Sponsoring public Truecrypt audit

Discussion in 'privacy technology' started by BoerenkoolMetWorst, Oct 11, 2013.

Thread Status:
Not open for further replies.
  1. Seven64

    Seven64 Guest

    Re: Encryption for the paranoid: Verifying TrueCrypt source code and binaries

    Don't have to, already proven. :)
     
  2. Seven64

    Seven64 Guest

    NSA can bust any program made. Sorry for the peons that believe your files are safe. :'(
     
  3. Baserk

    Baserk Registered Member

    Joined:
    Apr 14, 2008
    Posts:
    1,321
    Location:
    AmstelodamUM
    Re: Sponsoring public Truecrypt audit, 'An update on Truecrypt'

    An update on the blog of Mathew Green who started the crowdfunding initiative, together with Kenn White. link

     
  4. PaulyDefran

    PaulyDefran Registered Member

    Joined:
    Dec 1, 2011
    Posts:
    1,163
    Yet Daniel Danta's hard drives are still encrypted...
     
  5. chiraldude

    chiraldude Registered Member

    Joined:
    Jul 3, 2010
    Posts:
    157
    The NSA keeps getting better at "cracking" encryption but pretty sure they still can't decrypt AES if the password is 20 random characters.
    If the NSA wants to get your data, they will probably not try to crack the encryption but will instead put a bunch of hidden cameras in your house so they can watch you type your password.
    Does this mean TrueCrypt is pointless? Of course not. If your data is encrypted, the NSA (or whoever) will have to put in some serious effort if they really want your data. Best to make them work for it instead of getting it for free.
     
  6. Dave0291

    Dave0291 Registered Member

    Joined:
    Nov 17, 2013
    Posts:
    553
    Location:
    U.S
    Or they can simply throw you in jail and leave you there until you give them the key. If they have enough evidence to come after you to begin with, they have enough to do that. Why put cameras in your house to watch you do anything, especially as something as silly as watch you type a password? Methods like Flame worked quite well until it spread to enough machines to get noticed by the security industry. For one individual or even a smaller crime ring, you'll never know it is there until they have enough on you that it doesn't matter. All they need do is capture the data in some form before the user runs it through their encryption program.
     
  7. chiraldude

    chiraldude Registered Member

    Joined:
    Jul 3, 2010
    Posts:
    157
    I was just giving one example. Bypassing the encryption is so much easier than breaking it. Torture, threats, cameras, keyloggers, whatever...
    Almost anything is easier than breaking encryption.
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.