People started thinking that there are vulnerabilities within the program. Even Google has confirmed that the data is not safe. People started worrying about their data and its safety, and the main question was how secure is TrueCrypt? Is It Secure? Google’s Project Zero actually managed to find 2 major flaws that were unknown before. ![]() Since people wanted an answer, researchers decided to find out. The Fraunhofer Institute for Secure Information Technology was the one who tried to find out. They decided to analyze the last known stable version of the program in 2015. The report they’ve submitted has had 77 pages, and it found even more bugs. Still, they decided that the flaws are not that severe, and so they pronounced that the program is safe to use. At least for its main use, which is encrypting the data on hard drives or USB drives. When asked about the bugs that Google has found earlier, researchers confirmed them. Still, according to them, the very nature of the bugs will not allow access to encrypted data. That means that attackers can’t use them to break the encryption or access the info. Yet, when the researchers tried to check whether the computer’s memory or mounted drive would be safe, the results were not as good. According to their research, mounting of the drive stores the encryption key in the device memory. Also, it’s not that hard to recover it, which means that it can break the encryption if found. The researchers have stated that this scenario isn’t very likely to happen. The potential hackers can only get the key if they mount the encrypted container. If that’s the case, they’ll have access to the data anyway.Īnother way to get to the data is if the computer goes into hibernation after you mount the container. And if someone can get to the device while the container itself is open, then the data is not safe anyway. The point is, don’t ever let your computer go into hibernation after mounting the encrypted drives. When it comes to whether or not to use it, it depends. You should be okay if you’re using one of the original versions that have managed to stick around on some of the older systems. Still, it’s probably less safe for use on mounted drives, as we saw previously.Īs for the new users, if they try to install it and use it now, they would be at risk. Security and safety of any software depend on constant updates, fixes, and producing new versions. #Truecrypt alternative 2015 updateĪnd remember, TrueCrypt didn’t receive an official update for three years now. ![]() ![]() You can probably find many torrents or even standalone websites that claim to have the real TrueCrypt copy. These sources aren’t official and you shouldn’t trust them, especially because the product is most likely tampered with. If you don’t know exactly what you are doing when it comes to software, you might be at much bigger risk that way. Github also has several archived copies, and the code can be audited there. ![]() On the other hand, real experts didn’t have a hand in such tasks for a long time. The reason for that is the fact that the process takes a lot of time, and it’s expensive too. One of the Github repositories allegedly holds a verified copy, and even the Open Crypto Project says so. However, many users are still skeptical about using it because of the belief that TrueCrypt has several backdoors used by the government.įor those who insist on using TrueCrypt, the Github’s copy (version 7.1) is most likely the best option. However, using an alternative is a much safer choice, and there are many that can do the job. Some of them even came from TrueCrypt itself, and others came to be on their own. We have six suggestions for an alternative to TrueCrypt. LUKS – This is an alternative for Linux users, other systems won’t get much support.VeraCrypt – creates encrypted containers, works on Windows and Mac, and is came out of the original TrueCrypt.Each of them is more than capable of doing the job right, and in the end, the choice is yours. Bitlocker – this one isn’t an open-source and it can only encrypt full disks.It’s an open-source option and it supports several algorithms.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |