{"id":1179,"date":"2014-06-02T13:13:50","date_gmt":"2014-06-02T13:13:50","guid":{"rendered":"http:\/\/uktech.co.uk\/blog\/?p=1179"},"modified":"2014-06-04T16:01:16","modified_gmt":"2014-06-04T16:01:16","slug":"is-truecrypt-dead","status":"publish","type":"post","link":"https:\/\/www.uktech.co.uk\/blog\/2014\/06\/is-truecrypt-dead\/","title":{"rendered":"Is Truecrypt Dead?"},"content":{"rendered":"<p><a href=\"http:\/\/uktech.co.uk\/blog\/wp-content\/uploads\/2014\/06\/screenshot_43.png\"><img loading=\"lazy\" decoding=\"async\" class=\"pic aligncenter wp-image-1180 size-medium\" src=\"http:\/\/www.uktech.co.uk\/blog\/wp-content\/uploads\/2014\/06\/screenshot_43-300x257.png\" alt=\"screenshot_43\" width=\"300\" height=\"257\" srcset=\"https:\/\/www.uktech.co.uk\/blog\/wp-content\/uploads\/2014\/06\/screenshot_43-300x257.png 300w, https:\/\/www.uktech.co.uk\/blog\/wp-content\/uploads\/2014\/06\/screenshot_43.png 569w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<blockquote><p>The Gold Standard for free encryption is dead&#8230;.or is it?<\/p><\/blockquote>\n<p><!--more--><\/p>\n<p><span style=\"color: #333333;\">It&#8217;s a massive disappointment that the original developers appear to have pulled the plug, and are no longer going to develop Truecrypt.<\/span><\/p>\n<p>Now come the\u00a0blogs suggesting that Truecrypt is &#8216;insecure&#8217; &#8211; even only days after the developers announcement.<\/p>\n<p>Where did they get that idea from? Well, it was the original developers themselves, putting out the message on their web page &#8211; but is it true? Truecrypt, <em><strong>insecure<\/strong><\/em>?<\/p>\n<p>Truecrypt &#8211; virtually the only free encryption tool of note, has been very high profile since it&#8217;s creation. As such, it has sustained 10 years of abuse and punishment at the hands of those who would see it &#8216;cracked&#8217;.<\/p>\n<blockquote><p>The truth is they haven&#8217;t managed to crack Truecrypt.<\/p><\/blockquote>\n<p>Yep, that&#8217;s correct.<\/p>\n<p>Every single cracking effort, that has seen any <span style=\"text-decoration: underline;\"><em><strong>tiny<\/strong><\/em><\/span>\u00a0margin of success, could also be applied to every other similar encryption product.<\/p>\n<p>100% Security is a myth.<\/p>\n<p>Why? Simple:<\/p>\n<blockquote><p>No one tries to <em><strong>crack<\/strong> <\/em>encryption algorithms\u00a0any more.<\/p><\/blockquote>\n<p>It&#8217;s simply too hard. While we wait for quantum computing to change this fact, your biggest security threat is, and has always been, <em><strong>you<\/strong><\/em>.<\/p>\n<p>&#8216;Cracking&#8217; encryption has become a game for enthusiasts &#8211; in reality, there are <em><strong>much<\/strong><\/em>\u00a0 easier ways to gain access to encrypted data &#8211; which is\u00a0beyond the scope of this blog. However, one simple example to mull over, is that while\u00a0<em><strong>you<\/strong><\/em>\u00a0are accessing the data, it is unencrypted&#8230;<\/p>\n<h4>Free Alternatives<\/h4>\n<p>I have had very good experiences with <a href=\"https:\/\/diskcryptor.net\/wiki\/Main_Page\">DiskCryptor<\/a> (though it doesn&#8217;t support Win8 at the moment), for <em><strong>full disk encryption<\/strong><\/em>.<\/p>\n<p>To encrypt files and folders, Axcrypt used to be very good, though I&#8217;m not impressed with their decision to include an OpenCandy installer (opt out)&#8230;..in a security product!<\/p>\n<p>However, I&#8217;m not about to drop TC just yet &#8211; <a href=\"http:\/\/truecrypt.ch\/\">especially as it may become fully open source<\/a> &#8211; which would be awesome.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Gold Standard for free encryption is dead&#8230;.or is it?<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5,79,7],"tags":[],"class_list":["post-1179","post","type-post","status-publish","format-standard","hentry","category-encryption","category-global","category-security"],"_links":{"self":[{"href":"https:\/\/www.uktech.co.uk\/blog\/wp-json\/wp\/v2\/posts\/1179","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.uktech.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.uktech.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.uktech.co.uk\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.uktech.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=1179"}],"version-history":[{"count":13,"href":"https:\/\/www.uktech.co.uk\/blog\/wp-json\/wp\/v2\/posts\/1179\/revisions"}],"predecessor-version":[{"id":1245,"href":"https:\/\/www.uktech.co.uk\/blog\/wp-json\/wp\/v2\/posts\/1179\/revisions\/1245"}],"wp:attachment":[{"href":"https:\/\/www.uktech.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=1179"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.uktech.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=1179"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.uktech.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=1179"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}