{"id":30226,"date":"2015-04-04T15:41:28","date_gmt":"2015-04-04T19:41:28","guid":{"rendered":"http:\/\/www.opensource.im\/uncategorized\/truecrypt-code-security-audit-complete-software-free-of-back-doors.php"},"modified":"2015-04-04T15:41:28","modified_gmt":"2015-04-04T19:41:28","slug":"truecrypt-code-security-audit-complete-software-free-of-back-doors","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/truecrypt-code-security-audit-complete-software-free-of-back-doors.php","title":{"rendered":"TrueCrypt code security audit complete; software free of back doors"},"content":{"rendered":"<p><p>    A crowdfunded third-party security audit of popular (and    shuttered) personal encryption tool TrueCrypt has concluded.    The effort, led by cryptographic expert Matthew Green found    that \"TrueCrypt appears to be a relatively well-designed piece    of crypto software,\" and that the audit \"found no evidence of    deliberate backdoors, or any severe design flaws that will make    the software insecure in most instances.\"  <\/p>\n<p>        The software isn't perfect. The audit team did find \"a few    glitches and some incautious programming\" related to the    Windows random number generator, and vulnerability to cache    timing attacks. Neither problem poses much in the way of issues    to users unless encryption and decryption are performed on a    shared machine, or a physically insecure machine where    miscreants can run code directly on the encrypting computer.  <\/p>\n<p>    TrueCrypt was an open-source freeware application used for    on-the-fly encryption. It could create a virtual encrypted disk    within a file, encrypt a disk partition, or the entire storage    device with pre-boot authentication. In the wake of the Snowden    revelations, a non-profit agency was crowdfunded and created to audit the    utility's encryption methodology, with the first phase of the    report having been completed in April.  <\/p>\n<p>    Speculation about the shutdown of the popular encryption    software was wide-ranging, with the most prevalent theory being    that the shutdown was a \"warrant canary,\" meaning that the    group may have received a subpoena from US courts demanding    encryption keys. Internet skeptics believe that the group may    have chosen to shut down, rather than fight or concede the keys    to the court.  <\/p>\n<p>    The repository hosting the utility, SourceForge, claims that    there is \"no indicator of account compromise\" and \"current    usage is consistent with past usage.\" Additionally, the last    major update was over two years ago with limited support on    newer operating systems, so all signs point to the program    being abandoned, rather than interfered with by external    forces.  <\/p>\n<p>    By Electronista Staff  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Original post:<br \/>\n<a target=\"_blank\" href=\"http:\/\/electronista.feedsportal.com\/c\/34342\/f\/625515\/s\/451be5f4\/sc\/28\/l\/0L0Smacnn0N0Carticles0C150C0A40C0A40Cshuttered0Bsecurity0Bsoftware0Bdeemed0Bsafe0Bto0Bfork0Bfor0Bfuture0Bproducts0C\/story01.htm\/RK=0\/RS=fU0iQ44Ah1f.MSP7ehyasllZS14-\" title=\"TrueCrypt code security audit complete; software free of back doors\">TrueCrypt code security audit complete; software free of back doors<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> A crowdfunded third-party security audit of popular (and shuttered) personal encryption tool TrueCrypt has concluded. The effort, led by cryptographic expert Matthew Green found that \"TrueCrypt appears to be a relatively well-designed piece of crypto software,\" and that the audit \"found no evidence of deliberate backdoors, or any severe design flaws that will make the software insecure in most instances.\" The software isn't perfect. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-30226","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/30226"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=30226"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/30226\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=30226"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=30226"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=30226"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}