I began using verarypt before the truecrypt fiasco simply because it (the changes w iterations) made sense. The earliest builds of VeraCrypt were easy to verify as changes could be compared with the original source code of each and they did check out with only text and iteration changes. Now that Verarypt has taken the ball further (fixing issues reported in the audit and adding new features) it's not the same. So not being a dev or familiar with coding in general I currently take it with a leap of faith atm and haven't bothered looking at the source code with each revision any further as they'd easily be able to 'get one past me' if they tried to add something unsavory. For me at least, the fact he was improving upon it even before truecrypt vanished gives it a tad more credibility. Though if I was wearing a tin foil hat I might suggest that veracrypt was behind it from the start and they knew it was coming so they started building trust early so that they could exploit it later.
Pretty similar to me. I mean, what we did: PGP, GPG, Remailers, Nym servers etc etc. - I'd say there was honestly no real life necessity. And after all, PGP, signing and encrypting, is used by virtually nobody. Reality goes like this: If I do not know a way to open containers, break encryption, bruteforce passwords - there is no attack. I will not find anybody in my real life, who will be able to attack. (Until of course one day because of findings, suddenly things easily get broken). Lets be honest. 99.9% of mankind will not be able to reset windows passwords via Linux tools, 95% may not know what a byte or a file header is. "Kirche im Dorf lassen", as we say in german.
*drum roll please*.................................................................. *symbol rings*............................. that I still trust TrueCrypt and see no reason to change
I am curious if answers to the poll are change now. Two important security vulnerabilites found in TrueCrypt in past weeks.
Changed my vote from " No, I still trust and use TrueCrypt and do not need any alternative at the moment " to Yes, "VeraCrypt is gonna be my encryption software of choice because... (please elaborate) " Not much to explain. I stuck with TrueCrypt for awhile, then decided it was time to convert. In fact I just converted my TrueCrypt containers to VeraCrypt format few minutes ago.
Yes it does support a TC container, provided you enable TrueCrypt Mode. Conversion was painless. It's done, all my container files are now in VeraCrypt format.
Could you elaborate please?... Is this just one of those things as usual that have to have a dozen other things fall into place, other vulnerabilities, software I don't use, etc... in order for it to be pulled off. Even physical access to the computer. If so I won't lose any sleep over it. I come to find that in pretty much every scenario this is the case and it doesn't affect me.
Hi guys, I need to encrypt the data in my laptop, not sure yet if entire drive or only a folder, anyway I can work with either options, and the time to log does not bother me. I've been following up all this 'fork' projects created from TrueCrypt and seems like I have a missing part of the discussions related to the licensing issues. I could not figure out what exactly is a problem for me like end user to use software like VeraCrypt or if those problems got solve somehow or just got ignored by everyone (developers and current users). I would like to use VeraCrypt, because of the support and feedback that a non-expert user like me can have by asking about the software that is still maintained (from developers and users). Can someone explain if all this licensing issues still remains and how do they affect end users? Thanks!
I am using veracrypt and yesterday accidentally my veracrypt volume named as " lock" in drive E of win 7 accidentally deleted without mounting veracrypt . I created another veracrypt volume in same drive I lost everything in my drive but still on searching it shows the data but it is not copied not moved . Anybody having any idea how to recover data is deeply requested
Looks like the one vulnerability requires physical access to your box. The other relies on you already being infected with a certain type of malware + TC being in an unprotected, unisolated partition in order to elevate the privilege. Don't think I'll lose sleep over this one...
Pending moderation on other thread at this forum, please see my post there: https://www.wilderssecurity.com/thre...critical-truecrypt-flaws.380184/#post-2586698
hi i'm starting to use veracrypt because sadly truecrypt is gone , nobody wanted to developed a great software even the swiss but veracrypt is slow to mount a container and need high cpu to do it don't know why ,needs to much cpu and it's so slow to mount a file container
bitlocker for me at w10 pro. the only thing i miss from truecrypt is the hotkey to force+dismount all.
If you have a password with more than 20 characters, you can specify a Volume PIM. The lower the PIM, the faster the speed of mounting volumes. You can read more about it there:
There's so much misinformation in this thread! I was expecting better from WS. First off, the project's page states very clearly that the increased number of iterations "adds some delay only to the opening of encrypted partitions without any performance impact to the application use phase. This is acceptable to the legitimate owner but it makes it much harder for an attacker to gain access to the encrypted data." Projects like truecrack can brute-force ~200,000 passwords per minute because TrueCrypt immediately lets you know the password was wrong. Second, you can control the number of iterations.
Which is why using a Keyfile is so important. And using a 32 digit ASCII password doesn't hurt matters either.
I would like to use encryption on hard drives but I dont understand how everything works. I am afraid that if only one bit writes wrong when it is encrypted or goes wrong in some other way on an encrypted drive then that drive cant be decrypted again. I guess that sounds a bit silly. Has that even happened ever?
I've never been a fanboy of anything... ever. I use what I believe is the best option. That is my one and only criteria.