Virtual Event Today: Ransomware Resilience & Recovery Summit - Login to Live Event
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Email Security

TrueCrypt Supporters Try to Keep Project Alive

TrueCrypt may have found new life courtesy of developers trying to resurrect the project.

TrueCrypt may have found new life courtesy of developers trying to resurrect the project.

Last week, the original developers of TrueCrypt unexpectedly announced they were no longing working on the tool. In a message, they stated that the open source, on-the-fly encryption software was not secure and recommended users migrate any data protected by TrueCrypt to encrypted disks or virtual disk images supported on their platform.

In response to the situation, developers Thomas Bruderer and Joseph Doekbrijder are organizing a team to either pick up where the original developers left off or build on its code as the basis of a new product.

“This is not a fork (yet), we just coordinate,” according to information on TrueCrypt.ch.

According to the site, the first priority is making the product available again. Next is finding interested and capable people to volunteer to help as well as addressing any legal issues. The third goal is to resolve any security threats and start a support group for continued development.

“TrueCrypt is a respected piece of security software, used by many to encrypt their sensitive files and entire hard drives,” blogged security researcher Graham Cluley. “Earlier this year, independent auditors found “no evidence of backdoors or intentional flaws” when examining its code. Nonetheless, the anonymous coders behind TrueCrypt have shut the door and pulled down the shades. The TrueCrypt.ch team (is) clearly frustrated by the abrupt cessation of the software, and (says) that they will do things differently.”

The Open Crypto Audit Project (OCAP) said on Twitter that it is going forward with a security audit of TrueCrypt’s code and will release it publicly later this year.

The very first version of TrueCrypt was released back in February 2004. Since then, it has been downloaded approximately 30 million times.

Advertisement. Scroll to continue reading.

Right now, TrueCrypt.ch is offering the latest version of TrueCrypt for download. There are other sources online that have some of the TrueCrypt releases available, such as ‘DrWhax/truecrypt-archive‘ and ‘syglug/truecrypt.

“It seems natural that others will step up to the plate to pick up future development,” said Steve Pate, chief architect for HyTrust. “We have seen this before when developers of other open source projects have moved on. There are over 190,000 lines of code in the TrueCrypt source, so getting up to speed for any new developers is going to be an uphill battle.”

Written By

Marketing professional with a background in journalism and a focus on IT security.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

Professional services company Slalom has appointed Christopher Burger as its first CISO.

Allied Universal announced that Deanna Steele has joined the company as CIO for North America.

More People On The Move

Expert Insights

Related Content

Cloud Security

Cloud security researcher warns that stolen Microsoft signing key was more powerful and not limited to Outlook.com and Exchange Online.

Compliance

Government agencies in the United States have made progress in the implementation of the DMARC standard in response to a Department of Homeland Security...

Email Security

Many Fortune 500, FTSE 100 and ASX 100 companies have failed to properly implement the DMARC standard, exposing their customers and partners to phishing...

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Cybercrime

Enterprise users have been warned that cybercriminals may be trying to phish their credentials by luring them with fake emails that appear to be...

Cloud Security

Microsoft and Proofpoint are warning organizations that use cloud services about a recent consent phishing attack that abused Microsoft’s ‘verified publisher’ status.

Cloud Security

Proofpoint removes a formidable competitor from the crowded email security market and adds technology to address risk from misdirected emails.