The only solace that I have is that Iâm reasonably careful about my sensitive information and Iâm well under the radar. I suppose the best thing to do is sit tight and not panic, then follow what reputable experts recommend.
Many have suggested intelligence agencies are behind this. A good conspiracy theory is always fun, but in this case, there may be an entirely prosaic justification.
Some wonder if the coder behind TrueCrypt has taken offense to the security audit his code is currently undergoing, and in response, has spitefully decided to close down the entire project.
The auditors checking the code have regularly criticized the codeâs quality. Theyâve also said nearly all the code appears to be the work of a single individual.
When closing down the project, the maintainer suggested users adopt a Microsoft product of extremely questionable usefulness. If the project were being shut down to help Truecrypt users, why recommend a solution that most believe to be insecure?
If this is a warrant canary, why recommend the Microsoft product? Closing down would be enough of a signal, more than enough. The source code is out there. If there were a hole, why not quietly point the security auditors towards that hole? If there is no hole, why not license the code under better terms?
The authorâs refusal to adopt a proper license combined with this extremely odd way of shutting down the project make a strong argument that petulance is driving this, not interference from intelligence agencies.
Fine. But then why write TrueCrypt in the first place? If the entire project was an exercise in ego, why remain anonymous?
As for the Microsoft recommendation: Iâm not going to say that any encryption shipping with the most popular desktop OS is backdoored by the NSA, Iâd just be surprised if it wasnât. I am not a TrueCrypt user, but I suspect other TrueCrypt users would laugh outright at such a recommendation. Therefore the recommendation serves two theoretical tinfoil-hat purposes: It complies with the letter of (supposed) government pressure, while simultaneously communicating (to the properly paranoid) to do the exact opposite of what is stated (i.e., donât use Bitlocker).
[quote=âisomorphic, post:5, topic:32938â]
Fine. But then why write TrueCrypt in the first place? If the entire project was an exercise in ego, why remain anonymous?[/quote]
Ego gratification isnât necessarily public: plenty of people will get a kick from privately doing something cool and challenging.
Just what I was thinking. After the Lavabit case (and who knows how many others?), itâs hard to believe that Truecrypt hadnât come under pressure from $GOVTDEPT to build a backdoor: $GOVTDEPT wouldnât be doing its job otherwise. And if you were Truecryptâs builder in that situation, what would you be most likely to do? Kill the project rather than compromise it, and recommend an alternative which $GOVTDEPT couldnât object to, but which the security-conscious would understandably be wary of.
Brian Krebs think that the warning page may be legitimate. Iâm not convinced yet.
However, a commenter on Krebsâs site suggested DiskCryptor, which is GPLâed, and supposed to be TC compatible. Time to do some extensive research and readingâŚ
Edited to add: Iâm beginning to wonder whether the TrueCrypt gang go a visit from a three-lettered agency, Ă la LevinsonâŚ
My Linux laptop for travel has whole-disk encryption - easy enough to do in Ubuntu and Fedora. If you are so concerned about security that you need the disk encryption, while also needing to move physical data around, thatâs the only real option.
Although, I can see some enterprising kernel hacker taking the shadow volume concept and building it into a filesystem somehowâŚ
Iâm agreeing with the prevailing theory that this is a variation on the Lavabit scenario: the Truecrypt team is shutting it all down, rather than be compromised.
My guess is that they had something of a contingency plan for this situation, and they worked out the code for the final version of Truecrypt, but didnât finish preparing supporting documentation. So there are fairly complete details on migrating from Truecrypt to Bitlocker on Windows, incomplete details on migrating to an OS X solution, and a few notes on Linux that amount to, âjust install whatever you can findâ.
I think itâs a fairly reasonable theory that the bizarre message â along with recommending alternatives that donât make sense (for Linux he just says âsearch for any package with the word âencryptionâ in itâ) â is designed to comply with the letter of a NSL while strongly setting off warning bells to anyone with any sense.
I donât think that suspecting he was visited by Feds is tinfoil-hatish in any way, in our current environment. We know full well that many tech giants have been made to put backdoors in their products, and that security products like Lavabit have been pressured into revealing their keys.
And someone as into security as the TC dev is exactly the kind of person who might put a bizarre dead-manâs switch in place.
This of course is the answer; those of us who have been using TrueCrypt know that it works and it work well; it DOES do the job it was designed for, and does it beautifully! It helps keep our stuff private! And THAT is what our âoverlordsâ truly hate: that it works! Whatâs better for them than to make people question itâs usability. Kind of a âreverseâ selling point!
If THEY hate it, YOUâRE gonna love it!
Nuff saidâŚ
Ok, so a Mac alternative would be appreciated.
Also: GODDAMMIT.
The author(s) are extremely secretive and have been shown to be rather cantankerous in the past on the rare occasions that they do make statements.
Truecrypt has also been largely unmaintained for a couple of years now.
My guess is that whomever was maintaining it got tired of the project, and then got a notice from someone that they found a vulnerability and basically just said âfuck itâ.
Why is the license a problem? If the developer(s) is/are anonymous then how would they stop someone from releasing a fork? Theyâd have to come out in to the open, and find a way of proving ownership.
Secondly, since when has legality ever stopped hackers? Just release anonymously, problem solved.
For those on Linux, crytpsetup
should be available in just about any distribution, and while setup is a little complicated the first time, it works pretty well.
It doesnât support multiple volumes with different keys, but some level of plausible deniability is had from the fact that the filesystem to be encrypted in created in a regular file, so if just appears to be a large file of random bits â with the appropriate name it could, for example, be asserted to just be some kind of binary data cache.
Creating the Volume
- Create a disk file of the appropriate size. To create a 10 MB file
system, for example:
dd if=/dev/zero of=/path/to/file bs=1M count=10
- Create the loopback and assign a password
losetup /dev/loop0 /path/to/file
       cryptsetup -c aes -y create container /dev/loop0
(You will be prompted for a password/phrase at the second command.)
- Create the filesystem, i.e.:
mke2fs -j /dev/mapper/container
Using the Volume
losetup /dev/loop0 /path/to/file
       cryptsetup -c aes -y create container /dev/loop0
       mount /dev/mapper/container /mount/point
When Finished
umount /mount/point
       cryptsetup remove container
       losetup -d /dev/loop0
This. They canât really show they werenât forced to fork over the signing keys (or lost control of them), and thatâs really the only thing that established that they were the authors. Without that, how do they enforce the license? How do we know theyâre the authors and have standing? Of course, IANAL, and IDKTROLMTMA (I donât know that rule of law means that much anymore).
I work in this area.
I think Marktech has it. To the best of my knowledge, the TC site never had a âWarrant Canaryâ. If theyâve been hit by an NSL, they can be compelled not to say that has happened, but canât be compelled to lie.
Saying that the program âmayâ have âunfixed security bugsâ is a true statement - itâs true of any non-trivial program. Changing stance from âthese are not thought to be serious, and we will fix themâ to âthese are utterly fatal, stop using the programâ, is a change in opinion, not a lie. Ditto posting an âupdateâ to the program.
As others have noted, the recommendations for replacements are ludicrous. The suggestion for OS X proposes setting up an encrypted virtual disk with an âEncryption Methodâ of âNoneâ. To anyone skilled in the art, these instructions stand out like a sore thumb; not factually wrong, but so odd as to call attention to themselves.
The longer we go without new communications from the devs, the more likely this scenario appears.
Can any actual lawyers weigh in on this, exactly what could the developer(s) of TC do if someone did decide to fork it? What jurisdictions would that apply to?
who would say what plausible deniability they have? then it wouldnât be plausibleâŚiâm on to you coryâŚ
The only solace that I have is that Iâm reasonably careful about my sensitive information and Iâm well under the radar.
Not anymoreâŚ
Britainâs service made a bit-for-bit copy of one of the drives that probably contained a Snowden partition when they raided the Guardian, as well as David Mirandaâs laptop (whether or not it contained anything.) They gave this to the USA and the NSA has it now. But itâs just sitting there. If they have it. They canât verify if they have it or not, but they think they may.
The NSA doesnât know what Snowden took and wants to know, badly. So they are going after TrueCrypt, because itâs widely known that Snowden used it. If they can crack TrueCrypt from the inside out, they have a shot at decrypting anything they might have from their raids.
TrueCrypt guy is going, pffffffff, Iâll just LavaBit the project. Iâm tired of it and I donât wanna deal with them. Here, NSA, take the source and my notes. Here, public, donât use this software because the shit hit the fan. Use⌠MICROSOFT instead, LOL. If you canât see what this recommendation means, you really SHOULD be using MICROSOFT you dimwits.
I think this is reasonable logic, not paranoia.