Truecrypt news
"Due to the fact that TrueCrypt is widely used and has many derived products, such as the German solution TrustedDisc, the present analysis of the security of TrueCrypt provides an important basis for the evaluation of the level of protection and possible improvements in further developments," says Casper. "Especially in mobile scenarios, as the use of laptops or USB storage media, the encryption of hard disks or containers make an essential contribution to the protection of critical data," adds Thomas Caspers, head of evaluation and operation of cryptosystems at BSI. "In these cases, TrueCrypt is relatively secure", summarizes the expert, "during operation, it is not really able to protect data". Furthermore, TrueCrypt protects encrypted data on disconnected laptops if they are stolen", Waidner said. "This applies for example on a backup, which is kept on a hard drive, or for a USB flash drive with encrypted data on it to send it via a messenger.
TRUECRYPT NEWS OFFLINE
"TrueCrypt is inherently not suitable to protect encrypted data against attackers who can repeatedly access the system," Michael Waidner explains, "unfortunately, this is often misunderstood."Īccording to the Fraunhofer experts, TrueCrypt provides especially good protection to store data offline on encrypted drives.
![truecrypt news truecrypt news](http://aptgadget.com/wp-content/uploads/2017/07/truecrypt-alternatives-1024x549.png)
![truecrypt news truecrypt news](https://2.bp.blogspot.com/-BLfHLTwwqjg/WGGgr90LR_I/AAAAAAAAI7g/KOW9BdelZWEttiYhQk3OQf6x7aRSLzjvQCLcB/s1600/TCHead-1.png)
To exploit the vulnerability, the attacker would have far-reaching access to the computer anyway, for example, via a Trojan. Michael Waidner, Director of Fraunhofer SIT, says: "The vulnerability should be closed, but it does not simplify access to encrypted data for the attacker".
TRUECRYPT NEWS CODE
The gap allows malicious code that already has access to the running computer system, to acquire expanded system rights. In late September, Google's Project Zero had discovered two previously unknown vulnerabilities in TrueCrypt, one of them classified as critical. The experts concluded that TrueCrypt is safer than previous examinations suggest. Eric Bodden, has also considered and reviewed the results of previous safety analyses. Experts of the Fraunhofer Institute for Secure Information Technology SIT have examined TrueCrypt for vulnerabilities and programming errors on behalf of the BSI. The open-source encryption solution TrueCrypt has been abandoned in June 2014 by its anonymous developers, leaving the many users of the solution merely an indication of possible vulnerabilities.
![truecrypt news truecrypt news](https://i.kinja-img.com/gawker-media/image/upload/s--e3oDnlxL--/c_scale,f_auto,fl_progressive,q_80,w_800/n50tjwk4dimg1ijqzao8.jpg)
In addition, Jetico has published source codes to prove there are no backdoors or related vulnerabilities.
TRUECRYPT NEWS SOFTWARE
The complete results of the safety study that Fraunhofer SIT has created under contract to the Federal Office for Security in Information Technology BSI are summarized in a report, which is available for download on the website of the BSI. HELSINKI, Finland - J In the wake of last weeks discontinuation of TrueCrypt, data protection software developer Jetico welcomes TrueCrypt users with a painless, copy-paste migration to BestCrypt data encryption software. A vulnerability found in late September this year, although problematical in general, however, has no relevance for the security of TrueCrypt itself, according to the the experts at Fraunhofer SIT. The Fraunhofer SIT has analyzed the encryption software TrueCrypt in terms of security vulnerabilities – the result: only in very rare cases, the cryptographic functions are vulnerable.