323:. TrueCrypt Team member David Tesařík stated that Le Roux informed the team that there was a legal dispute between himself and SecurStar, and that he received legal advisement not to comment on any issues of the case. Tesařík concluded that should the TrueCrypt Team continue distributing TrueCrypt, Le Roux may ultimately be held liable and be forced to pay consequent damages to SecurStar. To continue in good faith, he said, the team would need to verify the validity of the E4M license. However, because of Le Roux's need to remain silent on the matter, he was unable to confirm or deny its legitimacy, keeping TrueCrypt development in limbo.
845:, a malicious person needs physical access to the user's TrueCrypt-encrypted hard disk: in this context this is needed to modify the user's TrueCrypt MBR with that of the Stoned bootkit and then place the hard disk back on the unknowing user's PC, so that when the user boots the PC and types his/her TrueCrypt password on boot, the "Stoned" bootkit intercepts it thereafter because, from that moment on, the Stoned bootkit is loaded before TrueCrypt's MBR in the boot sequence. The first type of attack can be prevented as usual by good security practices, e.g. avoid running non-trusted
632:, and others store information on unencrypted disks, which might compromise TrueCrypt's plausible deniability. The study suggested the addition of a hidden operating system functionality; this feature was added in TrueCrypt 6.0. When a hidden operating system is running, TrueCrypt also makes local unencrypted filesystems and non-hidden TrueCrypt volumes read-only to prevent data leaks. The security of TrueCrypt's implementation of this feature was not evaluated because the first version of TrueCrypt with this option had only recently been released.
4278:
230:
1172:...it is not at all appropriate for to describe itself as "open source". This use of the term "open source" to describe something under a license that's not only unapproved by OSI but known to be subject to issues is unacceptable. ... As OSI director and open source expert Karl Fogel said, "The ideal solution is not to have them remove the words 'open source' from their self-description, but rather for their software to be under an OSI-approved open source license."
862:(TPM) cannot be relied upon for security, because if the attacker has physical or administrative access to the computer and you use it afterwards, the computer could have been modified by the attacker e.g. a malicious component—such as a hardware keystroke logger—could have been used to capture the password or other sensitive information. Since the TPM does not prevent an attacker from maliciously modifying the computer, TrueCrypt will not support the TPM.
1014:. Contents of the drive were encrypted by TrueCrypt, which authorities said "renders the material extremely difficult to access". Detective Superintendent Caroline Goode stated the hard drive contained around 60 gigabytes of data, "of which only 20 have been accessed to date." She further stated the process to decode the material was complex and "so far only 75 documents have been reconstructed since the property was initially received."
5652:
4710:
37:
903:, Steven Barnhart wrote to an email address for a TrueCrypt Foundation member he had used in the past and received several replies from "David". According to Barnhart, the main points of the email messages were that the TrueCrypt Foundation was "happy with the audit, it didn't spark anything", and that the reason for the announcement was that "there is no longer interest ."
5662:
657:
message to misdirect an observer such as, "Non-system disk" or "disk error"), these reduce the functionality of the TrueCrypt boot loader and do not hide the content of the TrueCrypt boot loader from offline analysis. Here again, the use of a hidden operating system is the suggested method for retaining deniability.
368:(GPL). However, given the wide range of components with differing licenses making up the software, and the contested nature of the legality of the program's release, a few weeks later on 21 June, version 2.1 was released under the original E4M license to avoid potential problems relating to the GPL license.
413:, and that Linux and OS X had similar built-in solutions, which the message states renders TrueCrypt unnecessary. The page recommends any data encrypted by TrueCrypt be migrated to other encryption setups and offered instructions on moving to BitLocker. The SourceForge project page for the software at
648:
to attempt to identify TrueCrypt volumes. Although these features give reason to suspect a file to be a TrueCrypt volume, there are, however, some programs which exist for the purpose of securely erasing files by employing a method of overwriting file contents, and free disk space, with purely random
1192:
28 May 2014 announcement of discontinuation of TrueCrypt also came with a new version 7.2 of the software. Among the many changes to the source code from the previous release were changes to the TrueCrypt
License — including removal of specific language that required attribution of TrueCrypt as well
963:
TrueCrypt user could not be compelled to decrypt several of his hard drives. The court's ruling noted that FBI forensic examiners were unable to get past TrueCrypt's encryption (and therefore were unable to access the data) unless Doe either decrypted the drives or gave the FBI the password, and the
1196:
Cryptographer
Matthew Green, who had help raise funds for TrueCrypt's audit noted a connection between TrueCrypt's refusal to change the license and their departure-time warning. "They set the whole thing on fire, and now maybe nobody is going to trust it because they'll think there's some big evil
1048:
asking the court to allow them to retain possession of
Miranda's belongings. The grounds for the request were that they could not break the encryption, and were only able to access 75 of the documents that he was carrying, which Greenwald said "most of which were probably ones related to his school
849:
with administrative privileges. The second one can be successfully neutralized by the user if he/she suspects that the encrypted hard disk might have been physically available to someone he/she does not trust, by booting the encrypted operating system with TrueCrypt's Rescue Disk instead of booting
698:
was found to be similar regardless of whether mid-range or state-of-the-art hardware is in use, and this impact was "quite acceptable". In another article the performance cost was found to be unnoticeable when working with "popular desktop applications in a reasonable manner", but it was noted that
315:
from SecurStar as an employee. It was further stated that Le Roux illegally distributed E4M, and authored an illegal license permitting anyone to base derivative work on the code and distribute it freely. Hafner alleges all versions of E4M always belonged only to SecurStar, and Le Roux did not have
749:
TrueCrypt stores its keys in RAM; on an ordinary personal computer the DRAM will maintain its contents for several seconds after power is cut (or longer if the temperature is lowered). Even if there is some degradation in the memory contents, various algorithms can intelligently recover the keys.
615:
The TrueCrypt documentation lists many ways in which TrueCrypt's hidden volume deniability features may be compromised (e.g. by third-party software which may leak information through temporary files, thumbnails, etc., to unencrypted disks) and possible ways to avoid this. In a paper published in
174:
English, Arabic, Basque, Belarusian, Bulgarian, Burmese, Catalan, Chinese (Simplified), Chinese (Hong Kong), Chinese (Taiwan), Czech, Danish, Dutch, Estonian, Finnish, French, Georgian, German, Greek, Hungarian, Indonesian, Italian, Japanese, Korean, Latvian, Norwegian (Nynorsk), Persian, Polish,
656:
replaces the normal boot loader, an offline analysis of the drive can positively determine that a TrueCrypt boot loader is present and so lead to the logical inference that a TrueCrypt partition is also present. Even though there are features to obfuscate its purpose (i.e. displaying a BIOS-like
306:
Original release of TrueCrypt was made by anonymous developers called "the TrueCrypt Team". Shortly after version 1.0 was released in 2004, the TrueCrypt Team reported receiving email from
Wilfried Hafner, manager of SecurStar, a computer security company. According to the TrueCrypt Team, Hafner
895:
Cryptography
Services. This audit "found no evidence of deliberate backdoors, or any severe design flaws that will make the software insecure in most instances". The French National Agency for the Security of Information Systems (ANSSI) stated that while TrueCrypt 6.0 and 7.1a have previously
762:
TrueCrypt documentation states that TrueCrypt is unable to secure data on a computer if an attacker physically accessed it and TrueCrypt is used on the compromised computer by the user again (this does not apply to a common case of a stolen, lost, or confiscated computer). The attacker having
643:
When analyzed, TrueCrypt volumes appear to have no header and contain random data. TrueCrypt volumes have sizes that are multiples of 512 due to the block size of the cipher mode and key data is either 512 bytes stored separately in the case of system encryption or two 128 kB headers for
1200:
On 16 June 2014, the only alleged TrueCrypt developer still answering email replied to a message by
Matthew Green asking for permission to use the TrueCrypt trademark for a fork released under a standard open source license. Permission was denied, which led to the two known forks being named
877:
A crowdfunding campaign attempting to conduct an independent security audit of TrueCrypt was successfully funded in
October 2013. A non-profit organization called the Open Crypto Audit Project (OCAP) was formed, calling itself "a community-driven global initiative which grew out of the first
729:) can damage the TrueCrypt bootloader on Windows partitions/drives encrypted by TrueCrypt and render the drive unbootable. This is caused by the inappropriate design of FlexNet Publisher writing to the first drive track and overwriting whatever non-Windows bootloader exists there.
783:, allowing the attacker to capture unencrypted data (including encryption keys and passwords), or to decrypt encrypted data using captured passwords or encryption keys. Therefore, physical security is a basic premise of a secure system. Attacks such as this are often called "
1164:(OSI)'s license-discuss mailing list in October 2013 suggests that the TrueCrypt License has made progress towards compliance with the Open Source Definition but would not yet pass if proposed for certification as Open Source software. According to current OSI president
409:, which warned that the software may contain unfixed security issues, and that development of TrueCrypt was ended in May 2014, following Windows XP's end of support. The message noted that more recent versions of Windows have built-in support for disk encryption using
882:
of the widely used encryption software TrueCrypt". The organization established contact with TrueCrypt developers, who welcomed the audit. Phase I of the audit was successfully completed on 14 April 2014, finding "no evidence of backdoors or malicious code".
1104:
into a US department or agency computer and one count of conspiring to do the same. The government confiscated all of his electronics and demanded he provide them with the necessary keys to decrypt the devices. Love refused. On 10 May 2016 a
District Judge
890:
One day after TrueCrypt's end of life announcement, OCAP confirmed that the audit would continue as planned, with Phase II expected to begin in June 2014 and wrap up by the end of
September. The Phase II audit was delayed, but was completed 2 April 2015 by
334:, another free encryption program. The company states that with those products, SecurStar "had a long tradition of open source software", but that "competitors had nothing better to do but to steal our source code", causing the company to make its products
275:
and recommended users find alternative solutions. Though development of TrueCrypt has ceased, an independent audit of TrueCrypt (published in March 2015) has concluded that no significant flaws are present. Two projects forked from TrueCrypt:
1145:, under the "TrueCrypt License," which is unique to the TrueCrypt software. As of version 7.1a (the last full version of the software, released Feb 2012), the TrueCrypt License was version 3.0. It is not part of the panoply of widely used
1128:
The special prosecutor said the hidden volumes were especially difficult to deal with. He decrypted some of encrypted files by trying words and phrases the druking group had used elsewhere as parts of the passphrase in order to make
326:
Thereafter, would-be visitors reported trouble accessing the TrueCrypt website, and third-party mirrors appeared online making the source code and installer continually available, outside of official sanction by the TrueCrypt Team.
427:
posted an announcement titled "Yes... TrueCrypt is still safe to use" and a Final
Release Repository to host the last official non-crippled version 7.1a of TrueCrypt. They no longer host the final release repository as of 2022.
935:, who was suspected of financial crimes. The Brazilian National Institute of Criminology (INC) tried unsuccessfully for five months to obtain access to his files on the TrueCrypt-protected disks. They enlisted the help of the
3728:
3763:
608:, by allowing a single "hidden volume" to be created within another volume. In addition, the Windows versions of TrueCrypt have the ability to create and run a hidden encrypted operating system whose
677:
read/write operations (a form of asynchronous processing) to reduce the performance hit of encryption and decryption. On newer processors supporting the AES-NI instruction set, TrueCrypt supports
2400:
Piccinelli, Mario, and Paolo Gubian. "Detecting Hidden Encrypted Volume Files via Statistical Analysis." International Journal of Cyber-Security and Digital Forensics (IJCSDF) 3.1 (2014): 30-37.
754:(which would apply in particular to a notebook computer obtained while in power-on, suspended, or screen-locked mode), has been successfully used to attack a file system protected by TrueCrypt.
420:
Initially, the authenticity of the announcement and new software was questioned. Multiple theories attempting to explain the reason behind the announcement arose throughout the tech community.
1109:) rejected a request by the NCA that Love be forced to turn over his encryption keys or passwords to TrueCrypt files on an SD card and hard drives that were among the confiscated property.
577:
with older volumes using LRW mode and CBC mode. Later versions produce a security warning when mounting CBC mode volumes and recommend that they be replaced with new volumes in XTS mode.
1022:
contributor Naomi Colvin concluded the statements were misleading, stating that it was possible Goode was not even referring to any actual encrypted material, but rather deleted files
3503:
4690:
4520:
3571:
1240:
was registered in the US by a person named David Tesarik. The TrueCrypt Foundation non-profit organization last filed tax returns in 2010, and the company was dissolved in 2014.
649:
data (i.e. "shred" & "scrub"), thereby creating reasonable doubt to counter pointed accusations declaring a file, made of statistically random data, to be a TrueCrypt file.
1146:
417:
was updated to display the same initial message, and the status was changed to "inactive". The page also announced a new software version, 7.2, which only allows decryption.
3549:
1007:
4750:
906:
According to a study released 29 September 2015, TrueCrypt includes two vulnerabilities in the driver that TrueCrypt installs on Windows systems allowing an attacker
3637:
2855:
741:. To prevent those, the documentation distributed with TrueCrypt requires users to follow various security precautions. Some of those attacks are detailed below.
4373:
3963:
3936:
2886:
635:
There was a functional evaluation of the deniability of hidden volumes in an earlier version of TrueCrypt by Schneier et al. that found security leaks.
2487:
4131:
1106:
298:(Encryption for the Masses). Several versions and many additional minor releases have been made since then, with the most current version being 7.1a.
2029:
837:
Two types of attack scenarios exist in which it is possible to maliciously take advantage of this bootkit: in the first one, the user is required to
467:(not supported) and Mac OS X 10.6 Snow Leopard (runs as a 32-bit process). The version for Windows 7, Windows Vista, and Windows XP can encrypt the
2361:
652:
If a system drive, or a partition on it, has been encrypted with TrueCrypt, then only the data on that partition is deniable. When the TrueCrypt
4238:
3155:
874:
published a detailed online report, in which he states that he has confirmed the integrity of the distributed Windows binaries of version 7.1a.
5269:
1249:
830:
encryption software is affected by this kind of attack if the encryption software does not rely on hardware-based encryption technologies like
2663:
1842:
5716:
3124:
1761:
1704:
4894:
4743:
4101:
3444:
2513:
I use pre-boot authentication. Can I prevent a person (adversary) that is watching me start my computer from knowing that I use TrueCrypt?
1512:
681:
to further improve performance. The performance impact of disk encryption is especially noticeable on operations which would normally use
5721:
5025:
3579:
2826:
1081:
3357:
2797:
5726:
5444:
4075:
3319:
3101:
1547:
1491:
3519:
2901:
2388:
5499:
4366:
3293:
2924:
1927:
2330:
2239:
5711:
5691:
5665:
2410:
345:
Le Roux himself has denied developing TrueCrypt in a court hearing in March 2016, in which he also confirmed he had written E4M.
5696:
5655:
4736:
3376:"oss-sec: CVE-2016-1281: TrueCrypt and VeraCrypt Windows installers allow arbitrary code execution with elevation of privilege"
2952:
822:
Technical Security Conference USA 2009, has been shown capable of tampering TrueCrypt's MBR, effectively bypassing TrueCrypt's
559:
3323:
570:
in versions 4.0 and earlier. XTS mode is thought to be more secure than LRW mode, which in turn is more secure than CBC mode.
5701:
4569:
2300:
4212:
964:
court then ruled that Doe's Fifth Amendment right to remain silent legally prevented the Government from making them do so.
1621:
1584:
737:
TrueCrypt is vulnerable to various known attacks which are also present in other disk encryption software releases such as
319:
This led the TrueCrypt Team to immediately stop developing and distributing TrueCrypt, which they announced online through
3669:
3647:
2711:
1605:
954:
841:
the bootkit with administrative privileges once the PC has already booted into Windows; in the second one, analogously to
3242:
1641:
616:
2008 and focused on the then latest version (v5.1a) and its plausible deniability, a team of security researchers led by
4990:
4965:
4359:
3543:
2154:
1730:
1281:
932:
516:
5571:
2863:
2633:
2600:
2360:
Alexei Czeskis; David J. St. Hilaire; Karl Koscher; Steven D. Gribble; Tadayoshi Kohno; Bruce Schneier (18 July 2008).
357:
from that of the original TrueCrypt Team, with the developers now being referred to as "the TrueCrypt Foundation." The
5615:
4975:
4685:
4640:
4453:
4336:
3870:
3830:
3729:"Hacker Charged with Breaching Multiple Government Computers and Stealing Thousands of Employee and Financial Records"
3331:
2601:"Freeze when you reboot a Windows system that has TrueCrypt Disk Encryption software and Adobe applications installed"
900:
776:
532:
531:
algorithms are available: AES-Twofish, AES-Twofish-Serpent, Serpent-AES, Serpent-Twofish-AES and Twofish-Serpent. The
424:
79:
2121:
1176:
As a result of its questionable status with regard to copyright restrictions and other potential legal issues, major
896:
attained ANSSI certification, migration to an alternate certified product is recommended as a precautionary measure.
3967:
2440:
4564:
3740:
1453:
1101:
979:
973:
365:
175:
Portuguese (Brazil), Russian, Slovak, Slovenian, Spanish, Swedish, Turkish, Ukrainian, Uzbek (Cyrillic), Vietnamese
1531:
5369:
5005:
4680:
3932:
3008:
2547:
2362:"Defeating Encrypted and Deniable File Systems: TrueCrypt v5.1a and the Case of the Tattling OS and Applications"
1165:
685:(DMA), as all data must pass through the CPU for decryption, rather than being copied directly from disk to RAM.
289:
2767:
2495:
5706:
5605:
5509:
5479:
5174:
4952:
4851:
4670:
4660:
4515:
4049:
4024:
3988:
3810:
3053:
2697:
1150:
907:
544:
339:
187:
109:
3889:
1377:
3764:"Judge Rejects Attempt To Force Lauri Love To Decrypt His Computers, Despite Never Charging Him With A Crime"
1568:
1475:
1193:
as a link to the official website to be included on any derivative products — forming a license version 3.1.
850:
it directly from the hard disk. With the rescue disk, the user can restore TrueCrypt's MBR to the hard disk.
644:
non-system containers. Forensics tools may use these properties of file size, apparent lack of a header, and
5600:
5469:
5339:
5055:
4665:
4655:
4458:
4418:
4411:
4401:
4396:
3874:
3858:
1399:
859:
831:
265:
3267:
834:, or if the attack is made with administrative privileges while the encrypted operating system is running.
5686:
5627:
5620:
5459:
5234:
4406:
3394:
3035:
2574:
1960:
1161:
1121:
in South Korea, the special prosecutor decrypted some of the files encrypted by TrueCrypt by guessing the
1061:
563:
3049:
2671:
5632:
4713:
4559:
4505:
4036:
3216:
3189:
1154:
1097:
838:
695:
605:
567:
253:
2745:
2372:
4840:
4675:
4599:
2605:
2073:
1885:
911:
871:
823:
795:
TrueCrypt documentation states that TrueCrypt cannot secure data on a computer if it has any kind of
682:
674:
335:
3468:
2977:
5424:
4912:
4830:
4820:
4815:
4759:
4438:
1617:
1580:
1543:
1487:
1003:
991:
819:
678:
609:
593:
574:
528:
362:
261:
182:
2529:
1076:. His computer, encrypted with TrueCrypt, was seized, and DeSilva refused to reveal the password.
229:
5414:
5219:
5209:
4544:
4528:
4475:
2938:
1693:
1613:
1576:
1539:
1483:
1177:
1077:
842:
812:
330:
In the FAQ section of its website, SecurStar maintains its claims of ownership over both E4M and
4105:
2074:"[dm-devel] [PATCH 2/2] dm-crypt: Add TCW IV mode for old CBC TCRYPT containers"
3916:
1935:
1901:
353:
Months later on 7 June 2004, TrueCrypt 2.0 was released. The new version contained a different
5182:
5063:
4810:
4795:
4604:
4594:
4465:
3904:
3643:
1792:
1069:
1031:
940:
887:, one of the auditors, added "I think it's good that we didn't find anything super critical."
714:
708:
690:
354:
257:
117:
2338:
5154:
4539:
4097:
3814:
3474:
2418:
1609:
1572:
1535:
1479:
1142:
987:
884:
784:
751:
666:
520:
358:
249:
243:
203:
194:
124:
36:
3499:
2191:. Institute for Computer Languages, Theory and Logic Group, Vienna University of Technology
1818:
1416:
5474:
5404:
5334:
5263:
5229:
5214:
5126:
5093:
5068:
4187:
4000:
3842:
3701:
3601:
3523:
3516:
1985:
983:
827:
726:
718:
670:
645:
432:
382:
2247:
2008:"Fedora Review Request: tcplay - Utility to create/open/map TrueCrypt-compatible volumes"
1793:"TrueCrypt, encryption tool used by Snowden, shuts down due to alleged 'security issues'"
3079:
2308:
5164:
4960:
4614:
4534:
4495:
4443:
4428:
4277:
3736:
3614:
3607:
Greenwald: UK's Detention of My Partner Was Incredibly Menacing Bid to Stop NSA Reports
3539:
2741:
2693:
2185:
1130:
1041:
1036:
1011:
995:
629:
625:
617:
3696:
3605:
2210:
2095:
931:
In July 2008, several TrueCrypt-secured hard drives were seized from Brazilian banker
5680:
5610:
5409:
5083:
4695:
4650:
4609:
4589:
4485:
4448:
4423:
4141:
4012:
3893:
3185:
3165:
3134:
2719:
2611:
2007:
1872:
1852:
1771:
1181:
1023:
879:
768:
722:
621:
480:
2030:"index : kernel/git/stable/linux-stable.git - path: root/drivers/md/dm-crypt.c"
1820:
TrueCrypt considered HARMFUL – downloads, website meddled to warn: 'It's not secure'
5349:
5141:
4904:
4767:
4645:
4490:
4480:
4470:
4433:
4382:
4332:
4308:
4136:
3831:
http://www.yonhapnews.co.kr/bulletin/2018/07/18/0200000000AKR20180718142500004.HTML
3674:
3335:
3160:
3129:
2162:
1847:
1766:
1672:
1329:
1285:
1205:
and CipherShed as well as a re-implementation named tc-play rather than TrueCrypt.
1018:
308:
2641:
1352:
2978:"Some encryption programs use TPM to prevent attacks. Will TrueCrypt use it too?"
2269:
943:
against Dantas' disks for over 12 months, but were still unable to decrypt them.
5439:
5359:
5304:
5224:
4624:
3470:
Forcing Defendant to Decrypt Hard Drive Is Unconstitutional, Appeals Court Rules
3195:
2129:
1734:
694:, although TrueCrypt is slower compared to an unencrypted disk, the overhead of
653:
375:
312:
4132:"Following TrueCrypt's bombshell advisory, developer says fork is "impossible""
2444:
2051:
799:
installed. Malware may log keystrokes, thus exposing passwords to an attacker.
5545:
5489:
5419:
5294:
5289:
5239:
5204:
5197:
5159:
5149:
5088:
4874:
4785:
4775:
4584:
4554:
4549:
4510:
4317:
4076:"TrueCrypt Goes the Way of Lavabit as Developers Shut it Down Without Warning"
3798:
3417:
1649:
1122:
1093:
1065:
846:
536:
47:
3191:
Mysterious announcement from Truecrypt declares the project insecure and dead
1738:
596:
and 1000 or 2000 iterations, depending on the underlying hash function used.
5386:
5376:
5354:
5319:
5284:
5279:
5192:
5098:
5000:
4932:
4869:
4780:
4574:
4312:
3942:
3423:
1202:
1045:
1027:
915:
892:
764:
763:
physical access to a computer can, for example, install a hardware/software
738:
410:
331:
277:
148:
3846:
3446:
Court: Fifth Amendment Protects Suspects from Having to Decrypt Hard Drives
3036:"How I compiled TrueCrypt 7.1a for Win32 and matched the official binaries"
2775:
585:
The header key and the secondary header key (XTS mode) are generated using
294:
TrueCrypt was initially released as version 1.0 in February 2004, based on
3639:'True Crypt' Encryption Software Stumps MCSO Detectives in Child-Porn Case
3375:
2955:. TrueCrypt Foundation mail in response to Peter Kleissner on 18 July 2009
5561:
5535:
5464:
5324:
5314:
5299:
5244:
5121:
5073:
5040:
5015:
4995:
4980:
4825:
4790:
4728:
4619:
4579:
4050:"truecrypt-archive/License-v3.1.txt at master · DrWhax/truecrypt-archive"
3885:
3875:
http://news.tvchosun.com/site/data/html_dir/2018/07/18/2018071890102.html
3859:
http://www.alphr.com/features/371158/top-ten-password-cracking-techniques
3768:
3300:. Agence nationale de la sécurité des systèmes d'information. 2 June 2014
2491:
1385:
1073:
959:
556:
491:
406:
246:
206:
154:
17:
3009:"TrueCrypt Foundation is a joke to the security industry, pro Microsoft"
1843:"Bombshell TrueCrypt advisory: Backdoor? Hack? Hoax? None of the above?"
435:. Their exclusion policy says they exclude pages at site owner request.
256:(OTFE). It can create a virtual encrypted disk within a file, encrypt a
5584:
5579:
5530:
5344:
5078:
5045:
5035:
5010:
4970:
4942:
4922:
4864:
4805:
4799:
3794:
3773:
2466:
1118:
815:
808:
796:
780:
540:
524:
468:
464:
444:
141:
129:
3938:
TrueCrypt or false? Would-be open source project must clean up its act
3156:"TrueCrypt security audit presses on, despite developers jumping ship"
3012:
1436:
1184:: TrueCrypt is not included with Debian, Ubuntu, Fedora, or openSUSE.
463:
versions of these operating systems are supported, except for Windows
338:, forcing potential customers to place a substantial order and sign a
5637:
5484:
5394:
5030:
4985:
4937:
4889:
4500:
4342:
4321:
3826:
1762:""TrueCrypt is not secure," official SourceForge page abruptly warns"
1421:
999:
586:
512:
460:
456:
320:
4271:
3125:"TrueCrypt audit finds "no evidence of backdoors" or malicious code"
2052:"dm-crypt: Linux kernel device-mapper crypto target - IV generators"
1307:
307:
claimed in the email that the acknowledged author of E4M, developer
218:
4289:
2985:
1225:
and a trademark on the "key" logo was registered under the name of
918:, but it remains unpatched in TrueCrypt's unmaintained installers.
914:
via DLL hijacking. In January 2016, the vulnerability was fixed in
573:
Although new volumes can only be created in XTS mode, TrueCrypt is
113:
5540:
5514:
5454:
5429:
5187:
5131:
5116:
5020:
4927:
4884:
4879:
4859:
4326:
1513:"The Strange Origins of TrueCrypt, ISIS's Favored Encryption Tool"
484:
452:
448:
137:
133:
271:
On 28 May 2014, the TrueCrypt website announced that the project
5329:
5108:
3964:"TrueCrypt license (not OSI-approved; seeking history, context)"
3572:"#Miranda: Where is the UK Government getting its numbers from?"
818:
presented by Austrian software developer Peter Kleissner at the
479:
There is an independent, compatible implementation, tcplay, for
4732:
4355:
2508:
1026:
from unencrypted, unallocated space on the hard drive, or even
371:
Version 2.1a of the software was released on 1 October 2004 on
5399:
5309:
4917:
3706:
3057:
974:
David Miranda (politician) § Global surveillance activism
936:
772:
590:
295:
4283:
4161:
2953:"Stoned bootkit attacking TrueCrypt's full volume encryption"
2467:"diskscrub - disk overwrite utility - Google Project Hosting"
2902:"TrueCrypt vs Peter Kleissner, Or Stoned BootKit Revisited."
1476:"P. Le Roux (author of E4M) accused by W.Hafner (SecurStar)"
1006:
said to be containing sensitive documents pertaining to the
4343:
Partial mirror of the original TrueCrypt 7.1a online manual
4295:
1034:. Greenwald supported this assessment in an interview with
378:. By May 2005, the original TrueCrypt website returned and
3358:"Newly found TrueCrypt flaw allows full system compromise"
431:
Truecrypt.org has been excluded from the Internet Archive
4286:– non-profit organization promoting an audit of TrueCrypt
3989:
Tom Callaway of Red Hat about TrueCrypt licensing concern
3815:
http://news.mk.co.kr/newsRead.php?year=2018&no=538301
858:
The FAQ section of the TrueCrypt website states that the
423:
Shortly after the end of life announcement of TrueCrypt,
4037:
non-OSI compliant packages in the openSUSE Build Service
2698:"Lest We Remember: Cold Boot Attacks on Encryption Keys"
2535:(7.1a ed.). TrueCrypt Foundation. 7 February 2012.
1060:
In February 2014, an Arizona Department of Real Estate
4521:
Cryptographically secure pseudorandom number generator
342:
before being allowed to review the code for security.
2939:"Windows-Hacking: TrueCrypt Verschlüsselung umgangen"
27:
Discontinued source-available disk encryption utility
4347:
3324:"And then the TrueCrypt developers were heard from!"
3294:"Possible abandon de TrueCrypt par ses développeurs"
2389:
Schneier, UW Team Show Flaw In TrueCrypt Deniability
1064:
department employee, James DeSilva, was arrested on
5593:
5570:
5554:
5523:
5498:
5438:
5385:
5262:
5173:
5140:
5107:
5054:
4951:
4903:
4850:
4839:
4766:
4633:
4389:
2552:
System Encryption: BitLocker And TrueCrypt Compared
1928:"Operating Systems Supported for System Encryption"
703:
Incompatibility with FlexNet Publisher and SafeCast
494:module included in default Linux kernel supports a
213:
193:
181:
160:
147:
123:
105:
78:
56:
46:
2211:"Header Key Derivation, Salt, and Iteration Count"
1417:"CipherShed/SRC at master · CipherShed/CipherShed"
3534:
3532:
2887:"The dark side of open source software is Stoned"
1276:
1274:
1272:
1270:
1268:
1266:
1264:
3697:"Briton Lauri Love faces new US hacking charges"
2834:Black Hat Technical Security Conference USA 2009
2805:Black Hat Technical Security Conference USA 2009
1642:"Is the source code of your software available?"
1084:were unable to gain access to his stored files.
1072:through the sharing of explicit images over the
709:FlexNet Publisher § Issues with bootloaders
397:On 28 May 2014, the TrueCrypt official website,
4188:"77165797 - Markeninformation USPTO - via tmdb"
3670:"Briton Lauri Love faces hacking charges in US"
3545:UK asked N.Y. Times to destroy Snowden material
2925:"Bootkit hebelt Festplattenverschlüsselung aus"
527:. Additionally, five different combinations of
3102:"TrueCrypt Audit Endorsed by Development Team"
2972:
2970:
2746:""Evil Maid" Attacks on Encrypted Hard Drives"
2573:Schmid, Patrick; Roos, Achim (28 April 2010).
2546:Schmid, Patrick; Roos, Achim (28 April 2010).
2234:
2232:
498:target called "tcw" since Linux version 3.13.
316:any right to release it under such a license.
4744:
4367:
4213:"Entity Details - Secretary of State, Nevada"
2524:
2522:
2520:
2369:3rd USENIX Workshop on Hot Topics in Security
272:
199:
8:
4177:(search trademark directory for "TrueCrypt")
2032:. Kernel.org cgit. 20 January 2014. Line 241
1955:
1953:
1569:"Truecrypt for David T. from Truecrypt-Team"
1532:"Summary of current TrueCrypt situation...?"
1117:In the special prosecutor investigation for
4162:"Trademark Electronic Search System (TESS)"
3799:http://newspim.com/news/view/20180827000369
3247:A Few Thoughts on Cryptographic Engineering
3221:A Few Thoughts on Cryptographic Engineering
2295:
2293:
2291:
955:United States 11th Circuit Court of Appeals
717:or SafeCast (which are used for preventing
713:Installing third-party software which uses
4847:
4751:
4737:
4729:
4374:
4360:
4352:
4348:
4276:
3927:
3925:
3809:특검 "김경수, 킹크랩 개발·운영 허락...댓글 8800만건 조작 관여",
3050:"Welcome to the Open Crypto Audit Project"
2331:"Security Requirements for Hidden Volumes"
1092:In October 2013, British–Finnish activist
228:
35:
31:
1980:
1978:
1896:
1894:
1703:. TrueCrypt Foundation. 7 February 2005.
1160:Discussion of the licensing terms on the
3917:Various Licenses and Comments about Them
3847:http://voda.donga.com/3/all/39/1394189/1
3841:"드루킹 댓글조작 1/3 암호...FBI도 못 푸는 트루크립트 사용",
2149:
2147:
1469:
1467:
1465:
1463:
1461:
1353:"Applications/Kryptos - MorphOS Library"
1323:
1321:
1319:
1317:
3857:"Top ten password cracking techniques,
3395:"Brazilian banker's crypto baffles FBI"
3243:"Another update on the Truecrypt audit"
2856:"Bootkit bypasses hard disk encryption"
2664:"Security Requirements and Precautions"
2411:"TrueCrypt Volume Format Specification"
1260:
3793:'드루킹 특검' 종료..."수사 종료 자체 판단...외압 없었다",
3034:Xavier de Carné de Carnavalet (2013).
2984:. TrueCrypt Foundation. Archived from
2941:(in German). Gulli News. 30 July 2009.
2774:. TrueCrypt Foundation. Archived from
2718:. TrueCrypt Foundation. Archived from
2670:. TrueCrypt Foundation. Archived from
2640:. TrueCrypt Foundation. Archived from
2417:. TrueCrypt Foundation. Archived from
2337:. TrueCrypt Foundation. Archived from
2307:. TrueCrypt Foundation. Archived from
2246:. TrueCrypt Foundation. Archived from
2161:. TrueCrypt Foundation. Archived from
2128:. TrueCrypt Foundation. Archived from
1934:. TrueCrypt Foundation. Archived from
1384:. TrueCrypt Foundation. Archived from
1284:. TrueCrypt Foundation. Archived from
1250:Comparison of disk encryption software
1180:do not consider the TrueCrypt License
3268:"Truecrypt Phase Two Audit Announced"
2885:David M Williams (7 September 2009).
2186:"New Methods in Hard Disk Encryption"
1710:from the original on 30 December 2008
1331:TrueCrypt, the final release, archive
280:(active) and CipherShed (abandoned).
7:
5661:
3869:'FBI도 못 푼다'는 암호 풀자 드루킹 측근들 태도가 변했다,
3825:"드루킹 일당이 걸어둔 암호 풀어라"...특검, 전문가 총동원,
2862:. Heise Media UK Ltd. Archived from
2827:"Stoned bootkit Presentation Slides"
1701:TrueCrypt User's Guide, version 3.1a
1008:2013 global surveillance disclosures
604:TrueCrypt supports a concept called
3467:Kravets, David (24 February 2012),
3443:Palazzolo, Joe (23 February 2012),
3419:FBI hackers fail to crack TrueCrypt
3328:TrueCrypt Latest Release Repository
3241:Green, Matthew (18 February 2015).
2184:Fruhwirth, Clemens (18 July 2005).
1886:Wayback Machine General Information
1567:Carsten Krueger (7 February 2004).
1441:TrueCrypt User's Guide, version 1.0
1188:End of life and license version 3.1
535:available for use in TrueCrypt are
407:HTTP 301 "Moved Permanently" status
41:TrueCrypt on Windows (discontinued)
3668:Halliday, Josh (29 October 2013).
1604:Andraia Matrix (6 February 2004).
1474:TrueCrypt Team (3 February 2004).
566:in versions 4.1 through 4.3a, and
25:
4257:(search database for "TrueCrypt")
3962:Fontana, Richard (October 2013).
3011:. Peter Kleissner. Archived from
3007:Kleissner, Peter (21 July 2009).
2579:Protect Your Data With Encryption
1443:. TrueCrypt Team. 2 February 2004
1217:was registered under the name of
775:, or install any other malicious
5660:
5651:
5650:
4709:
4708:
4284:Open Crypto Audit Project (OCAP)
4001:Debian Bug report logs - #364034
3570:Colvin, Naomi (31 August 2013).
3552:from the original on 6 July 2014
3123:Farivar, Cyrus (14 April 2014),
1961:"DragonFly On-Line Manual Pages"
1817:McAllister, Neil (28 May 2014),
1791:O'Neill, Patrick (28 May 2014).
1231:TrueCrypt Developers Association
1223:TrueCrypt Developers Association
1082:Maricopa County Sheriff's Office
745:Encryption keys stored in memory
562:. Prior to this, TrueCrypt used
471:partition or entire boot drive.
401:, began redirecting visitors to
4003:. Accessed on: 12 January 2009.
3576:Extraordinary Popular Delusions
3215:Green, Matthew (2 April 2015).
1671:Ratliff, Evan (29 April 2016).
1511:Ratliff, Evan (30 March 2016).
878:comprehensive public audit and
4570:Information-theoretic security
3636:Stern, Ray (4 February 2014),
3578:. Auerfeld.com. Archived from
3416:Dunn, John E. (30 June 2010),
1153:(FSF) states that it is not a
1070:sexual exploitation of a minor
1002:. He was carrying with him an
870:In 2013 a graduate student at
673:and, under Microsoft Windows,
1:
3762:Masnick, Mike (10 May 2016).
3393:Leyden, John (28 June 2010).
3274:. NCC Group. 18 February 2015
3104:. Threatpost. 25 October 2013
3080:"The TrueCrypt Audit Project"
2900:Hunt, Simon (4 August 2009).
2860:The H-Security (H-Online.com)
2054:. cryptsetup. 11 January 2014
1902:"Supported Operating Systems"
1729:tc-foundation (28 May 2014).
1334:, Gibson Research Corporation
1328:Gibson, Steve (5 June 2014),
699:"power users will complain".
639:Identifying TrueCrypt volumes
555:TrueCrypt currently uses the
5717:Software that uses wxWidgets
4130:Goodin, Dan (19 June 2014),
4078:. Ibtimes.co.uk. 29 May 2014
4039:. Accessed on: 20 April 2009
4015:. Accessed on: 20 April 2009
3905:TrueCrypt Collective License
3888:. Accessed on: 21 May 2012
3613:(News broadcast). New York:
3500: 11–12268 & 11–15421
2798:"Stoned bootkit White Paper"
1530:David T. (7 February 2004).
1197:vulnerability in the code."
533:cryptographic hash functions
5616:Cryptographic hash function
4686:Message authentication code
4641:Cryptographic hash function
4454:Cryptographic hash function
4337:Gibson Research Corporation
4025:TrueCrypt licensing concern
3871:Chosun Broadcasting Company
3332:Gibson Research Corporation
3154:Goodin, Dan (30 May 2014),
2391:. Accessed on: 12 June 2012
1841:Goodin, Dan (29 May 2014),
1760:Goodin, Dan (28 May 2014),
1648:. SecurStar. Archived from
1606:"Unofficial TrueCrypt Site"
1400:"Open Crypto Audit Project"
1213:In 2007 a US trademark for
986:, was detained at London's
901:Gibson Research Corporation
515:supported by TrueCrypt are
475:Independent implementations
425:Gibson Research Corporation
62:; 20 years ago
5743:
5722:Assembly language software
4565:Harvest now, decrypt later
4027:Accessed on: 20 April 2009
3907:. Accessed on: 4 June 2014
3741:U.S. Department of Justice
2927:(in German). Heise Online.
1141:TrueCrypt was released as
971:
706:
366:GNU General Public License
287:
85:7.2 / May 28, 2014
5727:Windows security software
5646:
4704:
4681:Post-quantum cryptography
4351:
4290:IsTrueCryptAuditedYet.com
3517:United States v. John Doe
3495:United States v. John Doe
3449:, The Wall Street Journal
3054:Open Crypto Audit Project
2923:Uli Ries (30 July 2009).
2301:"Hidden Operating System"
1236:In 2009 the company name
1030:documents from Miranda's
948:United States v. John Doe
688:In a test carried out by
415:sourceforge.net/truecrypt
403:truecrypt.sourceforge.net
380:truecrypt.sourceforge.net
373:truecrypt.sourceforge.net
302:E4M and SecurStar dispute
290:TrueCrypt release history
168:
101:
74:
34:
5606:Timeline of cryptography
4671:Quantum key distribution
4661:Authenticated encryption
4516:Random number generation
3991:Accessed on 10 July 2009
3919:Free Software Foundation
3811:Maeil Business Newspaper
1731:"TrueCrypt project page"
1151:Free Software Foundation
1137:License and source model
1049:work and personal use".
982:, partner of journalist
908:arbitrary code execution
750:This method, known as a
679:hardware-accelerated AES
455:operating systems. Both
393:End of life announcement
361:was also changed to the
340:non-disclosure agreement
273:was no longer maintained
188:Disk encryption software
5712:Linux security software
5692:Cross-platform software
5601:Outline of cryptography
5572:Anti–computer forensics
4666:Public-key cryptography
4656:Symmetric-key algorithm
4459:Key derivation function
4419:Cryptographic primitive
4412:Authentication protocol
4402:Outline of cryptography
4397:History of cryptography
4298:– official fork website
4292:– website for the audit
3617:. Event occurs at 5:12
3522:15 January 2013 at the
3506: 23 February 2012).
2772:TrueCrypt Documentation
2716:TrueCrypt Documentation
2668:TrueCrypt Documentation
2638:TrueCrypt Documentation
2488:"Plausible Deniability"
2415:TrueCrypt Documentation
2335:TrueCrypt Documentation
2305:TrueCrypt Documentation
2274:TrueCrypt Documentation
2244:TrueCrypt Documentation
2240:"Plausible Deniability"
2215:TrueCrypt Documentation
2159:TrueCrypt Documentation
2126:TrueCrypt Documentation
2100:TrueCrypt Documentation
2096:"Encryption Algorithms"
1963:. DragonFly BSD Project
1932:TrueCrypt Documentation
1906:TrueCrypt Documentation
860:Trusted Platform Module
854:Trusted Platform Module
610:existence may be denied
266:pre-boot authentication
260:, or encrypt the whole
5697:Cryptographic software
5628:Homomorphic encryption
5621:List of hash functions
4760:Cryptographic software
4407:Cryptographic protocol
4239:"Truecrypt Foundation"
2748:. Schneier on Security
2530:"TrueCrypt User Guide"
2276:. TrueCrypt Foundation
2217:. TrueCrypt Foundation
2102:. TrueCrypt Foundation
1908:. TrueCrypt Foundation
1614:alt.security.scramdisk
1577:alt.security.scramdisk
1540:alt.security.scramdisk
1484:alt.security.scramdisk
1174:
1162:Open Source Initiative
1040:, mentioning that the
824:full volume encryption
87:; 10 years ago
5702:Discontinued software
5633:End-to-end encryption
4560:End-to-end encryption
4506:Cryptojacking malware
4102:"Here is the note..."
4013:Bug #109701 in Ubuntu
3272:Cryptography Services
1437:"Version Information"
1170:
1155:free software license
1098:National Crime Agency
972:Further information:
606:plausible deniability
600:Plausible deniability
254:on-the-fly encryption
4676:Quantum cryptography
4600:Trusted timestamping
3935:(15 November 2013),
3604:(6 September 2013).
2778:on 13 September 2012
2722:on 13 September 2012
2606:Adobe Creative Suite
2378:on 27 December 2008.
2341:on 17 September 2012
2155:"Modes of Operation"
1238:TrueCrypt Foundation
1229:with a company name
1221:with a company name
1147:open source licenses
1100:(NCA) on charges of
1096:was arrested by the
1080:detectives from the
1044:government filed an
927:Operation Satyagraha
912:privilege escalation
872:Concordia University
826:. Potentially every
803:The "Stoned" bootkit
696:real-time encryption
683:direct memory access
52:TrueCrypt Foundation
4439:Cryptographic nonce
2744:(23 October 2009).
2712:"Physical Security"
2634:"Incompatibilities"
2498:on 24 January 2013.
2250:on 26 February 2008
2165:on 4 September 2013
1673:"The Next Big Deal"
1388:on 5 December 2012.
1178:Linux distributions
1004:external hard drive
992:Metropolitan Police
843:hardware keyloggers
665:TrueCrypt supports
575:backward compatible
443:TrueCrypt supports
5220:Facebook Messenger
4545:Subliminal channel
4529:Pseudorandom noise
4476:Key (cryptography)
4166:tmsearch.uspto.gov
3970:on 29 October 2013
3709:. 27 February 2014
3542:(30 August 2013),
3217:"Truecrypt report"
2614:. 16 November 2009
1357:library.morph.zone
1107:Magistrate's Court
994:while en route to
978:On 18 August 2013
941:dictionary attacks
671:multi-core systems
551:Modes of operation
242:is a discontinued
60:February 2004
5674:
5673:
5524:Service providers
5258:
5257:
5064:Check Point VPN-1
4726:
4725:
4722:
4721:
4605:Key-based routing
4595:Trapdoor function
4466:Digital signature
4111:on 17 August 2014
4098:Green, Matthew D.
3886:TrueCrypt License
3644:Phoenix New Times
3015:on 18 August 2010
2836:. Peter Kleissner
2807:. Peter Kleissner
2122:"Hash Algorithms"
1938:on 8 January 2013
1694:"Version History"
1288:on 8 January 2013
1282:"Version History"
785:evil maid attacks
771:device capturing
758:Physical security
733:Security concerns
715:FlexNet Publisher
560:mode of operation
502:Encryption scheme
439:Operating systems
355:digital signature
311:, had stolen the
237:
236:
200:TrueCrypt License
171:List of languages
16:(Redirected from
5734:
5664:
5663:
5654:
5653:
5502:operating system
5500:Security-focused
5448:
5273:
4848:
4753:
4746:
4739:
4730:
4712:
4711:
4540:Insecure channel
4376:
4369:
4362:
4353:
4349:
4280:
4275:
4274:
4272:Official website
4258:
4256:
4254:
4252:
4246:CitizenAudit.org
4243:
4235:
4229:
4228:
4226:
4224:
4219:. 19 August 2009
4209:
4203:
4202:
4200:
4198:
4184:
4178:
4176:
4174:
4172:
4158:
4152:
4151:
4150:
4148:
4127:
4121:
4120:
4118:
4116:
4110:
4100:(16 June 2014).
4094:
4088:
4087:
4085:
4083:
4072:
4066:
4065:
4063:
4061:
4046:
4040:
4034:
4028:
4022:
4016:
4010:
4004:
3998:
3992:
3986:
3980:
3979:
3977:
3975:
3966:. Archived from
3959:
3953:
3952:
3951:
3949:
3929:
3920:
3914:
3908:
3902:
3896:
3883:
3877:
3867:
3861:
3855:
3849:
3839:
3833:
3823:
3817:
3807:
3801:
3791:
3785:
3784:
3782:
3780:
3759:
3753:
3752:
3750:
3748:
3725:
3719:
3718:
3716:
3714:
3693:
3687:
3686:
3684:
3682:
3665:
3659:
3658:
3657:
3655:
3646:, archived from
3633:
3627:
3626:
3624:
3622:
3612:
3602:Greenwald, Glenn
3598:
3592:
3591:
3589:
3587:
3567:
3561:
3560:
3559:
3557:
3536:
3527:
3513:
3507:
3497:
3491:
3485:
3484:
3483:
3481:
3464:
3458:
3457:
3456:
3454:
3440:
3434:
3433:
3432:
3430:
3413:
3407:
3406:
3404:
3402:
3390:
3384:
3383:
3372:
3366:
3365:
3354:
3348:
3347:
3345:
3343:
3334:. Archived from
3316:
3310:
3309:
3307:
3305:
3290:
3284:
3283:
3281:
3279:
3264:
3258:
3257:
3255:
3253:
3238:
3232:
3231:
3229:
3227:
3212:
3206:
3205:
3204:
3202:
3182:
3176:
3175:
3174:
3172:
3151:
3145:
3144:
3143:
3141:
3120:
3114:
3113:
3111:
3109:
3098:
3092:
3091:
3089:
3087:
3076:
3070:
3069:
3067:
3065:
3056:. Archived from
3046:
3040:
3039:
3031:
3025:
3024:
3022:
3020:
3004:
2998:
2997:
2995:
2993:
2988:on 16 April 2013
2974:
2965:
2964:
2962:
2960:
2949:
2943:
2942:
2935:
2929:
2928:
2920:
2914:
2913:
2911:
2909:
2897:
2891:
2890:
2882:
2876:
2875:
2873:
2871:
2866:on 1 August 2009
2852:
2846:
2845:
2843:
2841:
2831:
2823:
2817:
2816:
2814:
2812:
2802:
2794:
2788:
2787:
2785:
2783:
2764:
2758:
2757:
2755:
2753:
2738:
2732:
2731:
2729:
2727:
2708:
2702:
2701:
2690:
2684:
2683:
2681:
2679:
2674:on 16 April 2013
2660:
2654:
2653:
2651:
2649:
2644:on 16 April 2013
2630:
2624:
2623:
2621:
2619:
2597:
2591:
2590:
2588:
2586:
2581:. Tom's Hardware
2570:
2564:
2563:
2561:
2559:
2554:. Tom's Hardware
2543:
2537:
2536:
2534:
2526:
2515:
2506:
2500:
2499:
2494:. Archived from
2484:
2478:
2477:
2475:
2473:
2463:
2457:
2456:
2454:
2452:
2443:. Archived from
2437:
2431:
2430:
2428:
2426:
2407:
2401:
2398:
2392:
2386:
2380:
2379:
2377:
2371:. Archived from
2366:
2357:
2351:
2350:
2348:
2346:
2327:
2321:
2320:
2318:
2316:
2311:on 16 April 2013
2297:
2286:
2285:
2283:
2281:
2266:
2260:
2259:
2257:
2255:
2236:
2227:
2226:
2224:
2222:
2207:
2201:
2200:
2198:
2196:
2190:
2181:
2175:
2174:
2172:
2170:
2151:
2142:
2141:
2139:
2137:
2118:
2112:
2111:
2109:
2107:
2092:
2086:
2085:
2083:
2081:
2070:
2064:
2063:
2061:
2059:
2048:
2042:
2041:
2039:
2037:
2026:
2020:
2019:
2017:
2015:
2004:
1998:
1997:
1995:
1993:
1982:
1973:
1972:
1970:
1968:
1957:
1948:
1947:
1945:
1943:
1924:
1918:
1917:
1915:
1913:
1898:
1889:
1888:Internet Archive
1883:
1877:
1876:
1869:
1863:
1862:
1861:
1859:
1838:
1832:
1831:
1830:
1828:
1814:
1808:
1807:
1805:
1803:
1788:
1782:
1781:
1780:
1778:
1757:
1751:
1750:
1748:
1746:
1737:. Archived from
1726:
1720:
1719:
1717:
1715:
1709:
1698:
1690:
1684:
1683:
1681:
1679:
1668:
1662:
1661:
1659:
1657:
1638:
1632:
1631:
1629:
1627:
1601:
1595:
1594:
1592:
1590:
1564:
1558:
1557:
1555:
1553:
1527:
1521:
1520:
1508:
1502:
1501:
1499:
1497:
1471:
1456:
1452:
1450:
1448:
1433:
1427:
1426:
1413:
1407:
1406:
1404:
1396:
1390:
1389:
1378:"Language Packs"
1374:
1368:
1367:
1365:
1363:
1349:
1343:
1342:
1341:
1339:
1325:
1312:
1311:
1304:
1298:
1297:
1295:
1293:
1278:
1143:source-available
1131:educated guesses
1032:personal effects
988:Heathrow Airport
885:Matthew D. Green
752:cold boot attack
646:randomness tests
416:
404:
400:
388:
381:
374:
359:software license
244:source-available
233:
232:
225:
222:
220:
204:source-available
125:Operating system
95:
93:
88:
70:
68:
63:
39:
32:
21:
5742:
5741:
5737:
5736:
5735:
5733:
5732:
5731:
5707:Disk encryption
5677:
5676:
5675:
5670:
5642:
5589:
5566:
5550:
5519:
5501:
5494:
5442:
5434:
5405:Java Anon Proxy
5381:
5267:
5266:
5264:Disk encryption
5254:
5230:Google Messages
5215:Signal Protocol
5169:
5136:
5103:
5050:
4947:
4899:
4842:
4835:
4762:
4757:
4727:
4718:
4700:
4629:
4385:
4380:
4329:on truecrypt.ch
4305:
4270:
4269:
4266:
4261:
4250:
4248:
4241:
4237:
4236:
4232:
4222:
4220:
4211:
4210:
4206:
4196:
4194:
4186:
4185:
4181:
4170:
4168:
4160:
4159:
4155:
4146:
4144:
4129:
4128:
4124:
4114:
4112:
4108:
4096:
4095:
4091:
4081:
4079:
4074:
4073:
4069:
4059:
4057:
4056:. 28 March 2014
4048:
4047:
4043:
4035:
4031:
4023:
4019:
4011:
4007:
3999:
3995:
3987:
3983:
3973:
3971:
3961:
3960:
3956:
3947:
3945:
3931:
3930:
3923:
3915:
3911:
3903:
3899:
3892:30 May 2012 at
3884:
3880:
3868:
3864:
3856:
3852:
3843:OBS Gyeongin TV
3840:
3836:
3824:
3820:
3813:, 2018.08.27.,
3808:
3804:
3797:, 2018.08.27.,
3792:
3788:
3778:
3776:
3761:
3760:
3756:
3746:
3744:
3727:
3726:
3722:
3712:
3710:
3702:BBC News Online
3695:
3694:
3690:
3680:
3678:
3667:
3666:
3662:
3653:
3651:
3635:
3634:
3630:
3620:
3618:
3610:
3600:
3599:
3595:
3585:
3583:
3569:
3568:
3564:
3555:
3553:
3540:Hosenball, Mark
3538:
3537:
3530:
3524:Wayback Machine
3514:
3510:
3493:
3492:
3488:
3479:
3477:
3466:
3465:
3461:
3452:
3450:
3442:
3441:
3437:
3428:
3426:
3415:
3414:
3410:
3400:
3398:
3392:
3391:
3387:
3374:
3373:
3369:
3356:
3355:
3351:
3341:
3339:
3322:(30 May 2014).
3318:
3317:
3313:
3303:
3301:
3292:
3291:
3287:
3277:
3275:
3266:
3265:
3261:
3251:
3249:
3240:
3239:
3235:
3225:
3223:
3214:
3213:
3209:
3200:
3198:
3188:(29 May 2014),
3184:
3183:
3179:
3170:
3168:
3153:
3152:
3148:
3139:
3137:
3122:
3121:
3117:
3107:
3105:
3100:
3099:
3095:
3085:
3083:
3078:
3077:
3073:
3063:
3061:
3048:
3047:
3043:
3033:
3032:
3028:
3018:
3016:
3006:
3005:
3001:
2991:
2989:
2976:
2975:
2968:
2958:
2956:
2951:
2950:
2946:
2937:
2936:
2932:
2922:
2921:
2917:
2907:
2905:
2899:
2898:
2894:
2884:
2883:
2879:
2869:
2867:
2854:
2853:
2849:
2839:
2837:
2829:
2825:
2824:
2820:
2810:
2808:
2800:
2796:
2795:
2791:
2781:
2779:
2766:
2765:
2761:
2751:
2749:
2742:Schneier, Bruce
2740:
2739:
2735:
2725:
2723:
2710:
2709:
2705:
2692:
2691:
2687:
2677:
2675:
2662:
2661:
2657:
2647:
2645:
2632:
2631:
2627:
2617:
2615:
2599:
2598:
2594:
2584:
2582:
2572:
2571:
2567:
2557:
2555:
2545:
2544:
2540:
2532:
2528:
2527:
2518:
2511:- see question
2507:
2503:
2486:
2485:
2481:
2471:
2469:
2465:
2464:
2460:
2450:
2448:
2439:
2438:
2434:
2424:
2422:
2421:on 19 June 2013
2409:
2408:
2404:
2399:
2395:
2387:
2383:
2375:
2364:
2359:
2358:
2354:
2344:
2342:
2329:
2328:
2324:
2314:
2312:
2299:
2298:
2289:
2279:
2277:
2270:"Hidden Volume"
2268:
2267:
2263:
2253:
2251:
2238:
2237:
2230:
2220:
2218:
2209:
2208:
2204:
2194:
2192:
2188:
2183:
2182:
2178:
2168:
2166:
2153:
2152:
2145:
2135:
2133:
2120:
2119:
2115:
2105:
2103:
2094:
2093:
2089:
2079:
2077:
2072:
2071:
2067:
2057:
2055:
2050:
2049:
2045:
2035:
2033:
2028:
2027:
2023:
2013:
2011:
2006:
2005:
2001:
1991:
1989:
1984:
1983:
1976:
1966:
1964:
1959:
1958:
1951:
1941:
1939:
1926:
1925:
1921:
1911:
1909:
1900:
1899:
1892:
1884:
1880:
1871:
1870:
1866:
1857:
1855:
1840:
1839:
1835:
1826:
1824:
1816:
1815:
1811:
1801:
1799:
1790:
1789:
1785:
1776:
1774:
1759:
1758:
1754:
1744:
1742:
1728:
1727:
1723:
1713:
1711:
1707:
1696:
1692:
1691:
1687:
1677:
1675:
1670:
1669:
1665:
1655:
1653:
1640:
1639:
1635:
1625:
1623:
1603:
1602:
1598:
1588:
1586:
1566:
1565:
1561:
1551:
1549:
1529:
1528:
1524:
1510:
1509:
1505:
1495:
1493:
1473:
1472:
1459:
1446:
1444:
1435:
1434:
1430:
1415:
1414:
1410:
1402:
1398:
1397:
1393:
1376:
1375:
1371:
1361:
1359:
1351:
1350:
1346:
1337:
1335:
1327:
1326:
1315:
1306:
1305:
1301:
1291:
1289:
1280:
1279:
1262:
1258:
1246:
1211:
1190:
1139:
1115:
1090:
1058:
1052:
984:Glenn Greenwald
976:
970:
951:
929:
924:
868:
866:Security audits
856:
805:
793:
760:
747:
735:
727:Adobe Photoshop
721:on products by
719:software piracy
711:
705:
669:encryption for
663:
641:
602:
583:
553:
509:
504:
477:
441:
433:Wayback Machine
414:
402:
398:
395:
386:
379:
372:
351:
304:
292:
286:
227:
217:
177:
176:
172:
97:
91:
89:
86:
66:
64:
61:
57:Initial release
42:
28:
23:
22:
15:
12:
11:
5:
5740:
5738:
5730:
5729:
5724:
5719:
5714:
5709:
5704:
5699:
5694:
5689:
5679:
5678:
5672:
5671:
5669:
5668:
5658:
5647:
5644:
5643:
5641:
5640:
5635:
5630:
5625:
5624:
5623:
5618:
5611:Hash functions
5608:
5603:
5597:
5595:
5594:Related topics
5591:
5590:
5588:
5587:
5582:
5576:
5574:
5568:
5567:
5565:
5564:
5558:
5556:
5552:
5551:
5549:
5548:
5543:
5538:
5533:
5527:
5525:
5521:
5520:
5518:
5517:
5512:
5506:
5504:
5496:
5495:
5493:
5492:
5487:
5482:
5477:
5472:
5467:
5462:
5457:
5451:
5449:
5436:
5435:
5433:
5432:
5427:
5422:
5417:
5412:
5407:
5402:
5397:
5391:
5389:
5383:
5382:
5380:
5379:
5374:
5373:
5372:
5362:
5357:
5352:
5347:
5342:
5337:
5332:
5327:
5322:
5317:
5312:
5307:
5302:
5297:
5292:
5287:
5282:
5276:
5274:
5260:
5259:
5256:
5255:
5253:
5252:
5249:
5248:
5247:
5242:
5237:
5232:
5227:
5222:
5212:
5207:
5202:
5201:
5200:
5195:
5185:
5179:
5177:
5171:
5170:
5168:
5167:
5162:
5157:
5152:
5146:
5144:
5138:
5137:
5135:
5134:
5129:
5124:
5119:
5113:
5111:
5105:
5104:
5102:
5101:
5096:
5091:
5086:
5081:
5076:
5071:
5066:
5060:
5058:
5052:
5051:
5049:
5048:
5043:
5038:
5033:
5028:
5023:
5018:
5013:
5008:
5003:
4998:
4993:
4988:
4983:
4978:
4973:
4968:
4963:
4961:BBM Enterprise
4957:
4955:
4949:
4948:
4946:
4945:
4940:
4935:
4930:
4925:
4920:
4915:
4909:
4907:
4901:
4900:
4898:
4897:
4892:
4887:
4882:
4877:
4872:
4867:
4862:
4856:
4854:
4845:
4837:
4836:
4834:
4833:
4828:
4823:
4818:
4813:
4808:
4803:
4793:
4788:
4783:
4778:
4772:
4770:
4764:
4763:
4758:
4756:
4755:
4748:
4741:
4733:
4724:
4723:
4720:
4719:
4717:
4716:
4705:
4702:
4701:
4699:
4698:
4693:
4691:Random numbers
4688:
4683:
4678:
4673:
4668:
4663:
4658:
4653:
4648:
4643:
4637:
4635:
4631:
4630:
4628:
4627:
4622:
4617:
4615:Garlic routing
4612:
4607:
4602:
4597:
4592:
4587:
4582:
4577:
4572:
4567:
4562:
4557:
4552:
4547:
4542:
4537:
4535:Secure channel
4532:
4526:
4525:
4524:
4513:
4508:
4503:
4498:
4496:Key stretching
4493:
4488:
4483:
4478:
4473:
4468:
4463:
4462:
4461:
4456:
4446:
4444:Cryptovirology
4441:
4436:
4431:
4429:Cryptocurrency
4426:
4421:
4416:
4415:
4414:
4404:
4399:
4393:
4391:
4387:
4386:
4381:
4379:
4378:
4371:
4364:
4356:
4346:
4345:
4340:
4330:
4324:
4315:
4304:
4301:
4300:
4299:
4293:
4287:
4281:
4265:
4264:External links
4262:
4260:
4259:
4230:
4204:
4179:
4153:
4122:
4104:Archived from
4089:
4067:
4041:
4029:
4017:
4005:
3993:
3981:
3954:
3921:
3909:
3897:
3878:
3873:, 2018.07.18,
3862:
3850:
3845:, 2018.07.19,
3834:
3829:, 2018/07/18,
3818:
3802:
3786:
3754:
3743:. 24 July 2014
3737:Alexandria, VA
3720:
3688:
3660:
3650:on 31 May 2014
3628:
3615:Democracy Now!
3593:
3582:on 31 May 2014
3562:
3528:
3508:
3486:
3459:
3435:
3408:
3397:. The Register
3385:
3367:
3349:
3338:on 31 May 2014
3311:
3285:
3259:
3233:
3207:
3186:Doctorow, Cory
3177:
3146:
3115:
3093:
3071:
3060:on 8 June 2014
3041:
3026:
2999:
2966:
2944:
2930:
2915:
2892:
2877:
2847:
2818:
2789:
2759:
2733:
2703:
2696:; et al.
2694:Alex Halderman
2685:
2655:
2625:
2592:
2565:
2538:
2516:
2501:
2479:
2458:
2432:
2402:
2393:
2381:
2352:
2322:
2287:
2261:
2228:
2202:
2176:
2143:
2132:on 25 May 2014
2113:
2087:
2065:
2043:
2021:
1999:
1974:
1949:
1919:
1890:
1878:
1864:
1833:
1823:, The Register
1809:
1783:
1752:
1741:on 30 May 2014
1721:
1685:
1663:
1652:on 5 June 2014
1646:Drivecrypt FAQ
1633:
1596:
1559:
1522:
1517:The New Yorker
1503:
1457:
1428:
1408:
1391:
1369:
1344:
1313:
1299:
1259:
1257:
1254:
1253:
1252:
1245:
1242:
1219:Ondrej Tesarik
1210:
1207:
1189:
1186:
1138:
1135:
1114:
1111:
1089:
1086:
1057:
1054:
1037:Democracy Now!
1012:Edward Snowden
996:Rio de Janeiro
969:
966:
950:
945:
928:
925:
923:
920:
867:
864:
855:
852:
804:
801:
792:
789:
759:
756:
746:
743:
734:
731:
707:Main article:
704:
701:
691:Tom's Hardware
662:
659:
640:
637:
630:Google Desktop
626:Microsoft Word
618:Bruce Schneier
601:
598:
582:
579:
552:
549:
508:
505:
503:
500:
476:
473:
440:
437:
394:
391:
350:
347:
303:
300:
285:
282:
262:storage device
235:
234:
215:
211:
210:
197:
191:
190:
185:
179:
178:
173:
170:
169:
166:
165:
162:
158:
157:
151:
145:
144:
127:
121:
120:
107:
103:
102:
99:
98:
96:(Discontinued)
84:
82:
76:
75:
72:
71:
58:
54:
53:
50:
44:
43:
40:
26:
24:
14:
13:
10:
9:
6:
4:
3:
2:
5739:
5728:
5725:
5723:
5720:
5718:
5715:
5713:
5710:
5708:
5705:
5703:
5700:
5698:
5695:
5693:
5690:
5688:
5687:2004 software
5685:
5684:
5682:
5667:
5659:
5657:
5649:
5648:
5645:
5639:
5636:
5634:
5631:
5629:
5626:
5622:
5619:
5617:
5614:
5613:
5612:
5609:
5607:
5604:
5602:
5599:
5598:
5596:
5592:
5586:
5583:
5581:
5578:
5577:
5575:
5573:
5569:
5563:
5560:
5559:
5557:
5553:
5547:
5544:
5542:
5539:
5537:
5534:
5532:
5529:
5528:
5526:
5522:
5516:
5513:
5511:
5508:
5507:
5505:
5503:
5497:
5491:
5488:
5486:
5483:
5481:
5478:
5476:
5473:
5471:
5468:
5466:
5463:
5461:
5458:
5456:
5453:
5452:
5450:
5446:
5441:
5437:
5431:
5428:
5426:
5423:
5421:
5418:
5416:
5413:
5411:
5408:
5406:
5403:
5401:
5398:
5396:
5393:
5392:
5390:
5388:
5384:
5378:
5375:
5371:
5368:
5367:
5366:
5363:
5361:
5358:
5356:
5353:
5351:
5348:
5346:
5343:
5341:
5338:
5336:
5333:
5331:
5328:
5326:
5323:
5321:
5318:
5316:
5313:
5311:
5308:
5306:
5303:
5301:
5298:
5296:
5293:
5291:
5288:
5286:
5283:
5281:
5278:
5277:
5275:
5271:
5265:
5261:
5250:
5246:
5243:
5241:
5238:
5236:
5233:
5231:
5228:
5226:
5223:
5221:
5218:
5217:
5216:
5213:
5211:
5208:
5206:
5203:
5199:
5196:
5194:
5191:
5190:
5189:
5186:
5184:
5181:
5180:
5178:
5176:
5172:
5166:
5163:
5161:
5158:
5156:
5153:
5151:
5148:
5147:
5145:
5143:
5139:
5133:
5130:
5128:
5125:
5123:
5120:
5118:
5115:
5114:
5112:
5110:
5106:
5100:
5097:
5095:
5092:
5090:
5087:
5085:
5084:SoftEther VPN
5082:
5080:
5077:
5075:
5072:
5070:
5067:
5065:
5062:
5061:
5059:
5057:
5053:
5047:
5044:
5042:
5039:
5037:
5034:
5032:
5029:
5027:
5024:
5022:
5019:
5017:
5014:
5012:
5009:
5007:
5004:
5002:
4999:
4997:
4994:
4992:
4989:
4987:
4984:
4982:
4979:
4977:
4974:
4972:
4969:
4967:
4966:Bouncy Castle
4964:
4962:
4959:
4958:
4956:
4954:
4953:TLS & SSL
4950:
4944:
4941:
4939:
4936:
4934:
4931:
4929:
4926:
4924:
4921:
4919:
4916:
4914:
4911:
4910:
4908:
4906:
4902:
4896:
4893:
4891:
4888:
4886:
4883:
4881:
4878:
4876:
4873:
4871:
4868:
4866:
4863:
4861:
4858:
4857:
4855:
4853:
4849:
4846:
4844:
4843:communication
4838:
4832:
4829:
4827:
4824:
4822:
4819:
4817:
4814:
4812:
4809:
4807:
4804:
4801:
4797:
4794:
4792:
4789:
4787:
4784:
4782:
4779:
4777:
4774:
4773:
4771:
4769:
4768:Email clients
4765:
4761:
4754:
4749:
4747:
4742:
4740:
4735:
4734:
4731:
4715:
4707:
4706:
4703:
4697:
4696:Steganography
4694:
4692:
4689:
4687:
4684:
4682:
4679:
4677:
4674:
4672:
4669:
4667:
4664:
4662:
4659:
4657:
4654:
4652:
4651:Stream cipher
4649:
4647:
4644:
4642:
4639:
4638:
4636:
4632:
4626:
4623:
4621:
4618:
4616:
4613:
4611:
4610:Onion routing
4608:
4606:
4603:
4601:
4598:
4596:
4593:
4591:
4590:Shared secret
4588:
4586:
4583:
4581:
4578:
4576:
4573:
4571:
4568:
4566:
4563:
4561:
4558:
4556:
4553:
4551:
4548:
4546:
4543:
4541:
4538:
4536:
4533:
4530:
4527:
4522:
4519:
4518:
4517:
4514:
4512:
4509:
4507:
4504:
4502:
4499:
4497:
4494:
4492:
4489:
4487:
4486:Key generator
4484:
4482:
4479:
4477:
4474:
4472:
4469:
4467:
4464:
4460:
4457:
4455:
4452:
4451:
4450:
4449:Hash function
4447:
4445:
4442:
4440:
4437:
4435:
4432:
4430:
4427:
4425:
4424:Cryptanalysis
4422:
4420:
4417:
4413:
4410:
4409:
4408:
4405:
4403:
4400:
4398:
4395:
4394:
4392:
4388:
4384:
4377:
4372:
4370:
4365:
4363:
4358:
4357:
4354:
4350:
4344:
4341:
4338:
4334:
4331:
4328:
4327:Past versions
4325:
4323:
4319:
4318:Past versions
4316:
4314:
4310:
4309:Past versions
4307:
4306:
4302:
4297:
4294:
4291:
4288:
4285:
4282:
4279:
4273:
4268:
4267:
4263:
4247:
4240:
4234:
4231:
4218:
4214:
4208:
4205:
4193:
4189:
4183:
4180:
4167:
4163:
4157:
4154:
4143:
4139:
4138:
4133:
4126:
4123:
4107:
4103:
4099:
4093:
4090:
4077:
4071:
4068:
4055:
4051:
4045:
4042:
4038:
4033:
4030:
4026:
4021:
4018:
4014:
4009:
4006:
4002:
3997:
3994:
3990:
3985:
3982:
3969:
3965:
3958:
3955:
3944:
3940:
3939:
3934:
3933:Phipps, Simon
3928:
3926:
3922:
3918:
3913:
3910:
3906:
3901:
3898:
3895:
3894:archive.today
3891:
3887:
3882:
3879:
3876:
3872:
3866:
3863:
3860:
3854:
3851:
3848:
3844:
3838:
3835:
3832:
3828:
3822:
3819:
3816:
3812:
3806:
3803:
3800:
3796:
3790:
3787:
3775:
3771:
3770:
3765:
3758:
3755:
3742:
3738:
3734:
3730:
3724:
3721:
3708:
3704:
3703:
3698:
3692:
3689:
3677:
3676:
3671:
3664:
3661:
3649:
3645:
3641:
3640:
3632:
3629:
3616:
3609:
3608:
3603:
3597:
3594:
3581:
3577:
3573:
3566:
3563:
3551:
3547:
3546:
3541:
3535:
3533:
3529:
3526:
3525:
3521:
3518:
3512:
3509:
3505:
3501:
3496:
3490:
3487:
3476:
3472:
3471:
3463:
3460:
3448:
3447:
3439:
3436:
3425:
3421:
3420:
3412:
3409:
3396:
3389:
3386:
3381:
3377:
3371:
3368:
3363:
3359:
3353:
3350:
3337:
3333:
3329:
3325:
3321:
3320:Gibson, Steve
3315:
3312:
3299:
3295:
3289:
3286:
3273:
3269:
3263:
3260:
3248:
3244:
3237:
3234:
3222:
3218:
3211:
3208:
3197:
3193:
3192:
3187:
3181:
3178:
3167:
3163:
3162:
3157:
3150:
3147:
3136:
3132:
3131:
3126:
3119:
3116:
3103:
3097:
3094:
3081:
3075:
3072:
3059:
3055:
3051:
3045:
3042:
3037:
3030:
3027:
3014:
3010:
3003:
3000:
2987:
2983:
2982:TrueCrypt FAQ
2979:
2973:
2971:
2967:
2954:
2948:
2945:
2940:
2934:
2931:
2926:
2919:
2916:
2903:
2896:
2893:
2888:
2881:
2878:
2865:
2861:
2857:
2851:
2848:
2835:
2828:
2822:
2819:
2806:
2799:
2793:
2790:
2777:
2773:
2769:
2763:
2760:
2747:
2743:
2737:
2734:
2721:
2717:
2713:
2707:
2704:
2699:
2695:
2689:
2686:
2673:
2669:
2665:
2659:
2656:
2643:
2639:
2635:
2629:
2626:
2613:
2612:Adobe Systems
2609:
2607:
2602:
2596:
2593:
2580:
2576:
2569:
2566:
2553:
2549:
2542:
2539:
2531:
2525:
2523:
2521:
2517:
2514:
2510:
2509:TrueCrypt FAQ
2505:
2502:
2497:
2493:
2489:
2483:
2480:
2468:
2462:
2459:
2447:on 7 May 2014
2446:
2442:
2436:
2433:
2420:
2416:
2412:
2406:
2403:
2397:
2394:
2390:
2385:
2382:
2374:
2370:
2363:
2356:
2353:
2340:
2336:
2332:
2326:
2323:
2310:
2306:
2302:
2296:
2294:
2292:
2288:
2275:
2271:
2265:
2262:
2249:
2245:
2241:
2235:
2233:
2229:
2216:
2212:
2206:
2203:
2187:
2180:
2177:
2164:
2160:
2156:
2150:
2148:
2144:
2131:
2127:
2123:
2117:
2114:
2101:
2097:
2091:
2088:
2075:
2069:
2066:
2053:
2047:
2044:
2031:
2025:
2022:
2009:
2003:
2000:
1987:
1981:
1979:
1975:
1962:
1956:
1954:
1950:
1937:
1933:
1929:
1923:
1920:
1907:
1903:
1897:
1895:
1891:
1887:
1882:
1879:
1874:
1868:
1865:
1854:
1850:
1849:
1844:
1837:
1834:
1822:
1821:
1813:
1810:
1798:
1797:The Daily Dot
1794:
1787:
1784:
1773:
1769:
1768:
1763:
1756:
1753:
1740:
1736:
1732:
1725:
1722:
1706:
1702:
1695:
1689:
1686:
1674:
1667:
1664:
1651:
1647:
1643:
1637:
1634:
1622:
1619:
1615:
1611:
1607:
1600:
1597:
1585:
1582:
1578:
1574:
1570:
1563:
1560:
1548:
1545:
1541:
1537:
1533:
1526:
1523:
1518:
1514:
1507:
1504:
1492:
1489:
1485:
1481:
1477:
1470:
1468:
1466:
1464:
1462:
1458:
1455:
1442:
1438:
1432:
1429:
1424:
1423:
1418:
1412:
1409:
1401:
1395:
1392:
1387:
1383:
1382:truecrypt.org
1379:
1373:
1370:
1358:
1354:
1348:
1345:
1333:
1332:
1324:
1322:
1320:
1318:
1314:
1309:
1303:
1300:
1287:
1283:
1277:
1275:
1273:
1271:
1269:
1267:
1265:
1261:
1255:
1251:
1248:
1247:
1243:
1241:
1239:
1234:
1232:
1228:
1227:David Tesarik
1224:
1220:
1216:
1208:
1206:
1204:
1198:
1194:
1187:
1185:
1183:
1179:
1173:
1169:
1167:
1163:
1158:
1156:
1152:
1148:
1144:
1136:
1134:
1132:
1126:
1124:
1120:
1112:
1110:
1108:
1103:
1099:
1095:
1087:
1085:
1083:
1079:
1075:
1071:
1067:
1063:
1056:James DeSilva
1055:
1053:
1050:
1047:
1043:
1039:
1038:
1033:
1029:
1025:
1024:reconstructed
1021:
1020:
1015:
1013:
1009:
1005:
1001:
997:
993:
989:
985:
981:
980:David Miranda
975:
968:David Miranda
967:
965:
962:
961:
957:ruled that a
956:
949:
946:
944:
942:
938:
934:
933:Daniel Dantas
926:
921:
919:
917:
913:
909:
904:
902:
899:According to
897:
894:
888:
886:
881:
880:cryptanalysis
875:
873:
865:
863:
861:
853:
851:
848:
844:
840:
835:
833:
829:
825:
821:
817:
814:
810:
807:The "Stoned"
802:
800:
798:
790:
788:
786:
782:
778:
774:
770:
769:bus-mastering
766:
757:
755:
753:
744:
742:
740:
732:
730:
728:
724:
720:
716:
710:
702:
700:
697:
693:
692:
686:
684:
680:
676:
672:
668:
660:
658:
655:
650:
647:
638:
636:
633:
631:
627:
623:
622:Windows Vista
619:
613:
611:
607:
599:
597:
595:
592:
588:
580:
578:
576:
571:
569:
565:
561:
558:
550:
548:
546:
542:
538:
534:
530:
526:
522:
518:
514:
506:
501:
499:
497:
493:
488:
486:
482:
481:DragonFly BSD
474:
472:
470:
466:
462:
458:
454:
450:
446:
438:
436:
434:
429:
426:
421:
418:
412:
408:
399:truecrypt.org
392:
390:
387:truecrypt.org
384:
377:
369:
367:
364:
360:
356:
348:
346:
343:
341:
337:
336:closed-source
333:
328:
324:
322:
317:
314:
310:
301:
299:
297:
291:
283:
281:
279:
274:
269:
267:
263:
259:
255:
251:
248:
245:
241:
231:
224:
216:
212:
208:
205:
201:
198:
196:
192:
189:
186:
184:
180:
167:
163:
159:
156:
152:
150:
146:
143:
139:
135:
131:
128:
126:
122:
119:
115:
111:
108:
104:
100:
83:
81:
80:Final release
77:
73:
59:
55:
51:
49:
45:
38:
33:
30:
19:
5440:File systems
5364:
5350:Private Disk
4646:Block cipher
4491:Key schedule
4481:Key exchange
4471:Kleptography
4434:Cryptosystem
4383:Cryptography
4333:Last version
4249:. Retrieved
4245:
4233:
4221:. Retrieved
4216:
4207:
4195:. Retrieved
4191:
4182:
4169:. Retrieved
4165:
4156:
4145:, retrieved
4137:Ars Technica
4135:
4125:
4113:. Retrieved
4106:the original
4092:
4080:. Retrieved
4070:
4058:. Retrieved
4053:
4044:
4032:
4020:
4008:
3996:
3984:
3972:. Retrieved
3968:the original
3957:
3946:, retrieved
3937:
3912:
3900:
3881:
3865:
3853:
3837:
3821:
3805:
3789:
3777:. Retrieved
3767:
3757:
3745:. Retrieved
3732:
3723:
3711:. Retrieved
3700:
3691:
3679:. Retrieved
3675:The Guardian
3673:
3663:
3652:, retrieved
3648:the original
3638:
3631:
3619:. Retrieved
3606:
3596:
3584:. Retrieved
3580:the original
3575:
3565:
3554:, retrieved
3544:
3515:
3511:
3494:
3489:
3478:, retrieved
3469:
3462:
3451:, retrieved
3445:
3438:
3427:, retrieved
3418:
3411:
3399:. Retrieved
3388:
3380:seclists.org
3379:
3370:
3361:
3352:
3340:. Retrieved
3336:the original
3327:
3314:
3302:. Retrieved
3297:
3288:
3276:. Retrieved
3271:
3262:
3250:. Retrieved
3246:
3236:
3224:. Retrieved
3220:
3210:
3199:, retrieved
3190:
3180:
3169:, retrieved
3161:Ars Technica
3159:
3149:
3138:, retrieved
3130:Ars Technica
3128:
3118:
3106:. Retrieved
3096:
3084:. Retrieved
3074:
3062:. Retrieved
3058:the original
3044:
3029:
3017:. Retrieved
3013:the original
3002:
2990:. Retrieved
2986:the original
2981:
2957:. Retrieved
2947:
2933:
2918:
2906:. Retrieved
2895:
2880:
2868:. Retrieved
2864:the original
2859:
2850:
2838:. Retrieved
2833:
2821:
2809:. Retrieved
2804:
2792:
2780:. Retrieved
2776:the original
2771:
2762:
2750:. Retrieved
2736:
2724:. Retrieved
2720:the original
2715:
2706:
2688:
2676:. Retrieved
2672:the original
2667:
2658:
2646:. Retrieved
2642:the original
2637:
2628:
2616:. Retrieved
2604:
2595:
2583:. Retrieved
2578:
2575:"Conclusion"
2568:
2556:. Retrieved
2551:
2548:"Conclusion"
2541:
2512:
2504:
2496:the original
2482:
2470:. Retrieved
2461:
2449:. Retrieved
2445:the original
2435:
2423:. Retrieved
2419:the original
2414:
2405:
2396:
2384:
2373:the original
2368:
2355:
2343:. Retrieved
2339:the original
2334:
2325:
2313:. Retrieved
2309:the original
2304:
2278:. Retrieved
2273:
2264:
2252:. Retrieved
2248:the original
2243:
2219:. Retrieved
2214:
2205:
2193:. Retrieved
2179:
2167:. Retrieved
2163:the original
2158:
2134:. Retrieved
2130:the original
2125:
2116:
2104:. Retrieved
2099:
2090:
2078:. Retrieved
2076:. redhat.com
2068:
2056:. Retrieved
2046:
2034:. Retrieved
2024:
2012:. Retrieved
2002:
1990:. Retrieved
1965:. Retrieved
1940:. Retrieved
1936:the original
1931:
1922:
1910:. Retrieved
1905:
1881:
1867:
1856:, retrieved
1848:Ars Technica
1846:
1836:
1825:, retrieved
1819:
1812:
1800:. Retrieved
1796:
1786:
1775:, retrieved
1767:Ars Technica
1765:
1755:
1743:. Retrieved
1739:the original
1724:
1712:. Retrieved
1700:
1688:
1676:. Retrieved
1666:
1654:. Retrieved
1650:the original
1645:
1636:
1624:. Retrieved
1599:
1587:. Retrieved
1562:
1550:. Retrieved
1525:
1516:
1506:
1494:. Retrieved
1445:. Retrieved
1440:
1431:
1420:
1411:
1394:
1386:the original
1381:
1372:
1360:. Retrieved
1356:
1347:
1336:, retrieved
1330:
1302:
1290:. Retrieved
1286:the original
1237:
1235:
1230:
1226:
1222:
1218:
1214:
1212:
1199:
1195:
1191:
1175:
1171:
1166:Simon Phipps
1159:
1140:
1127:
1116:
1091:
1059:
1051:
1035:
1017:
1016:
977:
958:
953:In 2012 the
952:
947:
930:
905:
898:
889:
876:
869:
857:
836:
806:
794:
761:
748:
736:
712:
689:
687:
667:parallelized
664:
651:
642:
634:
620:states that
614:
603:
584:
572:
554:
510:
495:
489:
478:
442:
430:
422:
419:
396:
385:visitors to
370:
352:
344:
329:
325:
318:
309:Paul Le Roux
305:
293:
270:
239:
238:
221:.sourceforge
164:38 languages
161:Available in
48:Developer(s)
29:
5555:Educational
5360:Sentry 2020
5305:DriveSentry
5225:Google Allo
4831:Thunderbird
4634:Mathematics
4625:Mix network
3548:, Reuters,
3298:ssi.gouv.fr
3278:22 February
3252:22 February
3196:Boing Boing
3082:. Indiegogo
1853:Condé Nasta
1735:SourceForge
1308:"TrueCrypt"
1010:sparked by
939:, who used
922:Legal cases
847:executables
661:Performance
654:boot loader
589:with a 512-
511:Individual
363:open source
349:Version 2.0
313:source code
5681:Categories
5546:NordLocker
5490:Tahoe-LAFS
5480:Rubberhose
5420:RetroShare
5295:Cryptoloop
5290:CrossCrypt
5270:Comparison
5240:TextSecure
5198:ChatSecure
5160:RetroShare
5150:Bitmessage
5089:strongSwan
4875:ChatSecure
4786:Claws Mail
4776:Apple Mail
4585:Ciphertext
4555:Decryption
4550:Encryption
4511:Ransomware
4142:Condé Nast
3974:26 October
3166:Condé Nast
3135:Condé Nast
3108:2 November
3086:2 November
2904:Simon Hunt
2014:25 January
1772:Condé Nast
1256:References
1209:Trademarks
1123:passphrase
1094:Lauri Love
1088:Lauri Love
537:RIPEMD-160
507:Algorithms
383:redirected
376:sub-domain
288:See also:
106:Written in
92:2014-05-28
5387:Anonymity
5377:VeraCrypt
5365:TrueCrypt
5355:Scramdisk
5320:FileVault
5285:BitLocker
5280:BestCrypt
5193:Cryptocat
5099:WireGuard
5001:MatrixSSL
4971:BoringSSL
4933:SecureCRT
4895:Profanity
4870:Centericq
4781:Autocrypt
4575:Plaintext
4313:FileHippo
4296:Veracrypt
4251:31 August
4223:31 August
4217:Nvsos.gov
4197:31 August
4171:31 August
4109:(Twitter)
3943:InfoWorld
3504:11th Cir.
3424:TechWorld
3401:13 August
2992:24 August
2889:. iTWire.
2768:"Malware"
2441:"Archive"
1988:. tc-play
1873:"Unknown"
1610:Newsgroup
1573:Newsgroup
1536:Newsgroup
1480:Newsgroup
1292:1 October
1215:TrueCrypt
1203:VeraCrypt
1078:Forensics
1046:affidavit
1028:plaintext
916:VeraCrypt
828:hard disk
820:Black Hat
765:keylogger
739:BitLocker
675:pipelined
545:Whirlpool
496:TrueCrypt
411:BitLocker
332:Scramdisk
278:VeraCrypt
258:partition
252:used for
240:TrueCrypt
219:truecrypt
18:Truecrypt
5656:Category
5562:CrypTool
5536:Tresorit
5465:eCryptfs
5425:Ricochet
5325:FreeOTFE
5315:eCryptfs
5300:dm-crypt
5245:WhatsApp
5122:Linphone
5074:Openswan
5041:TeamNote
5026:SChannel
5016:mbed TLS
4996:LibreSSL
4981:cryptlib
4913:Dropbear
4826:Sylpheed
4791:Enigmail
4714:Category
4620:Kademlia
4580:Codetext
4523:(CSPRNG)
4303:Archives
3890:Archived
3769:Techdirt
3550:archived
3520:Archived
3019:5 August
2959:5 August
2870:5 August
2840:5 August
2811:5 August
2492:FreeOTFE
2195:10 March
2010:. FEDORA
1992:14 March
1986:"README"
1705:Archived
1338:1 August
1244:See also
1074:Internet
1019:Guardian
960:John Doe
781:software
777:hardware
725:such as
568:CBC mode
564:LRW mode
529:cascaded
492:Dm-crypt
247:freeware
207:freeware
118:Assembly
5666:Commons
5585:BusKill
5580:USBKill
5531:Freenet
5415:Vidalia
5370:History
5345:PGPDisk
5251:SimpleX
5210:Session
5205:Proteus
5079:OpenVPN
5069:Hamachi
5046:wolfSSL
5036:stunnel
5011:OpenSSL
4943:wolfSSH
4923:OpenSSH
4865:BitlBee
4811:Outlook
4806:Kontact
4800:Gpg4win
4390:General
4339:website
4192:Tmdb.de
4147:22 June
4115:22 June
4060:23 July
3795:NewsPim
3774:Floor64
3733:fbi.gov
3611:(Video)
3362:PCWorld
3304:21 June
3226:4 April
2472:16 July
2451:2 March
2080:17 June
2058:10 June
2036:13 June
1967:17 July
1714:2 March
1618:Usenet:
1612::
1581:Usenet:
1575::
1544:Usenet:
1538::
1488:Usenet:
1482::
1454:Alt URL
1119:Druking
1113:Druking
1102:hacking
1066:charges
816:rootkit
809:bootkit
797:malware
791:Malware
541:SHA-512
525:Twofish
521:Serpent
513:ciphers
445:Windows
405:with a
284:History
250:utility
214:Website
195:License
142:MorphOS
130:Windows
90: (
67:2004-02
65: (
5638:S/MIME
5485:StegFS
5395:GNUnet
5235:Signal
5183:Matrix
5031:SSLeay
4986:GnuTLS
4938:WinSCP
4890:Kopete
4841:Secure
4501:Keygen
4322:GitHub
4082:1 June
4054:GitHub
3948:20 May
3827:Yonhap
3779:13 May
3747:15 May
3713:13 May
3681:13 May
3654:30 May
3621:30 May
3586:30 May
3556:30 May
3502: (
3498:,
3480:24 May
3453:24 May
3429:30 May
3342:30 May
3201:31 May
3171:31 May
3140:24 May
3064:31 May
2908:24 May
2782:24 May
2752:24 May
2726:24 May
2678:24 May
2648:24 May
2618:24 May
2585:24 May
2558:24 May
2425:24 May
2345:24 May
2315:24 May
2280:24 May
2254:24 May
2221:24 May
2169:24 May
2136:24 May
2106:24 May
1942:24 May
1912:24 May
1858:29 May
1827:29 May
1802:28 May
1777:28 May
1745:30 May
1656:28 May
1626:28 May
1620:
1589:28 May
1583:
1552:28 May
1546:
1496:28 May
1490:
1447:28 May
1422:GitHub
1362:11 May
1149:. The
1000:Berlin
839:launch
773:memory
587:PBKDF2
543:, and
523:, and
461:64-bit
457:32-bit
451:, and
321:usenet
226:
5541:Wuala
5515:Qubes
5510:Tails
5455:EncFS
5430:Wickr
5188:OMEMO
5155:Briar
5132:Zfone
5117:Jitsi
5021:BSAFE
4976:Botan
4928:PuTTY
4885:Jitsi
4880:climm
4860:Adium
4531:(PRN)
4242:(PDF)
3475:Wired
2830:(PDF)
2801:(PDF)
2533:(PDF)
2376:(PDF)
2365:(PDF)
2189:(PDF)
1708:(PDF)
1697:(PDF)
1678:1 May
1403:(PDF)
998:from
811:, an
723:Adobe
485:Linux
465:IA-64
453:Linux
202:3.1 (
153:3.30
138:Linux
134:macOS
5475:PEFS
5470:LUKS
5445:List
5340:LUKS
5335:geli
5330:GBDE
5127:Jami
5109:ZRTP
5094:Tinc
4991:JSSE
4253:2017
4225:2017
4199:2017
4173:2017
4149:2014
4117:2014
4084:2014
4062:2018
3976:2013
3950:2014
3781:2016
3749:2016
3715:2016
3683:2016
3656:2014
3623:2014
3588:2014
3558:2014
3482:2014
3455:2014
3431:2014
3403:2010
3344:2014
3306:2014
3280:2015
3254:2015
3228:2015
3203:2014
3173:2014
3142:2014
3110:2013
3088:2013
3066:2014
3021:2009
2994:2011
2961:2009
2910:2014
2872:2009
2842:2009
2813:2009
2784:2014
2754:2014
2728:2014
2680:2014
2650:2014
2620:2014
2608:Help
2587:2014
2560:2014
2474:2014
2453:2017
2427:2014
2347:2014
2317:2014
2282:2014
2256:2014
2223:2014
2197:2007
2171:2014
2138:2014
2108:2014
2082:2014
2060:2014
2038:2014
2016:2012
1994:2014
1969:2011
1944:2014
1914:2014
1860:2014
1829:2014
1804:2014
1779:2014
1747:2014
1716:2017
1680:2016
1658:2014
1628:2014
1591:2014
1554:2014
1498:2014
1449:2014
1364:2023
1340:2014
1294:2009
1182:free
910:and
767:, a
594:salt
581:Keys
490:The
483:and
469:boot
459:and
449:OS X
223:.net
183:Type
149:Size
5460:EFS
5410:Tor
5400:I2P
5310:E4M
5175:DRA
5165:Tox
5142:P2P
5056:VPN
5006:NSS
4918:lsh
4905:SSH
4852:OTR
4821:PGP
4816:p≡p
4796:GPG
4335:on
4320:on
4311:on
3707:BBC
1068:of
990:by
937:FBI
893:NCC
832:TPM
813:MBR
787:".
779:or
591:bit
557:XTS
517:AES
296:E4M
268:).
114:C++
5683::
4244:.
4215:.
4190:.
4164:.
4140:,
4134:,
4052:.
3941:,
3924:^
3772:.
3766:.
3739::
3735:.
3731:.
3705:.
3699:.
3672:.
3642:,
3574:.
3531:^
3473:,
3422:,
3378:.
3360:.
3330:.
3326:.
3296:.
3270:.
3245:.
3219:.
3194:,
3164:,
3158:,
3133:,
3127:,
3052:.
2980:.
2969:^
2858:.
2832:.
2803:.
2770:.
2714:.
2666:.
2636:.
2610:.
2603:.
2577:.
2550:.
2519:^
2490:.
2413:.
2367:.
2333:.
2303:.
2290:^
2272:.
2242:.
2231:^
2213:.
2157:.
2146:^
2124:.
2098:.
1977:^
1952:^
1930:.
1904:.
1893:^
1851:,
1845:,
1795:.
1770:,
1764:,
1733:.
1699:.
1644:.
1616:.
1608:.
1579:.
1571:.
1542:.
1534:.
1515:.
1486:.
1478:.
1460:^
1439:.
1419:.
1380:.
1355:.
1316:^
1263:^
1233:.
1168::
1157:.
1133:.
1125:.
1062:IT
1042:UK
628:,
624:,
612:.
547:.
539:,
519:,
487:.
447:,
389:.
155:MB
140:,
136:,
132:,
116:,
112:,
5447:)
5443:(
5272:)
5268:(
4802:)
4798:(
4752:e
4745:t
4738:v
4375:e
4368:t
4361:v
4255:.
4227:.
4201:.
4175:.
4119:.
4086:.
4064:.
3978:.
3783:.
3751:.
3717:.
3685:.
3625:.
3590:.
3405:.
3382:.
3364:.
3346:.
3308:.
3282:.
3256:.
3230:.
3112:.
3090:.
3068:.
3038:.
3023:.
2996:.
2963:.
2912:.
2874:.
2844:.
2815:.
2786:.
2756:.
2730:.
2700:.
2682:.
2652:.
2622:.
2589:.
2562:.
2476:.
2455:.
2429:.
2349:.
2319:.
2284:.
2258:.
2225:.
2199:.
2173:.
2140:.
2110:.
2084:.
2062:.
2040:.
2018:.
1996:.
1971:.
1946:.
1916:.
1875:.
1806:.
1749:.
1718:.
1682:.
1660:.
1630:.
1593:.
1556:.
1519:.
1500:.
1451:.
1425:.
1405:.
1366:.
1310:.
1296:.
1105:(
264:(
209:)
110:C
94:)
69:)
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.