The UI is 100% identical to TrueCrypt’s, with a different window finish but with the same controls in the expected places.you may stream video from an encrypted, external volume without issues) VeraCrypt’s performance is in par with the original TrueCrypt (e.g.After reviewing all the options I mentioned earlier, I figured I’d take VeraCrypt for a spin. TrueCrypt 7.1a won’t work on OS X Yosemite, my workstation OS. I found myself facing this dilemma a few days ago. Lots of good intentions, a Wikipedia page, but neither forum nor coding nor any other activity worth noting. After 5 months, though, there’s no new code, no repository, and it seems like all the activity takes place in the forums, with nothing new to show yet.ĬypherShed… even worse. They have active information forums, and they made the TrueCrypt 7.1a code binaries available for use across all supported environments. My next favorite, at least on paper, is the TCnext project. VeraCrypt seems to have enough momentum and it may be around for a while. The contributors to VeraCrypt conducted their own analysis and fixed various issues in VeraCrypt. The VeraCrypt project addressed some of them when it was created over a year ago, while TrueCrypt was still alive and kicking and before the audit. I’ve been a happy TrueCrypt user and advised many a client and friend to use the technology since 2008. I contributed money and paid attention to the results of the TrueCrypt audit, and how the are meant to be addressed. The ones getting the most attention are TCnext, VeraCrypt, and CypherShed (links to each at the end). TrueCrypt lives on in different incarnations. Which of the existing TrueCrypt successors or alternatives would you use? Son of TrueCrypt TrueCrypt remained the current best alternative, at least until it was made obsolete by advances in operating systems or a better alternative became available. Whatever the reasons for the TrueCrypt project to close down, users were left in a lurch: it’s hard to trust any of the commercial volume/folder/file encryption tools if you’re serious about security. The TrueCrypt audit of 2013-2014 unveiled minor vulnerabilities, all fixable with ease. The mysterious disappearance of TrueCrypt in May 2014 left many of us wishing for a viable, open source alternative.
0 Comments
Leave a Reply. |