Are you using VeraCrypt as replacement to TrueCrypt ?

Discussion in 'polls' started by accessgranted, Mar 28, 2015.

?

Are you using VeraCrypt as replacement to TrueCrypt ?

  1. Yes, VeraCrypt is gonna be my encryption software of choice because... (please elaborate)

    20 vote(s)
    30.3%
  2. No, I tried VeraCrypt and do not like it, because... (please elaborate)

    2 vote(s)
    3.0%
  3. No, I still trust and use TrueCrypt and do not need any alternative at the moment

    19 vote(s)
    28.8%
  4. No, I use another alternative to Truecrypt, namely... (please cite and elaborate)

    6 vote(s)
    9.1%
  5. No, I do not use any encryption software, because... (please cite and elaborate)

    19 vote(s)
    28.8%
  1. syrinx

    syrinx Registered Member

    Joined:
    Apr 7, 2014
    Posts:
    427
    I began using verarypt before the truecrypt fiasco simply because it (the changes w iterations) made sense. The earliest builds of VeraCrypt were easy to verify as changes could be compared with the original source code of each and they did check out with only text and iteration changes. Now that Verarypt has taken the ball further (fixing issues reported in the audit and adding new features) it's not the same. So not being a dev or familiar with coding in general I currently take it with a leap of faith atm and haven't bothered looking at the source code with each revision any further as they'd easily be able to 'get one past me' if they tried to add something unsavory.

    For me at least, the fact he was improving upon it even before truecrypt vanished gives it a tad more credibility. Though if I was wearing a tin foil hat I might suggest that veracrypt was behind it from the start and they knew it was coming so they started building trust early so that they could exploit it later.
     
  2. ArchiveX

    ArchiveX Registered Member

    Joined:
    Apr 7, 2014
    Posts:
    1,501
    Location:
    .
    NO encryption software.
     
  3. Squeller

    Squeller Registered Member

    Joined:
    Sep 13, 2008
    Posts:
    20
    Pretty similar to me.

    I mean, what we did: PGP, GPG, Remailers, Nym servers etc etc. - I'd say there was honestly no real life necessity. And after all, PGP, signing and encrypting, is used by virtually nobody. Reality goes like this: If I do not know a way to open containers, break encryption, bruteforce passwords - there is no attack. I will not find anybody in my real life, who will be able to attack. (Until of course one day because of findings, suddenly things easily get broken). Lets be honest. 99.9% of mankind will not be able to reset windows passwords via Linux tools, 95% may not know what a byte or a file header is.
    "Kirche im Dorf lassen", as we say in german.
     
  4. luciddream

    luciddream Registered Member

    Joined:
    Mar 22, 2007
    Posts:
    2,545
    *drum roll please*..................................................................

    *symbol rings*............................. that I still trust TrueCrypt and see no reason to change
     
  5. Tipsy

    Tipsy Registered Member

    Joined:
    Aug 25, 2013
    Posts:
    207
    I am curious if answers to the poll are change now. Two important security vulnerabilites found in TrueCrypt in past weeks.
     
  6. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,883
    Location:
    Slovenia, EU
    Yes but none of them allowing access to encrypted content AFAIK.
     
  7. chrisretusn

    chrisretusn Registered Member

    Joined:
    Jun 16, 2004
    Posts:
    1,672
    Location:
    Philippines
    Changed my vote from " No, I still trust and use TrueCrypt and do not need any alternative at the moment " to Yes, "VeraCrypt is gonna be my encryption software of choice because... (please elaborate) "

    Not much to explain. I stuck with TrueCrypt for awhile, then decided it was time to convert. In fact I just converted my TrueCrypt containers to VeraCrypt format few minutes ago.
     
  8. dogbite

    dogbite Registered Member

    Joined:
    Dec 13, 2012
    Posts:
    1,290
    Location:
    EU
    I should give an update here. I ditched Veracrypt as I ditched Windows for Ubuntu so now I run LUKS.
     
  9. oliverjia

    oliverjia Registered Member

    Joined:
    Jul 21, 2005
    Posts:
    1,926
    No need to convert. Veracrypt has been supporting TC container for a while now.
     
  10. chrisretusn

    chrisretusn Registered Member

    Joined:
    Jun 16, 2004
    Posts:
    1,672
    Location:
    Philippines
    Yes it does support a TC container, provided you enable TrueCrypt Mode. Conversion was painless. It's done, all my container files are now in VeraCrypt format.
     
  11. luciddream

    luciddream Registered Member

    Joined:
    Mar 22, 2007
    Posts:
    2,545
    Could you elaborate please?... Is this just one of those things as usual that have to have a dozen other things fall into place, other vulnerabilities, software I don't use, etc... in order for it to be pulled off. Even physical access to the computer. If so I won't lose any sleep over it. I come to find that in pretty much every scenario this is the case and it doesn't affect me.
     
  12. Luis Luna

    Luis Luna Registered Member

    Joined:
    Nov 9, 2015
    Posts:
    1
    Hi guys,

    I need to encrypt the data in my laptop, not sure yet if entire drive or only a folder, anyway I can work with either options, and the time to log does not bother me.
    I've been following up all this 'fork' projects created from TrueCrypt and seems like I have a missing part of the discussions related to the licensing issues. I could not figure out what exactly is a problem for me like end user to use software like VeraCrypt or if those problems got solve somehow or just got ignored by everyone (developers and current users).

    I would like to use VeraCrypt, because of the support and feedback that a non-expert user like me can have by asking about the software that is still maintained (from developers and users).
    Can someone explain if all this licensing issues still remains and how do they affect end users?

    Thanks!
     
  13. Nisar

    Nisar Registered Member

    Joined:
    Nov 15, 2015
    Posts:
    1
    I am using veracrypt and yesterday accidentally my veracrypt volume named as " lock" in drive E of win 7 accidentally deleted without mounting veracrypt . I created another veracrypt volume in same drive I lost everything in my drive but still on searching it shows the data but it is not copied not moved . Anybody having any idea how to recover data is deeply requested
     
  14. Tipsy

    Tipsy Registered Member

    Joined:
    Aug 25, 2013
    Posts:
    207
    https://www.wilderssecurity.com/thre...-against-two-critical-truecrypt-flaws.380184/
     
  15. luciddream

    luciddream Registered Member

    Joined:
    Mar 22, 2007
    Posts:
    2,545
    Looks like the one vulnerability requires physical access to your box. The other relies on you already being infected with a certain type of malware + TC being in an unprotected, unisolated partition in order to elevate the privilege.

    Don't think I'll lose sleep over this one...
     
  16. affinityv

    affinityv Registered Member

    Joined:
    Aug 19, 2013
    Posts:
    3
    Location:
    Australia
  17. mantra

    mantra Registered Member

    Joined:
    Jan 25, 2005
    Posts:
    6,176
    hi
    i'm starting to use veracrypt because sadly truecrypt is gone , nobody wanted to developed a great software even the swiss
    but veracrypt is slow to mount a container and need high cpu to do it

    don't know why ,needs to much cpu and it's so slow to mount a file container
     
  18. freemannnn

    freemannnn Registered Member

    Joined:
    Mar 7, 2006
    Posts:
    6
    Location:
    greece
    bitlocker for me at w10 pro. the only thing i miss from truecrypt is the hotkey to force+dismount all.
     
  19. guest

    guest Guest

    If you have a password with more than 20 characters, you can specify a Volume PIM.
    The lower the PIM, the faster the speed of mounting volumes.
    You can read more about it there:
     
  20. mantra

    mantra Registered Member

    Joined:
    Jan 25, 2005
    Posts:
    6,176
    hi
    i use a keyfile only
    thanks mood
     
  21. menuet2

    menuet2 Registered Member

    Joined:
    Aug 7, 2008
    Posts:
    9
    There's so much misinformation in this thread! I was expecting better from WS.

    First off, the project's page states very clearly that the increased number of iterations "adds some delay only to the opening of encrypted partitions without any performance impact to the application use phase. This is acceptable to the legitimate owner but it makes it much harder for an attacker to gain access to the encrypted data." Projects like truecrack can brute-force ~200,000 passwords per minute because TrueCrypt immediately lets you know the password was wrong.

    Second, you can control the number of iterations.
     
  22. luciddream

    luciddream Registered Member

    Joined:
    Mar 22, 2007
    Posts:
    2,545
    Which is why using a Keyfile is so important.

    And using a 32 digit ASCII password doesn't hurt matters either.
     
  23. sukarof

    sukarof Registered Member

    Joined:
    Jun 22, 2004
    Posts:
    1,887
    Location:
    Stockholm Sweden
    I would like to use encryption on hard drives but I dont understand how everything works. I am afraid that if only one bit writes wrong when it is encrypted or goes wrong in some other way on an encrypted drive then that drive cant be decrypted again. I guess that sounds a bit silly. Has that even happened ever?
     
  24. RockLobster

    RockLobster Registered Member

    Joined:
    Nov 8, 2007
    Posts:
    1,812
    Yes it can happen you should always make backups.
     
  25. luciddream

    luciddream Registered Member

    Joined:
    Mar 22, 2007
    Posts:
    2,545

    I've never been a fanboy of anything... ever. I use what I believe is the best option. That is my one and only criteria.
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.