{"id":29623,"date":"2015-03-09T20:46:34","date_gmt":"2015-03-10T00:46:34","guid":{"rendered":"http:\/\/www.opensource.im\/uncategorized\/truecrypt-security-audit-back-on-track-after-silence-and-uncertainty.php"},"modified":"2015-03-09T20:46:34","modified_gmt":"2015-03-10T00:46:34","slug":"truecrypt-security-audit-back-on-track-after-silence-and-uncertainty","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/cryptography\/truecrypt-security-audit-back-on-track-after-silence-and-uncertainty.php","title":{"rendered":"TrueCrypt security audit back on track after silence and uncertainty"},"content":{"rendered":"<p><p>    An effort to search for    cryptographic flaws in TrueCrypt, a popular disk encryption    program, will resume even though the software was abandoned by    its creators almost a year ago.  <\/p>\n<p>    For years TrueCrypt has been    the go-to open-source tool for people looking to encrypt files    on their computers, especially since its one of the few    solutions to allow encrypting the OS volume.  <\/p>\n<p>    In October 2013, cryptography    professor Matthew Green and security researcher Kenneth White    launched a project to     perform a professional security audit of TrueCrypt. This    was partly prompted by the leaks from former U.S. National    Security Agency contractor Edward Snowden that suggested the    NSA was engaged in efforts to undermine encryption.  <\/p>\n<p>    Green and Whites Open Crypto    Audit Project started accepting donations and contracted iSEC    Partners, a subsidiary of information assurance company NCC    Group, to probe critical parts of the TrueCrypt code for    software vulnerabilities. The firm found some issues,     but nothing critical that could be described as a backdoor.    Their report, published in April 2014, covered the first phase    of the audit.  <\/p>\n<p>    Phase two was supposed to    involve a formal review of the programs encryption functions,    with the goal of uncovering any potential errors in the    cryptographic implementationsbut then the unexpected    happened.  <\/p>\n<p>    In May 2014, the developers    of TrueCrypt, who had remained anonymous over the years for    privacy reasons, abruptly announced that     they were discontinuing the project and advised users to    switch to alternatives.  <\/p>\n<p>    This threw our plans for a    loop, Green said in a     blog post Tuesday. We had been planning a crowdsourced    audit to be run by Thomas Ptacek and some others. However in    the wake of TC pulling the plug, there were questions: Was this    a good use of folks time and resources? What about applying    those resources to the new Truecrypt forks that have sprung    up (or are being developed?)  <\/p>\n<p>    Truecrypt.  <\/p>\n<p>    Now, almost a year later, the    project is back on track. Ptacek, a cryptography expert and    founder of Matasano Security, will no longer lead the    cryptanalysis and the effort will no longer be crowdsourced.    Instead, phase two of the audit will be handled by Cryptography    Services, a team of consultants from iSEC Partners, Matasano,    Intrepidus Group, and NCC Group.  <\/p>\n<p>    The cost of professional    crypto audits is usually very high, exceeding the $70,000 the    Open Crypto Audit Project raised through crowdfunding. To keep    the price down, the project had to be flexible with its time    frame and work around Cryptography Services other    engagements.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read more:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.pcworld.com\/article\/2887052\/truecrypt-audit-back-on-track-after-silence-and-uncertainty.html\/RK=0\/RS=q1ZLJAZseu0Heh2Yr1bskY3Eb9k-\" title=\"TrueCrypt security audit back on track after silence and uncertainty\">TrueCrypt security audit back on track after silence and uncertainty<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> An effort to search for cryptographic flaws in TrueCrypt, a popular disk encryption program, will resume even though the software was abandoned by its creators almost a year ago. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1600],"tags":[],"class_list":["post-29623","post","type-post","status-publish","format-standard","hentry","category-cryptography"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/29623"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=29623"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/29623\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=29623"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=29623"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=29623"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}