

- #LINUX TRUECRYPT ALTERNATIVE FOR MAC#
- #LINUX TRUECRYPT ALTERNATIVE INSTALL#
- #LINUX TRUECRYPT ALTERNATIVE FULL#
- #LINUX TRUECRYPT ALTERNATIVE REGISTRATION#
- #LINUX TRUECRYPT ALTERNATIVE FREE#
The first phase of the recent TrueCrypt 7.1a audit “found no evidence of backdoors or otherwise intentionally malicious code” in the Windows version, and no “high-severity issues” were found (see the full report, which discloses some medium- and low-severity issues, at ). Most TrueCrypt users (whether on Mac, Windows, or Linux) who currently have their hard drives encrypted with TrueCrypt 7.1a probably have no major cause for concern, at least not at this time. Numerous security experts weighed in with their opinions, from the likes of Johns Hopkins cryptography professor Matthew Green (who was instrumental in initiating the recent and ongoing independent audit of TrueCrypt), noted cryptography expert Bruce Schneier, independent security reporter and researcher Brian Krebs, and Security Now! podcast host Steve Gibson (see also Gibson’s live discussion with Tom Merritt on Daily Tech News Show 2245). Others suggested that the idea of TrueCrypt’s developers urging users to switch to the completely closed-source Microsoft BitLocker solution, or to create an encrypted disk image on a Mac (with a screenshot showing “none” selected for the encryption, no less) rather than using Apple’s FileVault full-drive encryption, and telling Linux users to just “install any” encryption package all seemed so ludicrous that it might be the TrueCrypt developers’ version of a warrant canary, perhaps hinting at possible or actual attempts by a government agency to secretly undermine TrueCrypt’s security. Some worried that older versions of TrueCrypt may have been compromised as well, paranoically suggesting that the first letters of the words “not secure as” from the first sentence on the new SourceForge page might be a subtle hint that the NSA had a backdoor into the software. Some were suspicious that the mysterious new version contained malware (which wasn’t helped by the fact that Microsoft’s SmartScreen filter began blocking the download, which was subsequently reported in a fairly sensationalistic article by The Register).
#LINUX TRUECRYPT ALTERNATIVE INSTALL#
#LINUX TRUECRYPT ALTERNATIVE REGISTRATION#

The new TrueCrypt version was cryptographically signed with a key very similar to the one used to sign the previous version of the software, and the key was generated in 2012 around the time the old key expired, so if it was a fake then this stunt would have either been planned years in advance or else someone would have had to steal the developers’ private key.

#LINUX TRUECRYPT ALTERNATIVE FREE#
It’s multi-platform (Mac, Windows, and Linux), free and open-source software, and it’s widely believed to be virtually impenetrable. TrueCrypt has long been a widely respected whole-drive encryption product.
#LINUX TRUECRYPT ALTERNATIVE FOR MAC#
Recommended + Security News TrueCrypt is Dead What Does This Mean for Mac Users?
