Feeds

TrueCrypt turmoil latest: Bruce Schneier reveals what he'll use instead

Plus other alternatives and theories behind disk-crypto util's demise

Secure remote control for conventional and virtual desktops

The TrueCrypt project abruptly imploded on Wednesday – leaving folks in the infosec world scratching heads and scrambling to recommend alternatives.

In the past hour, crypto-guru Bruce Schneier has told us he's switched back to Symantec's PGPDisk to encrypt his data.

"I have no idea what's going on with TrueCrypt," he added on his blog. "Speculations include a massive hack of the TrueCrypt developers, some Lavabit-like forced shutdown, and an internal power struggle within TrueCrypt. I suppose we'll have to wait and see what develops."

As The Register reported, visitors to the ‪official truecrypt.org‬ website were redirected to a SourceForge-hosted site, which warned the popular multi-platform disk-encryption software is insecure:

WARNING: Using TrueCrypt is not secure as it may contain unfixed security issues

This page exists only to help migrate existing data encrypted by TrueCrypt.

The development of TrueCrypt was ended in 5/2014 after Microsoft terminated support of Windows XP. Windows 8/7/Vista and later offer integrated support for encrypted disks and virtual disk images. Such integrated support is also available on other platforms (click here for more information). You should migrate any data encrypted by TrueCrypt to encrypted disks or virtual disk images supported on your platform.

The above message is included in the developer-signed executables of a new version of TrueCrypt, released this week and available now from the SourceForge site; version 7.2 pops up an alert during installation urging the user to migrate files away from the easy-to-use tool:

Screenshot of TrueCrypt 7.2 installing on Windows

This new build has been nobbled to prevent further encryption of data. It should not be relied upon to safeguard sensitive information. The previous version, 7.1a, was released in 2012.

At first, the truecrypt.org switcheroo appeared to be an act of web vandalism by miscreants who had compromised the super-secretive TrueCrypt development team.

But the inclusion of the above warning in the cryptographically-signed binaries strongly suggests that the message did really come from the anonymous developers of TrueCrypt – or whoever is in possession of its private key.

Matthew Green, a computer-science professor at Johns Hopkins University in Maryland, US, commented: "I think it's unlikely that an unknown hacker identified the Truecrypt developers, stole their signing key, and hacked their site."

Prof Green and Kenn White, a cloud security expert and engineer, are spearheading an effort to audit the source code of TrueCrypt 7.1a, which is available to download and build. Last month the software successfully cleared the first phase of an independent code-quality inspection, which “found no evidence of backdoors or intentional flaws”. A grassroots campaign raised $70,000 to pay for the professional audit, funds that the latest developments would suggest may have been wasted. An unrelated announcement on the audit project's progress was due to be made today.

"Our board is meeting this morning, and should have announcement mid-day on our plans. I think the community will be happy with the direction we're going," White told The Register.

Secure remote control for conventional and virtual desktops

More from The Register

next story
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
You really need to do some tech support for Aunty Agnes
Free anti-virus software, expires, stops updating and p0wns the world
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
You stupid BRICK! PCs running Avast AV can't handle Windows fixes
Fix issued, fingers pointed, forums in flames
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.