At that point, a developer could either commercialize their work, or abandon it. A decade later, though, with less free time, it's much less fun. For a student or young developer interesting in cryptography, the reward is in the work itself, and in other people using the software. I believe TrueCrypt was started as a student project, and was no longer worth the effort to the developer(s). I'll mention my theory of what happened with TrueCrypt here, because it's relevant to a search for alternatives. Give it a couple of months before you start switching over to some other solution (which is likely to be less "battle-hardened" than the incredibly popular TrueCrypt anyway, and thus somewhat more likely to be insecure). TrueCrypt is pretty much just as good as it was before this happened. The last time TrueCrypt was updated was two years ago - it's stable software that doesn't need constant tweaking, so the developers bowing out is not a problem.Ĭhances are, someone will either fork TrueCrypt (version 3.1 of the TrueCrypt license seems to make this a legitimate possiblity) or create a replacement, possibly using the same container format. Despite the "security concerns" expressed in the TrueCrypt page, which were clearly a joke, there's no reason to think TrueCrypt has any significant vulnerabilities at this time, and the second phase of the audit will take place as scheduled. This link will take you to an article on that discusses their take on The 5 Best TrueCrypt Alternative Services Contact Us to book an appointment or to discuss your needs further.I've said this before in a few places, and it's (semi-) relevant here, but I really think people need to relax about replacing TrueCrypt. The problem with that solution is, however, that TrueCrypt has gone the way of the dinosaur and is now defunct. In the past, the solution was simple: just use TrueCrypt to encrypt data before shipping it off to the cloud for storage. Unfortunately, some services like Dropbox are notorious for poor security practices that make data easier for hackers to pluck than low-hanging fruit. Even if you use a cloud storage service that encrypts data during transport and storage, it’s possible for cloud storage employees and hackers to access your data (with the exception of zero-knowledge providers). It seems there are endless ways for third parties to capture your data. Not only does the average computer user need to protect data from hackers and viruses, but the NSA’s PRISM program is still active and ISPs are now allowed to spy on you, too. Securing your privacy has never been more important than it is now for several reasons.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
December 2022
Categories |