, Matthew (2 April 2015). 1671:Ratliff, Evan (29 April 2016). 1511:Ratliff, Evan (30 March 2016). 878:comprehensive public audit and 4570:Information-theoretic security 3636:Stern, Ray (4 February 2014), 3578:. Auerfeld.com. Archived from 3416:Dunn, John E. (30 June 2010), 1153:(FSF) states that it is not a 1070:sexual exploitation of a minor 1002:. He was carrying with him an 870:In 2013 a graduate student at 673:and, under Microsoft Windows, 1: 3762:Masnick, Mike (10 May 2016). 3393:Leyden, John (28 June 2010). 3274:. NCC Group. 18 February 2015 3104:. Threatpost. 25 October 2013 3080:"The TrueCrypt Audit Project" 2900:Hunt, Simon (4 August 2009). 2860:The H-Security (H-Online.com) 2054:. cryptsetup. 11 January 2014 1902:"Supported Operating Systems" 1729:tc-foundation (28 May 2014). 1334:, Gibson Research Corporation 1328:Gibson, Steve (5 June 2014), 699:"power users will complain". 639:Identifying TrueCrypt volumes 555:TrueCrypt currently uses the 5717:Software that uses wxWidgets 4130:Goodin, Dan (19 June 2014), 4078:. Ibtimes.co.uk. 29 May 2014 4039:. Accessed on: 20 April 2009 4015:. Accessed on: 20 April 2009 3905:TrueCrypt Collective License 3888:. Accessed on: 21 May 2012 3613:(News broadcast). New York: 3500: 11–12268 & 11–15421 2798:"Stoned bootkit White Paper" 1530:David T. (7 February 2004). 1197:vulnerability in the code." 533:cryptographic hash functions 5616:Cryptographic hash function 4686:Message authentication code 4641:Cryptographic hash function 4454:Cryptographic hash function 4337:Gibson Research Corporation 4025:TrueCrypt licensing concern 3871:Chosun Broadcasting Company 3332:Gibson Research Corporation 3154:Goodin, Dan (30 May 2014), 2391:. Accessed on: 12 June 2012 1841:Goodin, Dan (29 May 2014), 1760:Goodin, Dan (28 May 2014), 1648:. SecurStar. Archived from 1606:"Unofficial TrueCrypt Site" 1400:"Open Crypto Audit Project" 1213:In 2007 a US trademark for 986:, was detained at London's 901:Gibson Research Corporation 515:supported by TrueCrypt are 475:Independent implementations 425:Gibson Research Corporation 62:; 20 years ago 5743: 5722:Assembly language software 4565:Harvest now, decrypt later 4027:Accessed on: 20 April 2009 3907:. Accessed on: 4 June 2014 3741:U.S. Department of Justice 2927:(in German). Heise Online. 1141:TrueCrypt was released as 971: 706: 366:GNU General Public License 287: 85:7.2 / May 28, 2014 5727:Windows security software 5646: 4704: 4681:Post-quantum cryptography 4351: 4290:IsTrueCryptAuditedYet.com 3517:United States v. John Doe 3495:United States v. John Doe 3449:, The Wall Street Journal 3054:Open Crypto Audit Project 2923:Uli Ries (30 July 2009). 2301:"Hidden Operating System" 1236:In 2009 the company name 1030:documents from Miranda's 948:United States v. John Doe 688:In a test carried out by 415:sourceforge.net/truecrypt 403:truecrypt.sourceforge.net 380:truecrypt.sourceforge.net 373:truecrypt.sourceforge.net 302:E4M and SecurStar dispute 290:TrueCrypt release history 168: 101: 74: 34: 5606:Timeline of cryptography 4671:Quantum key distribution 4661:Authenticated encryption 4516:Random number generation 3991:Accessed on 10 July 2009 3919:Free Software Foundation 3811:Maeil Business Newspaper 1731:"TrueCrypt project page" 1151:Free Software Foundation 1137:License and source model 1049:work and personal use". 982:, partner of journalist 908:arbitrary code execution 750:This method, known as a 679:hardware-accelerated AES 455:operating systems. Both 393:End of life announcement 361:was also changed to the 340:non-disclosure agreement 273:was no longer maintained 188:Disk encryption software 5712:Linux security software 5692:Cross-platform software 5601:Outline of cryptography 5572:Anti–computer forensics 4666:Public-key cryptography 4656:Symmetric-key algorithm 4459:Key derivation function 4419:Cryptographic primitive 4412:Authentication protocol 4402:Outline of cryptography 4397:History of cryptography 4298:– official fork website 4292:– website for the audit 3617:. Event occurs at 5:12 3522:15 January 2013 at the 3506: 23 February 2012). 2772:TrueCrypt Documentation 2716:TrueCrypt Documentation 2668:TrueCrypt Documentation 2638:TrueCrypt Documentation 2488:"Plausible Deniability" 2415:TrueCrypt Documentation 2335:TrueCrypt Documentation 2305:TrueCrypt Documentation 2274:TrueCrypt Documentation 2244:TrueCrypt Documentation 2240:"Plausible Deniability" 2215:TrueCrypt Documentation 2159:TrueCrypt Documentation 2126:TrueCrypt Documentation 2100:TrueCrypt Documentation 2096:"Encryption Algorithms" 1963:. DragonFly BSD Project 1932:TrueCrypt Documentation 1906:TrueCrypt Documentation 860:Trusted Platform Module 854:Trusted Platform Module 610:existence may be denied 266:pre-boot authentication 260:, or encrypt the whole 5697:Cryptographic software 5628:Homomorphic encryption 5621:List of hash functions 4760:Cryptographic software 4407:Cryptographic protocol 4239:"Truecrypt Foundation" 2748:. Schneier on Security 2530:"TrueCrypt User Guide" 2276:. TrueCrypt Foundation 2217:. TrueCrypt Foundation 2102:. TrueCrypt Foundation 1908:. TrueCrypt Foundation 1614:alt.security.scramdisk 1577:alt.security.scramdisk 1540:alt.security.scramdisk 1484:alt.security.scramdisk 1174: 1162:Open Source Initiative 1040:, mentioning that the 824:full volume encryption 87:; 10 years ago 5702:Discontinued software 5633:End-to-end encryption 4560:End-to-end encryption 4506:Cryptojacking malware 4102:"Here is the note..." 4013:Bug #109701 in Ubuntu 3272:Cryptography Services 1437:"Version Information" 1170: 1155:free software license 1098:National Crime Agency 972:Further information: 606:plausible deniability 600:Plausible deniability 254:on-the-fly encryption 4676:Quantum cryptography 4600:Trusted timestamping 3935:(15 November 2013), 3604:(6 September 2013). 2778:on 13 September 2012 2722:on 13 September 2012 2606:Adobe Creative Suite 2378:on 27 December 2008. 2341:on 17 September 2012 2155:"Modes of Operation" 1238:TrueCrypt Foundation 1229:with a company name 1221:with a company name 1147:open source licenses 1100:(NCA) on charges of 1096:was arrested by the 1080:detectives from the 1044:government filed an 927:Operation Satyagraha 912:privilege escalation 872:Concordia University 826:. Potentially every 803:The "Stoned" bootkit 696:real-time encryption 683:direct memory access 52:TrueCrypt Foundation 4439:Cryptographic nonce 2744:(23 October 2009). 2712:"Physical Security" 2634:"Incompatibilities" 2498:on 24 January 2013. 2250:on 26 February 2008 2165:on 4 September 2013 1673:"The Next Big Deal" 1388:on 5 December 2012. 1178:Linux distributions 1004:external hard drive 992:Metropolitan Police 843:hardware keyloggers 665:TrueCrypt supports 575:backward compatible 443:TrueCrypt supports 5220:Facebook Messenger 4545:Subliminal channel 4529:Pseudorandom noise 4476:Key (cryptography) 4166:tmsearch.uspto.gov 3970:on 29 October 2013 3709:. 27 February 2014 3542:(30 August 2013), 3217:"Truecrypt report" 2614:. 16 November 2009 1357:library.morph.zone 1107:Magistrate's Court 994:while en route to 978:On 18 August 2013 941:dictionary attacks 671:multi-core systems 551:Modes of operation 242:is a discontinued 60:February 2004 5674: 5673: 5524:Service providers 5258: 5257: 5064:Check Point VPN-1 4726: 4725: 4722: 4721: 4605:Key-based routing 4595:Trapdoor function 4466:Digital signature 4111:on 17 August 2014 4098:Green, Matthew D. 3886:TrueCrypt License 3644:Phoenix New Times 3015:on 18 August 2010 2836:. Peter Kleissner 2807:. Peter Kleissner 2122:"Hash Algorithms" 1938:on 8 January 2013 1694:"Version History" 1288:on 8 January 2013 1282:"Version History" 785:evil maid attacks 771:device capturing 758:Physical security 733:Security concerns 715:FlexNet Publisher 560:mode of operation 502:Encryption scheme 439:Operating systems 355:digital signature 311:, had stolen the 237: 236: 200:TrueCrypt License 171:List of languages 16:(Redirected from 5734: 5664: 5663: 5654: 5653: 5502:operating system 5500:Security-focused 5448: 5273: 4848: 4753: 4746: 4739: 4730: 4712: 4711: 4540:Insecure channel 4376: 4369: 4362: 4353: 4349: 4280: 4275: 4274: 4272:Official website 4258: 4256: 4254: 4252: 4246:CitizenAudit.org 4243: 4235: 4229: 4228: 4226: 4224: 4219:. 19 August 2009 4209: 4203: 4202: 4200: 4198: 4184: 4178: 4176: 4174: 4172: 4158: 4152: 4151: 4150: 4148: 4127: 4121: 4120: 4118: 4116: 4110: 4100:(16 June 2014). 4094: 4088: 4087: 4085: 4083: 4072: 4066: 4065: 4063: 4061: 4046: 4040: 4034: 4028: 4022: 4016: 4010: 4004: 3998: 3992: 3986: 3980: 3979: 3977: 3975: 3966:. Archived from 3959: 3953: 3952: 3951: 3949: 3929: 3920: 3914: 3908: 3902: 3896: 3883: 3877: 3867: 3861: 3855: 3849: 3839: 3833: 3823: 3817: 3807: 3801: 3791: 3785: 3784: 3782: 3780: 3759: 3753: 3752: 3750: 3748: 3725: 3719: 3718: 3716: 3714: 3693: 3687: 3686: 3684: 3682: 3665: 3659: 3658: 3657: 3655: 3646:, archived from 3633: 3627: 3626: 3624: 3622: 3612: 3602:Greenwald, Glenn 3598: 3592: 3591: 3589: 3587: 3567: 3561: 3560: 3559: 3557: 3536: 3527: 3513: 3507: 3497: 3491: 3485: 3484: 3483: 3481: 3464: 3458: 3457: 3456: 3454: 3440: 3434: 3433: 3432: 3430: 3413: 3407: 3406: 3404: 3402: 3390: 3384: 3383: 3372: 3366: 3365: 3354: 3348: 3347: 3345: 3343: 3334:. Archived from 3316: 3310: 3309: 3307: 3305: 3290: 3284: 3283: 3281: 3279: 3264: 3258: 3257: 3255: 3253: 3238: 3232: 3231: 3229: 3227: 3212: 3206: 3205: 3204: 3202: 3182: 3176: 3175: 3174: 3172: 3151: 3145: 3144: 3143: 3141: 3120: 3114: 3113: 3111: 3109: 3098: 3092: 3091: 3089: 3087: 3076: 3070: 3069: 3067: 3065: 3056:. Archived from 3046: 3040: 3039: 3031: 3025: 3024: 3022: 3020: 3004: 2998: 2997: 2995: 2993: 2988:on 16 April 2013 2974: 2965: 2964: 2962: 2960: 2949: 2943: 2942: 2935: 2929: 2928: 2920: 2914: 2913: 2911: 2909: 2897: 2891: 2890: 2882: 2876: 2875: 2873: 2871: 2866:on 1 August 2009 2852: 2846: 2845: 2843: 2841: 2831: 2823: 2817: 2816: 2814: 2812: 2802: 2794: 2788: 2787: 2785: 2783: 2764: 2758: 2757: 2755: 2753: 2738: 2732: 2731: 2729: 2727: 2708: 2702: 2701: 2690: 2684: 2683: 2681: 2679: 2674:on 16 April 2013 2660: 2654: 2653: 2651: 2649: 2644:on 16 April 2013 2630: 2624: 2623: 2621: 2619: 2597: 2591: 2590: 2588: 2586: 2581:. Tom's Hardware 2570: 2564: 2563: 2561: 2559: 2554:. Tom's Hardware 2543: 2537: 2536: 2534: 2526: 2515: 2506: 2500: 2499: 2494:. Archived from 2484: 2478: 2477: 2475: 2473: 2463: 2457: 2456: 2454: 2452: 2443:. Archived from 2437: 2431: 2430: 2428: 2426: 2407: 2401: 2398: 2392: 2386: 2380: 2379: 2377: 2371:. Archived from 2366: 2357: 2351: 2350: 2348: 2346: 2327: 2321: 2320: 2318: 2316: 2311:on 16 April 2013 2297: 2286: 2285: 2283: 2281: 2266: 2260: 2259: 2257: 2255: 2236: 2227: 2226: 2224: 2222: 2207: 2201: 2200: 2198: 2196: 2190: 2181: 2175: 2174: 2172: 2170: 2151: 2142: 2141: 2139: 2137: 2118: 2112: 2111: 2109: 2107: 2092: 2086: 2085: 2083: 2081: 2070: 2064: 2063: 2061: 2059: 2048: 2042: 2041: 2039: 2037: 2026: 2020: 2019: 2017: 2015: 2004: 1998: 1997: 1995: 1993: 1982: 1973: 1972: 1970: 1968: 1957: 1948: 1947: 1945: 1943: 1924: 1918: 1917: 1915: 1913: 1898: 1889: 1888:Internet Archive 1883: 1877: 1876: 1869: 1863: 1862: 1861: 1859: 1838: 1832: 1831: 1830: 1828: 1814: 1808: 1807: 1805: 1803: 1788: 1782: 1781: 1780: 1778: 1757: 1751: 1750: 1748: 1746: 1737:. Archived from 1726: 1720: 1719: 1717: 1715: 1709: 1698: 1690: 1684: 1683: 1681: 1679: 1668: 1662: 1661: 1659: 1657: 1638: 1632: 1631: 1629: 1627: 1601: 1595: 1594: 1592: 1590: 1564: 1558: 1557: 1555: 1553: 1527: 1521: 1520: 1508: 1502: 1501: 1499: 1497: 1471: 1456: 1452: 1450: 1448: 1433: 1427: 1426: 1413: 1407: 1406: 1404: 1396: 1390: 1389: 1378:"Language Packs" 1374: 1368: 1367: 1365: 1363: 1349: 1343: 1342: 1341: 1339: 1325: 1312: 1311: 1304: 1298: 1297: 1295: 1293: 1278: 1143:source-available 1131:educated guesses 1032:personal effects 988:Heathrow Airport 885:Matthew D. Green 752:cold boot attack 646:randomness tests 416: 404: 400: 388: 381: 374: 359:software license 244:source-available 233: 232: 225: 222: 220: 204:source-available 125:Operating system 95: 93: 88: 70: 68: 63: 39: 32: 21: 5742: 5741: 5737: 5736: 5735: 5733: 5732: 5731: 5707:Disk encryption 5677: 5676: 5675: 5670: 5642: 5589: 5566: 5550: 5519: 5501: 5494: 5442: 5434: 5405:Java Anon Proxy 5381: 5267: 5266: 5264:Disk encryption 5254: 5230:Google Messages 5215:Signal Protocol 5169: 5136: 5103: 5050: 4947: 4899: 4842: 4835: 4762: 4757: 4727: 4718: 4700: 4629: 4385: 4380: 4329:on truecrypt.ch 4305: 4270: 4269: 4266: 4261: 4250: 4248: 4241: 4237: 4236: 4232: 4222: 4220: 4211: 4210: 4206: 4196: 4194: 4186: 4185: 4181: 4170: 4168: 4160: 4159: 4155: 4146: 4144: 4129: 4128: 4124: 4114: 4112: 4108: 4096: 4095: 4091: 4081: 4079: 4074: 4073: 4069: 4059: 4057: 4056:. 28 March 2014 4048: 4047: 4043: 4035: 4031: 4023: 4019: 4011: 4007: 3999: 3995: 3987: 3983: 3973: 3971: 3961: 3960: 3956: 3947: 3945: 3931: 3930: 3923: 3915: 3911: 3903: 3899: 3892:30 May 2012 at 3884: 3880: 3868: 3864: 3856: 3852: 3843:OBS Gyeongin TV 3840: 3836: 3824: 3820: 3813:, 2018.08.27., 3808: 3804: 3797:, 2018.08.27., 3792: 3788: 3778: 3776: 3761: 3760: 3756: 3746: 3744: 3727: 3726: 3722: 3712: 3710: 3702:BBC News Online 3695: 3694: 3690: 3680: 3678: 3667: 3666: 3662: 3653: 3651: 3635: 3634: 3630: 3620: 3618: 3610: 3600: 3599: 3595: 3585: 3583: 3569: 3568: 3564: 3555: 3553: 3540:Hosenball, Mark 3538: 3537: 3530: 3524:Wayback Machine 3514: 3510: 3493: 3492: 3488: 3479: 3477: 3466: 3465: 3461: 3452: 3450: 3442: 3441: 3437: 3428: 3426: 3415: 3414: 3410: 3400: 3398: 3392: 3391: 3387: 3374: 3373: 3369: 3356: 3355: 3351: 3341: 3339: 3322:(30 May 2014). 3318: 3317: 3313: 3303: 3301: 3292: 3291: 3287: 3277: 3275: 3266: 3265: 3261: 3251: 3249: 3240: 3239: 3235: 3225: 3223: 3214: 3213: 3209: 3200: 3198: 3188:(29 May 2014), 3184: 3183: 3179: 3170: 3168: 3153: 3152: 3148: 3139: 3137: 3122: 3121: 3117: 3107: 3105: 3100: 3099: 3095: 3085: 3083: 3078: 3077: 3073: 3063: 3061: 3048: 3047: 3043: 3033: 3032: 3028: 3018: 3016: 3006: 3005: 3001: 2991: 2989: 2976: 2975: 2968: 2958: 2956: 2951: 2950: 2946: 2937: 2936: 2932: 2922: 2921: 2917: 2907: 2905: 2899: 2898: 2894: 2884: 2883: 2879: 2869: 2867: 2854: 2853: 2849: 2839: 2837: 2829: 2825: 2824: 2820: 2810: 2808: 2800: 2796: 2795: 2791: 2781: 2779: 2766: 2765: 2761: 2751: 2749: 2742:Schneier, Bruce 2740: 2739: 2735: 2725: 2723: 2710: 2709: 2705: 2692: 2691: 2687: 2677: 2675: 2662: 2661: 2657: 2647: 2645: 2632: 2631: 2627: 2617: 2615: 2599: 2598: 2594: 2584: 2582: 2572: 2571: 2567: 2557: 2555: 2545: 2544: 2540: 2532: 2528: 2527: 2518: 2511:- see question 2507: 2503: 2486: 2485: 2481: 2471: 2469: 2465: 2464: 2460: 2450: 2448: 2439: 2438: 2434: 2424: 2422: 2421:on 19 June 2013 2409: 2408: 2404: 2399: 2395: 2387: 2383: 2375: 2364: 2359: 2358: 2354: 2344: 2342: 2329: 2328: 2324: 2314: 2312: 2299: 2298: 2289: 2279: 2277: 2270:"Hidden Volume" 2268: 2267: 2263: 2253: 2251: 2238: 2237: 2230: 2220: 2218: 2209: 2208: 2204: 2194: 2192: 2188: 2183: 2182: 2178: 2168: 2166: 2153: 2152: 2145: 2135: 2133: 2120: 2119: 2115: 2105: 2103: 2094: 2093: 2089: 2079: 2077: 2072: 2071: 2067: 2057: 2055: 2050: 2049: 2045: 2035: 2033: 2028: 2027: 2023: 2013: 2011: 2006: 2005: 2001: 1991: 1989: 1984: 1983: 1976: 1966: 1964: 1959: 1958: 1951: 1941: 1939: 1926: 1925: 1921: 1911: 1909: 1900: 1899: 1892: 1884: 1880: 1871: 1870: 1866: 1857: 1855: 1840: 1839: 1835: 1826: 1824: 1816: 1815: 1811: 1801: 1799: 1790: 1789: 1785: 1776: 1774: 1759: 1758: 1754: 1744: 1742: 1728: 1727: 1723: 1713: 1711: 1707: 1696: 1692: 1691: 1687: 1677: 1675: 1670: 1669: 1665: 1655: 1653: 1640: 1639: 1635: 1625: 1623: 1603: 1602: 1598: 1588: 1586: 1566: 1565: 1561: 1551: 1549: 1529: 1528: 1524: 1510: 1509: 1505: 1495: 1493: 1473: 1472: 1459: 1446: 1444: 1435: 1434: 1430: 1415: 1414: 1410: 1402: 1398: 1397: 1393: 1376: 1375: 1371: 1361: 1359: 1351: 1350: 1346: 1337: 1335: 1327: 1326: 1315: 1306: 1305: 1301: 1291: 1289: 1280: 1279: 1262: 1258: 1246: 1211: 1190: 1139: 1115: 1090: 1058: 1052: 984:Glenn Greenwald 976: 970: 951: 929: 924: 868: 866:Security audits 856: 805: 793: 760: 747: 735: 727:Adobe Photoshop 721:on products by 719:software piracy 711: 705: 669:encryption for 663: 641: 602: 583: 553: 509: 504: 477: 441: 433:Wayback Machine 414: 402: 398: 395: 386: 379: 372: 351: 304: 292: 286: 227: 217: 177: 176: 172: 97: 91: 89: 86: 66: 64: 61: 57:Initial release 42: 28: 23: 22: 15: 12: 11: 5: 5740: 5738: 5730: 5729: 5724: 5719: 5714: 5709: 5704: 5699: 5694: 5689: 5679: 5678: 5672: 5671: 5669: 5668: 5658: 5647: 5644: 5643: 5641: 5640: 5635: 5630: 5625: 5624: 5623: 5618: 5611:Hash functions 5608: 5603: 5597: 5595: 5594:Related topics 5591: 5590: 5588: 5587: 5582: 5576: 5574: 5568: 5567: 5565: 5564: 5558: 5556: 5552: 5551: 5549: 5548: 5543: 5538: 5533: 5527: 5525: 5521: 5520: 5518: 5517: 5512: 5506: 5504: 5496: 5495: 5493: 5492: 5487: 5482: 5477: 5472: 5467: 5462: 5457: 5451: 5449: 5436: 5435: 5433: 5432: 5427: 5422: 5417: 5412: 5407: 5402: 5397: 5391: 5389: 5383: 5382: 5380: 5379: 5374: 5373: 5372: 5362: 5357: 5352: 5347: 5342: 5337: 5332: 5327: 5322: 5317: 5312: 5307: 5302: 5297: 5292: 5287: 5282: 5276: 5274: 5260: 5259: 5256: 5255: 5253: 5252: 5249: 5248: 5247: 5242: 5237: 5232: 5227: 5222: 5212: 5207: 5202: 5201: 5200: 5195: 5185: 5179: 5177: 5171: 5170: 5168: 5167: 5162: 5157: 5152: 5146: 5144: 5138: 5137: 5135: 5134: 5129: 5124: 5119: 5113: 5111: 5105: 5104: 5102: 5101: 5096: 5091: 5086: 5081: 5076: 5071: 5066: 5060: 5058: 5052: 5051: 5049: 5048: 5043: 5038: 5033: 5028: 5023: 5018: 5013: 5008: 5003: 4998: 4993: 4988: 4983: 4978: 4973: 4968: 4963: 4961:BBM Enterprise 4957: 4955: 4949: 4948: 4946: 4945: 4940: 4935: 4930: 4925: 4920: 4915: 4909: 4907: 4901: 4900: 4898: 4897: 4892: 4887: 4882: 4877: 4872: 4867: 4862: 4856: 4854: 4845: 4837: 4836: 4834: 4833: 4828: 4823: 4818: 4813: 4808: 4803: 4793: 4788: 4783: 4778: 4772: 4770: 4764: 4763: 4758: 4756: 4755: 4748: 4741: 4733: 4724: 4723: 4720: 4719: 4717: 4716: 4705: 4702: 4701: 4699: 4698: 4693: 4691:Random numbers 4688: 4683: 4678: 4673: 4668: 4663: 4658: 4653: 4648: 4643: 4637: 4635: 4631: 4630: 4628: 4627: 4622: 4617: 4615:Garlic routing 4612: 4607: 4602: 4597: 4592: 4587: 4582: 4577: 4572: 4567: 4562: 4557: 4552: 4547: 4542: 4537: 4535:Secure channel 4532: 4526: 4525: 4524: 4513: 4508: 4503: 4498: 4496:Key stretching 4493: 4488: 4483: 4478: 4473: 4468: 4463: 4462: 4461: 4456: 4446: 4444:Cryptovirology 4441: 4436: 4431: 4429:Cryptocurrency 4426: 4421: 4416: 4415: 4414: 4404: 4399: 4393: 4391: 4387: 4386: 4381: 4379: 4378: 4371: 4364: 4356: 4346: 4345: 4340: 4330: 4324: 4315: 4304: 4301: 4300: 4299: 4293: 4287: 4281: 4265: 4264:External links 4262: 4260: 4259: 4230: 4204: 4179: 4153: 4122: 4104:Archived from 4089: 4067: 4041: 4029: 4017: 4005: 3993: 3981: 3954: 3921: 3909: 3897: 3878: 3873:, 2018.07.18, 3862: 3850: 3845:, 2018.07.19, 3834: 3829:, 2018/07/18, 3818: 3802: 3786: 3754: 3743:. 24 July 2014 3737:Alexandria, VA 3720: 3688: 3660: 3650:on 31 May 2014 3628: 3615:Democracy Now! 3593: 3582:on 31 May 2014 3562: 3528: 3508: 3486: 3459: 3435: 3408: 3397:. The Register 3385: 3367: 3349: 3338:on 31 May 2014 3311: 3285: 3259: 3233: 3207: 3186:Doctorow, Cory 3177: 3146: 3115: 3093: 3071: 3060:on 8 June 2014 3041: 3026: 2999: 2966: 2944: 2930: 2915: 2892: 2877: 2847: 2818: 2789: 2759: 2733: 2703: 2696:; et al. 2694:Alex Halderman 2685: 2655: 2625: 2592: 2565: 2538: 2516: 2501: 2479: 2458: 2432: 2402: 2393: 2381: 2352: 2322: 2287: 2261: 2228: 2202: 2176: 2143: 2132:on 25 May 2014 2113: 2087: 2065: 2043: 2021: 1999: 1974: 1949: 1919: 1890: 1878: 1864: 1833: 1823:, The Register 1809: 1783: 1752: 1741:on 30 May 2014 1721: 1685: 1663: 1652:on 5 June 2014 1646:Drivecrypt FAQ 1633: 1596: 1559: 1522: 1517:The New Yorker 1503: 1457: 1428: 1408: 1391: 1369: 1344: 1313: 1299: 1259: 1257: 1254: 1253: 1252: 1245: 1242: 1219:Ondrej Tesarik 1210: 1207: 1189: 1186: 1138: 1135: 1114: 1111: 1089: 1086: 1057: 1054: 1037:Democracy Now! 1012:Edward Snowden 996:Rio de Janeiro 969: 966: 950: 945: 928: 925: 923: 920: 867: 864: 855: 852: 804: 801: 792: 789: 759: 756: 746: 743: 734: 731: 707:Main article: 704: 701: 691:Tom's Hardware 662: 659: 640: 637: 630:Google Desktop 626:Microsoft Word 618:Bruce Schneier 601: 598: 582: 579: 552: 549: 508: 505: 503: 500: 476: 473: 440: 437: 394: 391: 350: 347: 303: 300: 285: 282: 262:storage device 235: 234: 215: 211: 210: 197: 191: 190: 185: 179: 178: 173: 170: 169: 166: 165: 162: 158: 157: 151: 145: 144: 127: 121: 120: 107: 103: 102: 99: 98: 96:(Discontinued) 84: 82: 76: 75: 72: 71: 58: 54: 53: 50: 44: 43: 40: 26: 24: 14: 13: 10: 9: 6: 4: 3: 2: 5739: 5728: 5725: 5723: 5720: 5718: 5715: 5713: 5710: 5708: 5705: 5703: 5700: 5698: 5695: 5693: 5690: 5688: 5687:2004 software 5685: 5684: 5682: 5667: 5659: 5657: 5649: 5648: 5645: 5639: 5636: 5634: 5631: 5629: 5626: 5622: 5619: 5617: 5614: 5613: 5612: 5609: 5607: 5604: 5602: 5599: 5598: 5596: 5592: 5586: 5583: 5581: 5578: 5577: 5575: 5573: 5569: 5563: 5560: 5559: 5557: 5553: 5547: 5544: 5542: 5539: 5537: 5534: 5532: 5529: 5528: 5526: 5522: 5516: 5513: 5511: 5508: 5507: 5505: 5503: 5497: 5491: 5488: 5486: 5483: 5481: 5478: 5476: 5473: 5471: 5468: 5466: 5463: 5461: 5458: 5456: 5453: 5452: 5450: 5446: 5441: 5437: 5431: 5428: 5426: 5423: 5421: 5418: 5416: 5413: 5411: 5408: 5406: 5403: 5401: 5398: 5396: 5393: 5392: 5390: 5388: 5384: 5378: 5375: 5371: 5368: 5367: 5366: 5363: 5361: 5358: 5356: 5353: 5351: 5348: 5346: 5343: 5341: 5338: 5336: 5333: 5331: 5328: 5326: 5323: 5321: 5318: 5316: 5313: 5311: 5308: 5306: 5303: 5301: 5298: 5296: 5293: 5291: 5288: 5286: 5283: 5281: 5278: 5277: 5275: 5271: 5265: 5261: 5250: 5246: 5243: 5241: 5238: 5236: 5233: 5231: 5228: 5226: 5223: 5221: 5218: 5217: 5216: 5213: 5211: 5208: 5206: 5203: 5199: 5196: 5194: 5191: 5190: 5189: 5186: 5184: 5181: 5180: 5178: 5176: 5172: 5166: 5163: 5161: 5158: 5156: 5153: 5151: 5148: 5147: 5145: 5143: 5139: 5133: 5130: 5128: 5125: 5123: 5120: 5118: 5115: 5114: 5112: 5110: 5106: 5100: 5097: 5095: 5092: 5090: 5087: 5085: 5084:SoftEther VPN 5082: 5080: 5077: 5075: 5072: 5070: 5067: 5065: 5062: 5061: 5059: 5057: 5053: 5047: 5044: 5042: 5039: 5037: 5034: 5032: 5029: 5027: 5024: 5022: 5019: 5017: 5014: 5012: 5009: 5007: 5004: 5002: 4999: 4997: 4994: 4992: 4989: 4987: 4984: 4982: 4979: 4977: 4974: 4972: 4969: 4967: 4966:Bouncy Castle 4964: 4962: 4959: 4958: 4956: 4954: 4953:TLS & SSL 4950: 4944: 4941: 4939: 4936: 4934: 4931: 4929: 4926: 4924: 4921: 4919: 4916: 4914: 4911: 4910: 4908: 4906: 4902: 4896: 4893: 4891: 4888: 4886: 4883: 4881: 4878: 4876: 4873: 4871: 4868: 4866: 4863: 4861: 4858: 4857: 4855: 4853: 4849: 4846: 4844: 4843:communication 4838: 4832: 4829: 4827: 4824: 4822: 4819: 4817: 4814: 4812: 4809: 4807: 4804: 4801: 4797: 4794: 4792: 4789: 4787: 4784: 4782: 4779: 4777: 4774: 4773: 4771: 4769: 4768:Email clients 4765: 4761: 4754: 4749: 4747: 4742: 4740: 4735: 4734: 4731: 4715: 4707: 4706: 4703: 4697: 4696:Steganography 4694: 4692: 4689: 4687: 4684: 4682: 4679: 4677: 4674: 4672: 4669: 4667: 4664: 4662: 4659: 4657: 4654: 4652: 4651:Stream cipher 4649: 4647: 4644: 4642: 4639: 4638: 4636: 4632: 4626: 4623: 4621: 4618: 4616: 4613: 4611: 4610:Onion routing 4608: 4606: 4603: 4601: 4598: 4596: 4593: 4591: 4590:Shared secret 4588: 4586: 4583: 4581: 4578: 4576: 4573: 4571: 4568: 4566: 4563: 4561: 4558: 4556: 4553: 4551: 4548: 4546: 4543: 4541: 4538: 4536: 4533: 4530: 4527: 4522: 4519: 4518: 4517: 4514: 4512: 4509: 4507: 4504: 4502: 4499: 4497: 4494: 4492: 4489: 4487: 4486:Key generator 4484: 4482: 4479: 4477: 4474: 4472: 4469: 4467: 4464: 4460: 4457: 4455: 4452: 4451: 4450: 4449:Hash function 4447: 4445: 4442: 4440: 4437: 4435: 4432: 4430: 4427: 4425: 4424:Cryptanalysis 4422: 4420: 4417: 4413: 4410: 4409: 4408: 4405: 4403: 4400: 4398: 4395: 4394: 4392: 4388: 4384: 4377: 4372: 4370: 4365: 4363: 4358: 4357: 4354: 4350: 4344: 4341: 4338: 4334: 4331: 4328: 4327:Past versions 4325: 4323: 4319: 4318:Past versions 4316: 4314: 4310: 4309:Past versions 4307: 4306: 4302: 4297: 4294: 4291: 4288: 4285: 4282: 4279: 4273: 4268: 4267: 4263: 4247: 4240: 4234: 4231: 4218: 4214: 4208: 4205: 4193: 4189: 4183: 4180: 4167: 4163: 4157: 4154: 4143: 4139: 4138: 4133: 4126: 4123: 4107: 4103: 4099: 4093: 4090: 4077: 4071: 4068: 4055: 4051: 4045: 4042: 4038: 4033: 4030: 4026: 4021: 4018: 4014: 4009: 4006: 4002: 3997: 3994: 3990: 3985: 3982: 3969: 3965: 3958: 3955: 3944: 3940: 3939: 3934: 3933:Phipps, Simon 3928: 3926: 3922: 3918: 3913: 3910: 3906: 3901: 3898: 3895: 3894:archive.today 3891: 3887: 3882: 3879: 3876: 3872: 3866: 3863: 3860: 3854: 3851: 3848: 3844: 3838: 3835: 3832: 3828: 3822: 3819: 3816: 3812: 3806: 3803: 3800: 3796: 3790: 3787: 3775: 3771: 3770: 3765: 3758: 3755: 3742: 3738: 3734: 3730: 3724: 3721: 3708: 3704: 3703: 3698: 3692: 3689: 3677: 3676: 3671: 3664: 3661: 3649: 3645: 3641: 3640: 3632: 3629: 3616: 3609: 3608: 3603: 3597: 3594: 3581: 3577: 3573: 3566: 3563: 3551: 3547: 3546: 3541: 3535: 3533: 3529: 3526: 3525: 3521: 3518: 3512: 3509: 3505: 3501: 3496: 3490: 3487: 3476: 3472: 3471: 3463: 3460: 3448: 3447: 3439: 3436: 3425: 3421: 3420: 3412: 3409: 3396: 3389: 3386: 3381: 3377: 3371: 3368: 3363: 3359: 3353: 3350: 3337: 3333: 3329: 3325: 3321: 3320:Gibson, Steve 3315: 3312: 3299: 3295: 3289: 3286: 3273: 3269: 3263: 3260: 3248: 3244: 3237: 3234: 3222: 3218: 3211: 3208: 3197: 3193: 3192: 3187: 3181: 3178: 3167: 3163: 3162: 3157: 3150: 3147: 3136: 3132: 3131: 3126: 3119: 3116: 3103: 3097: 3094: 3081: 3075: 3072: 3059: 3055: 3051: 3045: 3042: 3037: 3030: 3027: 3014: 3010: 3003: 3000: 2987: 2983: 2982:TrueCrypt FAQ 2979: 2973: 2971: 2967: 2954: 2948: 2945: 2940: 2934: 2931: 2926: 2919: 2916: 2903: 2896: 2893: 2888: 2881: 2878: 2865: 2861: 2857: 2851: 2848: 2835: 2828: 2822: 2819: 2806: 2799: 2793: 2790: 2777: 2773: 2769: 2763: 2760: 2747: 2743: 2737: 2734: 2721: 2717: 2713: 2707: 2704: 2699: 2695: 2689: 2686: 2673: 2669: 2665: 2659: 2656: 2643: 2639: 2635: 2629: 2626: 2613: 2612:Adobe Systems 2609: 2607: 2602: 2596: 2593: 2580: 2576: 2569: 2566: 2553: 2549: 2542: 2539: 2531: 2525: 2523: 2521: 2517: 2514: 2510: 2509:TrueCrypt FAQ 2505: 2502: 2497: 2493: 2489: 2483: 2480: 2468: 2462: 2459: 2447:on 7 May 2014 2446: 2442: 2436: 2433: 2420: 2416: 2412: 2406: 2403: 2397: 2394: 2390: 2385: 2382: 2374: 2370: 2363: 2356: 2353: 2340: 2336: 2332: 2326: 2323: 2310: 2306: 2302: 2296: 2294: 2292: 2288: 2275: 2271: 2265: 2262: 2249: 2245: 2241: 2235: 2233: 2229: 2216: 2212: 2206: 2203: 2187: 2180: 2177: 2164: 2160: 2156: 2150: 2148: 2144: 2131: 2127: 2123: 2117: 2114: 2101: 2097: 2091: 2088: 2075: 2069: 2066: 2053: 2047: 2044: 2031: 2025: 2022: 2009: 2003: 2000: 1987: 1981: 1979: 1975: 1962: 1956: 1954: 1950: 1937: 1933: 1929: 1923: 1920: 1907: 1903: 1897: 1895: 1891: 1887: 1882: 1879: 1874: 1868: 1865: 1854: 1850: 1849: 1844: 1837: 1834: 1822: 1821: 1813: 1810: 1798: 1797:The Daily Dot 1794: 1787: 1784: 1773: 1769: 1768: 1763: 1756: 1753: 1740: 1736: 1732: 1725: 1722: 1706: 1702: 1695: 1689: 1686: 1674: 1667: 1664: 1651: 1647: 1643: 1637: 1634: 1622: 1619: 1615: 1611: 1607: 1600: 1597: 1585: 1582: 1578: 1574: 1570: 1563: 1560: 1548: 1545: 1541: 1537: 1533: 1526: 1523: 1518: 1514: 1507: 1504: 1492: 1489: 1485: 1481: 1477: 1470: 1468: 1466: 1464: 1462: 1458: 1455: 1442: 1438: 1432: 1429: 1424: 1423: 1418: 1412: 1409: 1401: 1395: 1392: 1387: 1383: 1382:truecrypt.org 1379: 1373: 1370: 1358: 1354: 1348: 1345: 1333: 1332: 1324: 1322: 1320: 1318: 1314: 1309: 1303: 1300: 1287: 1283: 1277: 1275: 1273: 1271: 1269: 1267: 1265: 1261: 1255: 1251: 1248: 1247: 1243: 1241: 1239: 1234: 1232: 1228: 1227:David Tesarik 1224: 1220: 1216: 1208: 1206: 1204: 1198: 1194: 1187: 1185: 1183: 1179: 1173: 1169: 1167: 1163: 1158: 1156: 1152: 1148: 1144: 1136: 1134: 1132: 1126: 1124: 1120: 1112: 1110: 1108: 1103: 1099: 1095: 1087: 1085: 1083: 1079: 1075: 1071: 1067: 1063: 1056:James DeSilva 1055: 1053: 1050: 1047: 1043: 1039: 1038: 1033: 1029: 1025: 1024:reconstructed 1021: 1020: 1015: 1013: 1009: 1005: 1001: 997: 993: 989: 985: 981: 980:David Miranda 975: 968:David Miranda 967: 965: 962: 961: 957:ruled that a 956: 949: 946: 944: 942: 938: 934: 933:Daniel Dantas 926: 921: 919: 917: 913: 909: 904: 902: 899:According to 897: 894: 888: 886: 881: 880:cryptanalysis 875: 873: 865: 863: 861: 853: 851: 848: 844: 840: 835: 833: 829: 825: 821: 817: 814: 810: 807:The "Stoned" 802: 800: 798: 790: 788: 786: 782: 778: 774: 770: 769:bus-mastering 766: 757: 755: 753: 744: 742: 740: 732: 730: 728: 724: 720: 716: 710: 702: 700: 697: 693: 692: 686: 684: 680: 676: 672: 668: 660: 658: 655: 650: 647: 638: 636: 633: 631: 627: 623: 622:Windows Vista 619: 613: 611: 607: 599: 597: 595: 592: 588: 580: 578: 576: 571: 569: 565: 561: 558: 550: 548: 546: 542: 538: 534: 530: 526: 522: 518: 514: 506: 501: 499: 497: 493: 488: 486: 482: 481:DragonFly BSD 474: 472: 470: 466: 462: 458: 454: 450: 446: 438: 436: 434: 429: 426: 421: 418: 412: 408: 399:truecrypt.org 392: 390: 387:truecrypt.org 384: 377: 369: 367: 364: 360: 356: 348: 346: 343: 341: 337: 336:closed-source 333: 328: 324: 322: 317: 314: 310: 301: 299: 297: 291: 283: 281: 279: 274: 269: 267: 263: 259: 255: 251: 248: 245: 241: 231: 224: 216: 212: 208: 205: 201: 198: 196: 192: 189: 186: 184: 180: 167: 163: 159: 156: 152: 150: 146: 143: 139: 135: 131: 128: 126: 122: 119: 115: 111: 108: 104: 100: 83: 81: 80:Final release 77: 73: 59: 55: 51: 49: 45: 38: 33: 30: 19: 5440:File systems 5364: 5350:Private Disk 4646:Block cipher 4491:Key schedule 4481:Key exchange 4471:Kleptography 4434:Cryptosystem 4383:Cryptography 4333:Last version 4249:. Retrieved 4245: 4233: 4221:. Retrieved 4216: 4207: 4195:. Retrieved 4191: 4182: 4169:. Retrieved 4165: 4156: 4145:, retrieved 4137:Ars Technica 4135: 4125: 4113:. Retrieved 4106:the original 4092: 4080:. Retrieved 4070: 4058:. Retrieved 4053: 4044: 4032: 4020: 4008: 3996: 3984: 3972:. Retrieved 3968:the original 3957: 3946:, retrieved 3937: 3912: 3900: 3881: 3865: 3853: 3837: 3821: 3805: 3789: 3777:. Retrieved 3767: 3757: 3745:. Retrieved 3732: 3723: 3711:. Retrieved 3700: 3691: 3679:. Retrieved 3675:The Guardian 3673: 3663: 3652:, retrieved 3648:the original 3638: 3631: 3619:. Retrieved 3606: 3596: 3584:. Retrieved 3580:the original 3575: 3565: 3554:, retrieved 3544: 3515: 3511: 3494: 3489: 3478:, retrieved 3469: 3462: 3451:, retrieved 3445: 3438: 3427:, retrieved 3418: 3411: 3399:. Retrieved 3388: 3380:seclists.org 3379: 3370: 3361: 3352: 3340:. Retrieved 3336:the original 3327: 3314: 3302:. Retrieved 3297: 3288: 3276:. Retrieved 3271: 3262: 3250:. Retrieved 3246: 3236: 3224:. Retrieved 3220: 3210: 3199:, retrieved 3190: 3180: 3169:, retrieved 3161:Ars Technica 3159: 3149: 3138:, retrieved 3130:Ars Technica 3128: 3118: 3106:. Retrieved 3096: 3084:. Retrieved 3074: 3062:. Retrieved 3058:the original 3044: 3029: 3017:. Retrieved 3013:the original 3002: 2990:. Retrieved 2986:the original 2981: 2957:. Retrieved 2947: 2933: 2918: 2906:. Retrieved 2895: 2880: 2868:. Retrieved 2864:the original 2859: 2850: 2838:. Retrieved 2833: 2821: 2809:. Retrieved 2804: 2792: 2780:. Retrieved 2776:the original 2771: 2762: 2750:. Retrieved 2736: 2724:. Retrieved 2720:the original 2715: 2706: 2688: 2676:. Retrieved 2672:the original 2667: 2658: 2646:. Retrieved 2642:the original 2637: 2628: 2616:. Retrieved 2604: 2595: 2583:. Retrieved 2578: 2575:"Conclusion" 2568: 2556:. Retrieved 2551: 2548:"Conclusion" 2541: 2512: 2504: 2496:the original 2482: 2470:. Retrieved 2461: 2449:. Retrieved 2445:the original 2435: 2423:. Retrieved 2419:the original 2414: 2405: 2396: 2384: 2373:the original 2368: 2355: 2343:. Retrieved 2339:the original 2334: 2325: 2313:. Retrieved 2309:the original 2304: 2278:. Retrieved 2273: 2264: 2252:. Retrieved 2248:the original 2243: 2219:. Retrieved 2214: 2205: 2193:. Retrieved 2179: 2167:. Retrieved 2163:the original 2158: 2134:. Retrieved 2130:the original 2125: 2116: 2104:. Retrieved 2099: 2090: 2078:. Retrieved 2076:. redhat.com 2068: 2056:. Retrieved 2046: 2034:. Retrieved 2024: 2012:. Retrieved 2002: 1990:. Retrieved 1965:. Retrieved 1940:. Retrieved 1936:the original 1931: 1922: 1910:. Retrieved 1905: 1881: 1867: 1856:, retrieved 1848:Ars Technica 1846: 1836: 1825:, retrieved 1819: 1812: 1800:. Retrieved 1796: 1786: 1775:, retrieved 1767:Ars Technica 1765: 1755: 1743:. Retrieved 1739:the original 1724: 1712:. Retrieved 1700: 1688: 1676:. Retrieved 1666: 1654:. Retrieved 1650:the original 1645: 1636: 1624:. Retrieved 1599: 1587:. Retrieved 1562: 1550:. Retrieved 1525: 1516: 1506: 1494:. Retrieved 1445:. Retrieved 1440: 1431: 1420: 1411: 1394: 1386:the original 1381: 1372: 1360:. Retrieved 1356: 1347: 1336:, retrieved 1330: 1302: 1290:. Retrieved 1286:the original 1237: 1235: 1230: 1226: 1222: 1218: 1214: 1212: 1199: 1195: 1191: 1175: 1171: 1166:Simon Phipps 1159: 1140: 1127: 1116: 1091: 1059: 1051: 1035: 1017: 1016: 977: 958: 953:In 2012 the 952: 947: 930: 905: 898: 889: 876: 869: 857: 836: 806: 794: 761: 748: 736: 712: 689: 687: 667:parallelized 664: 651: 642: 634: 620:states that 614: 603: 584: 572: 554: 510: 495: 489: 478: 442: 430: 422: 419: 396: 385:visitors to 370: 352: 344: 329: 325: 318: 309:Paul Le Roux 305: 293: 270: 239: 238: 221:.sourceforge 164:38 languages 161:Available in 48:Developer(s) 29: 5555:Educational 5360:Sentry 2020 5305:DriveSentry 5225:Google Allo 4831:Thunderbird 4634:Mathematics 4625:Mix network 3548:, Reuters, 3298:ssi.gouv.fr 3278:22 February 3252:22 February 3196:Boing Boing 3082:. Indiegogo 1853:Condé Nasta 1735:SourceForge 1308:"TrueCrypt" 1010:sparked by 939:, who used 922:Legal cases 847:executables 661:Performance 654:boot loader 589:with a 512- 511:Individual 363:open source 349:Version 2.0 313:source code 5681:Categories 5546:NordLocker 5490:Tahoe-LAFS 5480:Rubberhose 5420:RetroShare 5295:Cryptoloop 5290:CrossCrypt 5270:Comparison 5240:TextSecure 5198:ChatSecure 5160:RetroShare 5150:Bitmessage 5089:strongSwan 4875:ChatSecure 4786:Claws Mail 4776:Apple Mail 4585:Ciphertext 4555:Decryption 4550:Encryption 4511:Ransomware 4142:Condé Nast 3974:26 October 3166:Condé Nast 3135:Condé Nast 3108:2 November 3086:2 November 2904:Simon Hunt 2014:25 January 1772:Condé Nast 1256:References 1209:Trademarks 1123:passphrase 1094:Lauri Love 1088:Lauri Love 537:RIPEMD-160 507:Algorithms 383:redirected 376:sub-domain 288:See also: 106:Written in 92:2014-05-28 5387:Anonymity 5377:VeraCrypt 5365:TrueCrypt 5355:Scramdisk 5320:FileVault 5285:BitLocker 5280:BestCrypt 5193:Cryptocat 5099:WireGuard 5001:MatrixSSL 4971:BoringSSL 4933:SecureCRT 4895:Profanity 4870:Centericq 4781:Autocrypt 4575:Plaintext 4313:FileHippo 4296:Veracrypt 4251:31 August 4223:31 August 4217:Nvsos.gov 4197:31 August 4171:31 August 4109:(Twitter) 3943:InfoWorld 3504:11th Cir. 3424:TechWorld 3401:13 August 2992:24 August 2889:. iTWire. 2768:"Malware" 2441:"Archive" 1988:. tc-play 1873:"Unknown" 1610:Newsgroup 1573:Newsgroup 1536:Newsgroup 1480:Newsgroup 1292:1 October 1215:TrueCrypt 1203:VeraCrypt 1078:Forensics 1046:affidavit 1028:plaintext 916:VeraCrypt 828:hard disk 820:Black Hat 765:keylogger 739:BitLocker 675:pipelined 545:Whirlpool 496:TrueCrypt 411:BitLocker 332:Scramdisk 278:VeraCrypt 258:partition 252:used for 240:TrueCrypt 219:truecrypt 18:Truecrypt 5656:Category 5562:CrypTool 5536:Tresorit 5465:eCryptfs 5425:Ricochet 5325:FreeOTFE 5315:eCryptfs 5300:dm-crypt 5245:WhatsApp 5122:Linphone 5074:Openswan 5041:TeamNote 5026:SChannel 5016:mbed TLS 4996:LibreSSL 4981:cryptlib 4913:Dropbear 4826:Sylpheed 4791:Enigmail 4714:Category 4620:Kademlia 4580:Codetext 4523:(CSPRNG) 4303:Archives 3890:Archived 3769:Techdirt 3550:archived 3520:Archived 3019:5 August 2959:5 August 2870:5 August 2840:5 August 2811:5 August 2492:FreeOTFE 2195:10 March 2010:. FEDORA 1992:14 March 1986:"README" 1705:Archived 1338:1 August 1244:See also 1074:Internet 1019:Guardian 960:John Doe 781:software 777:hardware 725:such as 568:CBC mode 564:LRW mode 529:cascaded 492:Dm-crypt 247:freeware 207:freeware 118:Assembly 5666:Commons 5585:BusKill 5580:USBKill 5531:Freenet 5415:Vidalia 5370:History 5345:PGPDisk 5251:SimpleX 5210:Session 5205:Proteus 5079:OpenVPN 5069:Hamachi 5046:wolfSSL 5036:stunnel 5011:OpenSSL 4943:wolfSSH 4923:OpenSSH 4865:BitlBee 4811:Outlook 4806:Kontact 4800:Gpg4win 4390:General 4339:website 4192:Tmdb.de 4147:22 June 4115:22 June 4060:23 July 3795:NewsPim 3774:Floor64 3733:fbi.gov 3611:(Video) 3362:PCWorld 3304:21 June 3226:4 April 2472:16 July 2451:2 March 2080:17 June 2058:10 June 2036:13 June 1967:17 July 1714:2 March 1618:Usenet: 1612::  1581:Usenet: 1575::  1544:Usenet: 1538::  1488:Usenet: 1482::  1454:Alt URL 1119:Druking 1113:Druking 1102:hacking 1066:charges 816:rootkit 809:bootkit 797:malware 791:Malware 541:SHA-512 525:Twofish 521:Serpent 513:ciphers 445:Windows 405:with a 284:History 250:utility 214:Website 195:License 142:MorphOS 130:Windows 90: ( 67:2004-02 65: ( 5638:S/MIME 5485:StegFS 5395:GNUnet 5235:Signal 5183:Matrix 5031:SSLeay 4986:GnuTLS 4938:WinSCP 4890:Kopete 4841:Secure 4501:Keygen 4322:GitHub 4082:1 June 4054:GitHub 3948:20 May 3827:Yonhap 3779:13 May 3747:15 May 3713:13 May 3681:13 May 3654:30 May 3621:30 May 3586:30 May 3556:30 May 3502: ( 3498:, 3480:24 May 3453:24 May 3429:30 May 3342:30 May 3201:31 May 3171:31 May 3140:24 May 3064:31 May 2908:24 May 2782:24 May 2752:24 May 2726:24 May 2678:24 May 2648:24 May 2618:24 May 2585:24 May 2558:24 May 2425:24 May 2345:24 May 2315:24 May 2280:24 May 2254:24 May 2221:24 May 2169:24 May 2136:24 May 2106:24 May 1942:24 May 1912:24 May 1858:29 May 1827:29 May 1802:28 May 1777:28 May 1745:30 May 1656:28 May 1626:28 May 1620:  1589:28 May 1583:  1552:28 May 1546:  1496:28 May 1490:  1447:28 May 1422:GitHub 1362:11 May 1149:. The 1000:Berlin 839:launch 773:memory 587:PBKDF2 543:, and 523:, and 461:64-bit 457:32-bit 451:, and 321:usenet 226:  5541:Wuala 5515:Qubes 5510:Tails 5455:EncFS 5430:Wickr 5188:OMEMO 5155:Briar 5132:Zfone 5117:Jitsi 5021:BSAFE 4976:Botan 4928:PuTTY 4885:Jitsi 4880:climm 4860:Adium 4531:(PRN) 4242:(PDF) 3475:Wired 2830:(PDF) 2801:(PDF) 2533:(PDF) 2376:(PDF) 2365:(PDF) 2189:(PDF) 1708:(PDF) 1697:(PDF) 1678:1 May 1403:(PDF) 998:from 811:, an 723:Adobe 485:Linux 465:IA-64 453:Linux 202:3.1 ( 153:3.30 138:Linux 134:macOS 5475:PEFS 5470:LUKS 5445:List 5340:LUKS 5335:geli 5330:GBDE 5127:Jami 5109:ZRTP 5094:Tinc 4991:JSSE 4253:2017 4225:2017 4199:2017 4173:2017 4149:2014 4117:2014 4084:2014 4062:2018 3976:2013 3950:2014 3781:2016 3749:2016 3715:2016 3683:2016 3656:2014 3623:2014 3588:2014 3558:2014 3482:2014 3455:2014 3431:2014 3403:2010 3344:2014 3306:2014 3280:2015 3254:2015 3228:2015 3203:2014 3173:2014 3142:2014 3110:2013 3088:2013 3066:2014 3021:2009 2994:2011 2961:2009 2910:2014 2872:2009 2842:2009 2813:2009 2784:2014 2754:2014 2728:2014 2680:2014 2650:2014 2620:2014 2608:Help 2587:2014 2560:2014 2474:2014 2453:2017 2427:2014 2347:2014 2317:2014 2282:2014 2256:2014 2223:2014 2197:2007 2171:2014 2138:2014 2108:2014 2082:2014 2060:2014 2038:2014 2016:2012 1994:2014 1969:2011 1944:2014 1914:2014 1860:2014 1829:2014 1804:2014 1779:2014 1747:2014 1716:2017 1680:2016 1658:2014 1628:2014 1591:2014 1554:2014 1498:2014 1449:2014 1364:2023 1340:2014 1294:2009 1182:free 910:and 767:, a 594:salt 581:Keys 490:The 483:and 469:boot 459:and 449:OS X 223:.net 183:Type 149:Size 5460:EFS 5410:Tor 5400:I2P 5310:E4M 5175:DRA 5165:Tox 5142:P2P 5056:VPN 5006:NSS 4918:lsh 4905:SSH 4852:OTR 4821:PGP 4816:p≡p 4796:GPG 4335:on 4320:on 4311:on 3707:BBC 1068:of 990:by 937:FBI 893:NCC 832:TPM 813:MBR 787:". 779:or 591:bit 557:XTS 517:AES 296:E4M 268:). 114:C++ 5683:: 4244:. 4215:. 4190:. 4164:. 4140:, 4134:, 4052:. 3941:, 3924:^ 3772:. 3766:. 3739:: 3735:. 3731:. 3705:. 3699:. 3672:. 3642:, 3574:. 3531:^ 3473:, 3422:, 3378:. 3360:. 3330:. 3326:. 3296:. 3270:. 3245:. 3219:. 3194:, 3164:, 3158:, 3133:, 3127:, 3052:. 2980:. 2969:^ 2858:. 2832:. 2803:. 2770:. 2714:. 2666:. 2636:. 2610:. 2603:. 2577:. 2550:. 2519:^ 2490:. 2413:. 2367:. 2333:. 2303:. 2290:^ 2272:. 2242:. 2231:^ 2213:. 2157:. 2146:^ 2124:. 2098:. 1977:^ 1952:^ 1930:. 1904:. 1893:^ 1851:, 1845:, 1795:. 1770:, 1764:, 1733:. 1699:. 1644:. 1616:. 1608:. 1579:. 1571:. 1542:. 1534:. 1515:. 1486:. 1478:. 1460:^ 1439:. 1419:. 1380:. 1355:. 1316:^ 1263:^ 1233:. 1168:: 1157:. 1133:. 1125:. 1062:IT 1042:UK 628:, 624:, 612:. 547:. 539:, 519:, 487:. 447:, 389:. 155:MB 140:, 136:, 132:, 116:, 112:, 5447:) 5443:( 5272:) 5268:( 4802:) 4798:( 4752:e 4745:t 4738:v 4375:e 4368:t 4361:v 4255:. 4227:. 4201:. 4175:. 4119:. 4086:. 4064:. 3978:. 3783:. 3751:. 3717:. 3685:. 3625:. 3590:. 3405:. 3382:. 3364:. 3346:. 3308:. 3282:. 3256:. 3230:. 3112:. 3090:. 3068:. 3038:. 3023:. 2996:. 2963:. 2912:. 2874:. 2844:. 2815:. 2786:. 2756:. 2730:. 2700:. 2682:. 2652:. 2622:. 2589:. 2562:. 2476:. 2455:. 2429:. 2349:. 2319:. 2284:. 2258:. 2225:. 2199:. 2173:. 2140:. 2110:. 2084:. 2062:. 2040:. 2018:. 1996:. 1971:. 1946:. 1916:. 1875:. 1806:. 1749:. 1718:. 1682:. 1660:. 1630:. 1593:. 1556:. 1519:. 1500:. 1451:. 1425:. 1405:. 1366:. 1310:. 1296:. 1105:( 264:( 209:) 110:C 94:) 69:) 20:)

Index

Truecrypt

Developer(s)
Final release
C
C++
Assembly
Operating system
Windows
macOS
Linux
MorphOS
Size
MB
Type
Disk encryption software
License
TrueCrypt License
source-available
freeware
truecrypt.sourceforge.net
Edit this on Wikidata
source-available
freeware
utility
on-the-fly encryption
partition
storage device
pre-boot authentication
was no longer maintained

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.