Are you using VeraCrypt as replacement to TrueCrypt ?

Discussion in 'polls' started by accessgranted, Mar 28, 2015.

?

Are you using VeraCrypt as replacement to TrueCrypt ?

  1. Yes, VeraCrypt is gonna be my encryption software of choice because... (please elaborate)

    20 vote(s)
    30.3%
  2. No, I tried VeraCrypt and do not like it, because... (please elaborate)

    2 vote(s)
    3.0%
  3. No, I still trust and use TrueCrypt and do not need any alternative at the moment

    19 vote(s)
    28.8%
  4. No, I use another alternative to Truecrypt, namely... (please cite and elaborate)

    6 vote(s)
    9.1%
  5. No, I do not use any encryption software, because... (please cite and elaborate)

    19 vote(s)
    28.8%
  1. syrinx

    syrinx Registered Member

    I began using verarypt before the truecrypt fiasco simply because it (the changes w iterations) made sense. The earliest builds of VeraCrypt were easy to verify as changes could be compared with the original source code of each and they did check out with only text and iteration changes. Now that Verarypt has taken the ball further (fixing issues reported in the audit and adding new features) it's not the same. So not being a dev or familiar with coding in general I currently take it with a leap of faith atm and haven't bothered looking at the source code with each revision any further as they'd easily be able to 'get one past me' if they tried to add something unsavory.

    For me at least, the fact he was improving upon it even before truecrypt vanished gives it a tad more credibility. Though if I was wearing a tin foil hat I might suggest that veracrypt was behind it from the start and they knew it was coming so they started building trust early so that they could exploit it later.
     
  2. ArchiveX

    ArchiveX Registered Member

    NO encryption software.
     
  3. Squeller

    Squeller Registered Member

    Pretty similar to me.

    I mean, what we did: PGP, GPG, Remailers, Nym servers etc etc. - I'd say there was honestly no real life necessity. And after all, PGP, signing and encrypting, is used by virtually nobody. Reality goes like this: If I do not know a way to open containers, break encryption, bruteforce passwords - there is no attack. I will not find anybody in my real life, who will be able to attack. (Until of course one day because of findings, suddenly things easily get broken). Lets be honest. 99.9% of mankind will not be able to reset windows passwords via Linux tools, 95% may not know what a byte or a file header is.
    "Kirche im Dorf lassen", as we say in german.
     
  4. luciddream

    luciddream Registered Member

    *drum roll please*..................................................................

    *symbol rings*............................. that I still trust TrueCrypt and see no reason to change
     
  5. Tipsy

    Tipsy Registered Member

    I am curious if answers to the poll are change now. Two important security vulnerabilites found in TrueCrypt in past weeks.
     
  6. Minimalist

    Minimalist Registered Member

    Yes but none of them allowing access to encrypted content AFAIK.
     
  7. chrisretusn

    chrisretusn Registered Member

    Changed my vote from " No, I still trust and use TrueCrypt and do not need any alternative at the moment " to Yes, "VeraCrypt is gonna be my encryption software of choice because... (please elaborate) "

    Not much to explain. I stuck with TrueCrypt for awhile, then decided it was time to convert. In fact I just converted my TrueCrypt containers to VeraCrypt format few minutes ago.
     
  8. dogbite

    dogbite Registered Member

    I should give an update here. I ditched Veracrypt as I ditched Windows for Ubuntu so now I run LUKS.
     
  9. oliverjia

    oliverjia Registered Member

    No need to convert. Veracrypt has been supporting TC container for a while now.
     
  10. chrisretusn

    chrisretusn Registered Member

    Yes it does support a TC container, provided you enable TrueCrypt Mode. Conversion was painless. It's done, all my container files are now in VeraCrypt format.
     
  11. luciddream

    luciddream Registered Member

    Could you elaborate please?... Is this just one of those things as usual that have to have a dozen other things fall into place, other vulnerabilities, software I don't use, etc... in order for it to be pulled off. Even physical access to the computer. If so I won't lose any sleep over it. I come to find that in pretty much every scenario this is the case and it doesn't affect me.
     
  12. Luis Luna

    Luis Luna Registered Member

    Hi guys,

    I need to encrypt the data in my laptop, not sure yet if entire drive or only a folder, anyway I can work with either options, and the time to log does not bother me.
    I've been following up all this 'fork' projects created from TrueCrypt and seems like I have a missing part of the discussions related to the licensing issues. I could not figure out what exactly is a problem for me like end user to use software like VeraCrypt or if those problems got solve somehow or just got ignored by everyone (developers and current users).

    I would like to use VeraCrypt, because of the support and feedback that a non-expert user like me can have by asking about the software that is still maintained (from developers and users).
    Can someone explain if all this licensing issues still remains and how do they affect end users?

    Thanks!
     
  13. Nisar

    Nisar Registered Member

    I am using veracrypt and yesterday accidentally my veracrypt volume named as " lock" in drive E of win 7 accidentally deleted without mounting veracrypt . I created another veracrypt volume in same drive I lost everything in my drive but still on searching it shows the data but it is not copied not moved . Anybody having any idea how to recover data is deeply requested
     
  14. Tipsy

    Tipsy Registered Member

    https://www.wilderssecurity.com/thre...-against-two-critical-truecrypt-flaws.380184/
     
  15. luciddream

    luciddream Registered Member

    Looks like the one vulnerability requires physical access to your box. The other relies on you already being infected with a certain type of malware + TC being in an unprotected, unisolated partition in order to elevate the privilege.

    Don't think I'll lose sleep over this one...
     
  16. affinityv

    affinityv Registered Member

  17. mantra

    mantra Registered Member

    hi
    i'm starting to use veracrypt because sadly truecrypt is gone , nobody wanted to developed a great software even the swiss
    but veracrypt is slow to mount a container and need high cpu to do it

    don't know why ,needs to much cpu and it's so slow to mount a file container
     
  18. freemannnn

    freemannnn Registered Member

    bitlocker for me at w10 pro. the only thing i miss from truecrypt is the hotkey to force+dismount all.
     
  19. guest

    guest Guest

    If you have a password with more than 20 characters, you can specify a Volume PIM.
    The lower the PIM, the faster the speed of mounting volumes.
    You can read more about it there:
     
  20. mantra

    mantra Registered Member

    hi
    i use a keyfile only
    thanks mood
     
  21. menuet2

    menuet2 Registered Member

    There's so much misinformation in this thread! I was expecting better from WS.

    First off, the project's page states very clearly that the increased number of iterations "adds some delay only to the opening of encrypted partitions without any performance impact to the application use phase. This is acceptable to the legitimate owner but it makes it much harder for an attacker to gain access to the encrypted data." Projects like truecrack can brute-force ~200,000 passwords per minute because TrueCrypt immediately lets you know the password was wrong.

    Second, you can control the number of iterations.
     
  22. luciddream

    luciddream Registered Member

    Which is why using a Keyfile is so important.

    And using a 32 digit ASCII password doesn't hurt matters either.
     
  23. sukarof

    sukarof Registered Member

    I would like to use encryption on hard drives but I dont understand how everything works. I am afraid that if only one bit writes wrong when it is encrypted or goes wrong in some other way on an encrypted drive then that drive cant be decrypted again. I guess that sounds a bit silly. Has that even happened ever?
     
  24. RockLobster

    RockLobster Registered Member

    Yes it can happen you should always make backups.
     
  25. luciddream

    luciddream Registered Member


    I've never been a fanboy of anything... ever. I use what I believe is the best option. That is my one and only criteria.
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.
    Dismiss Notice