

- #Ubuntu truecrypt alternative password
- #Ubuntu truecrypt alternative crack
- #Ubuntu truecrypt alternative windows
#Ubuntu truecrypt alternative windows
It's a total guess, but my theory is that TrueCrypt discovered something outside their codebase (EG: Windows itself) that was undermining encryption. If it was that there was a government backdoor in TrueCrypt itself, how would NSA/FBI know that they discovered it? How would they know that it could be tied back to them? Why didn't the audit catch it? Gag orders are pretty loose in terms of legality in the first place, but even still, would a gag order prevent them from releasing a statement about a security hole (without mentioning its origin) and releasing patches? AKA some of their developers got served gag orders.īut what on earth could a TrueCrypt dev be gagged for? A gag order implies that some three-letter-agency had enough foresight to know they were planning to disclose something. They did something bizarre because it was all the noise they could make without telling us what really happened. I think there's only one way to interpret that. If it's a mix of the two, they at least say so.īut what happened with TrueCrypt was truly bizarre. If they lose interest in the project, they call it orphaned and ask for maintainers. If there are problems with the code, they release statements and patches.

More specifically I wouldn't touch Windows.ĭevelopers don't abruptly shut down projects. If I was concerned about my data, I wouldn't touch TrueCrypt with a 10 foot pole. Moreover, if I were really paranoid, I can easily bring it back to the 180,000-year mark (or more) by adding a few more characters to my passphrase, which would only take another second to type. That's still long enough that I don't care at all.
#Ubuntu truecrypt alternative crack
If you weakened the PBKDF to take 1 second instead, it would take 18,000 years to crack my relatively weak passphrase using a million computers. Even if you devoted a million computers to the job (as an extremely well-funded adversary might do), it would still take 180,000 years. A brute-force attack would take an average of 2^59 guesses before it succeeds.Īt 10 seconds per guess, we're looking at approximately 180 billion years to crack my passphrase. It's not completely random, so let's say it only has 2 bits of entropy per character. The passphrase to one of my TrueCrypt volumes is around 30 characters long. ZuluCrypt also supports plain dm-crypt volumes at a none zero offset and this means it can have more than one "hidden volumes" although it does not offer protection of these hidden volumes.ġ0 seconds is ridiculous, especially if you know what you're doing and use strong passphrases.
#Ubuntu truecrypt alternative password
ZuluCrypt also supports LUKS volumes with a detached header and this is more or less like TrueCrypt volume that requires a password and a keyfile(the detached header will act as a keyfile in this case). When it comes to binary applications,zuluCrypt is better than TrueCrypt because it supports TrueCrypt on-disk format together with other formats and it also supports multiple hidden volumes through the use of plain dm-crypt volumes. With a LUKS based encrypted volume,its possible to mimic a hidden header on a device through the usage of a "detached header" but this is a property of tools that manage LUKS volumes and not of a LUKS volume on disk-format.It is also possible to mimic a hidden volume through a plain dm-crypt volume at a non zero offset but this is also a property of a tool that manages LUKS volume and not of a LUKS volume format. TrueCrypt on-disk format advantages over LUKS is that it can support two volumes(outer one and hidden one) and its header is completely hidden since its encrypted.LUKS volume header is unencrypted and hence visible. LUKS advantages over TrueCrypt is that it can support up to 8 different passwords and each password security can be fine tuned by a changeable pbkdf2 iteration count that is set per password. LUKS is an on-disk format where as TrueCrypt is both an on-disk format and an application.zuluCrypt is only an application that supports multiple on-disk formats so your question is not easy to answer since it mixes up different things.
