CipherShed and VeraCrypt developers stand ready to step in for TrueCrypt now that the cryptanalysis phase of the audit is complete and no backdoors were discovered. Both open source projects sprung ...
The methods are the same as those of TrueCrypt: you can create individual file containers and mount them as drives, allowing you to keep your files encrypted. A container is actually a place that when ...
Two privilege escalation vulnerabilities in the last TrueCrypt build were discovered by James Forshaw of Google Project Zero, and patched in VeraCrypt. TrueCrypt may be a fond memory for most of its ...
A new security audit has found critical vulnerabilities in VeraCrypt, an open-source, full-disk encryption program that’s the direct successor to the widely popular, but now defunct, TrueCrypt. Users ...
The second, larger audit of TrueCrypt 7.1a has concluded, with no sign of the software-breaking flaw that its creators warned was there. What's this mean for the future of the code and the program's ...
For several years, TrueCrypt was the gold standard in PC disk decryption suites. That changed nearly 18 months ago, when the individuals who developed the software abruptly quit. The developers ...
[url=http://arstechnica.com/civis/viewtopic.php?p=30165439#p30165439:246kcwa8 said: aphoid[/url]":246kcwa8]The appeal of TrueCrypt, to me at least, is not that it ...
The German Federal Office for Information Security has created a detailed analysis of the software Truecrypt in 2010. The results ended up in the drawer, the public was not informed about the found ...
If you're still using TrueCrypt to protect your Windows disks, even though its developers abandoned it and said it was "not secure" last year, you may want to stop that. Google Project Zero researcher ...