XPost: talk.politics.crypto, alt.society.liberalism, alt.conspiracy   
   XPost: alt.linux   
   From: matttelles@sprynet.com   
      
   Dänk 42Ø wrote in   
   news:Dd2dnZ9z4MdF_BbOnZ2dnUVZ_qqdnZ2d@earthlink.com:   
      
   > As all you Ed Snowden fans have probably heard, the official TrueCrypt   
   > webpage has issued a warning that it contains "unfixed security   
   issues,"   
   > i.e. it has been compromised.   
      
   TrueCrypt, PGP, and all other encryption devices suffer from the same   
   problem. You need some form of public key. Someone built a tool back in   
   the early 2000s that would do just that. Later on, about 2010 or so, a   
   Russian company built a board that would do it.   
      
   You can always hack TrueCrypt, or BitLocker, or anything else through   
   brute force. The question has always been how long it takes. That number   
   goes down every year.   
      
   In TrueCrypt's case, I believe the rumors that state a backdoor exist   
   are absurd. The code is out there, if there were a backdoor, people   
   would have found it. My personal suspicion is that they are simply   
   trying to get people off it, since it really made no sense after XP.   
   They did store their data on SourceForge, including the private keys, so   
   I guess it is possible someone stole them before SourceForge forced   
   everyone to change passwords.   
      
   Matt   
      
   --- SoupGate-Win32 v1.05   
    * Origin: you cannot sedate... all the things you hate (1:229/2)   
|