|

TrueCrypt Mystery

If you’re not familiar with TrueCrypt, it a free utility that you can use to encrypt your data. I’ve used it for years, lots of people in the eDiscovery world have used it for years, among many other tech professionals, and I would imagine they continue to use it.

Given the large user base, and the nature of the tool to begin with, the current state of affairs is a huge concern. As ArsTechnica explains:

One of the official webpages for the widely used TrueCrypt encryption program says that development has abruptly ended and warns users of the decade-old tool that it isn’t safe to use.

“WARNING: Using TrueCrypt is not secure as it may contain unfixed security issues,” text in red at the top of TrueCrypt page on SourceForge states. The page continues: “This page exists only to help migrate existing data encrypted by TrueCrypt. The development of TrueCrypt was ended in 5/2014 after Microsoft terminated support of Windows XP. Windows 8/7/Vista and later offer integrated support for encrypted disks and virtual disk images. Such integrated support is also available on other platforms (click here for more information). You should migrate any data encrypted by TrueCrypt to encrypted disks or virtual disk images supported on your platform.”

So has the site been hacked? Is this a hoax? Are they really suggesting that everyone should stop using their software with no further comment or explanation? Who knows? It certainly bears watching for those of us who’ve been using it!

Similar Posts

  • | |

    Resume Metadata

    I had a random thought today while I was processing some e-discovery documents. I stumbled upon a resume, and noticed that the author name didn’t match the name on the resume. That got me thinking. Now, certainly there are plenty of reasons why the author name would not match the name on the resume, things…

  • What I’m Reading (weekly)

    Measure what you care about (re: the big sign over your desk) tags:MM SocNetPres Safer Internet Day: Do you know what your child is doing online? tags:CA MM Tech Download our Free E-Book: ‘TAR for Smart People’ tags:LitSupport MM Google is offering 2 GB of free Drive space for people who complete a security checkup…

  • Amazing

    Even though this happened Weds. night, I took the day off from blogging yesterday to let the absurdity of the situation fully sink in before writing about it. As many of you know, I have been actively seeking new employment options. Many of you also know, that I’ve had my share of bad experiences with…

  • The things I’ve seen

    This looks interesting: We’re calling it Dabble, with emphasis on the Db: it’s a database system for dabblers. We’d naturally be happy if professional developers, DBAs, and business analysts find our system useful, but we won’t be satisfied until we have something that works for everyone in the millions of small businesses and teams for…

  • This Week’s Links (weekly)

    Good Questions! | Ball in your Court tags: LitSupport MM Who Knew What When About the Form of Production tags: LitSupport MM The Dangers of Outlook Email for Discovery tags: LitSupport MM It’s the Parties’ Data, Stupid! tags: LitSupport MM Georgetown: An E-Discovery Disneyland tags: LitSupport MM “We Don’t Want To” is Not an Objection tags: LitSupport MM…

  • Links (weekly)

    The Dangers of Do-It-Yourself eDiscovery: A Warning to Lawyers and Business Leaders. tags: LitSupport MM eDiscovery is Just Discovery tags: LitSupport MM The Growing Mobile Forensic Headache tags: LitSupport MM After SOPA/PIPA? tags: Tech MM Taking passwords seriously tags: Tech MM 5 Tips for Breaking Into Litigation Support tags: LitSupport MM Bottom Line Driven Proportional…

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

To respond on your own website, enter the URL of your response which should contain a link to this post's permalink URL. Your response will then appear (possibly after moderation) on this page. Want to update or remove your response? Update or delete your post and re-enter your post's URL again. (Find out more about Webmentions.)