Edit: That tweet was deleted for some reason, but the rest of the thread is still there: https://twitter.com/stevebarnhart/status/472192457145597952
http://krebsonsecurity.com/2014/05/true-goodbye-using-truecr...
Head-desk-head-desk.
Gene: It's brilliant! There's no such thing as time!
http://topsy.com/trackback?url=http%3A%2F%2Ftwitter.com%2Fst...
and for the user:
http://topsy.com/s?q=from%3Astevebarnhart&window=w&type=twee...
At least from here it looks like they took the posts down as well.
https://twitter.com/stevebarnhart/status/472195239005147136
And why not just writing that you no longer feel motivated to continue the further development of your software? It is very common after all …
They didn't necessarily do it because they wanted to "stop teh NSA." A lot of people who wanted to "stop teh NSA" started using TrueCrypt, and so they assumed that their goals lined up with TrueCrypt's. But maybe they didn't.
Maybe the developer using TrueCrypt was perfectly happy with "defend against anyone short of the NSA, especially since the NSA would need to expose their ability to break into this in order to do anything bad to me." There are millions of people who legitimately share that threat model.
We can parse out each comment in the source code like lawyers fighting about a comma before SCOTUS or biblical scholars debating on the definition of a word in Hebrew. We will never know. But there is a really big possibility that the developer(s) consider BitLocker acceptable, even if it's closed-source by Microsoft.
EDIT replaced an instance of "BitLocker" with "TrueCrypt" in second paragraph, whooops!
You can rest assured.
[1] http://www.linkedin.com/pub/joseph-doekbrijder/2b/384/43a
Then again, with anonymous developers and unknown jurisdiction, it may be moot.
https://github.com/warewolf/truecrypt/blob/33c0b8457051796fa...
I belive any TrueCrypt fork should require contributions to be dual licensed under TrueCrypt's original license and BSD. In time, the project can shed original files and re-implement them under BSD or any other GPL compatible license.
http://www.infoworld.com/d/open-source-software/truecrypt-or...
[1] https://github.com/warewolf/truecrypt/compare/master...7.2#d...
...but that actually doesn't seem all that insurmountable. Hm...
The original dev's made it clear they don't want people to continue with the TrueCrypt name. If they were really interested in continuing the project for the sake of security they would have chosen a different name.
Apologies if I missed anything, I don't follow this truecrypt stuff too closely.
Hopefully that may still happen.
This means that if you have a large set of random-looking data, they can already lock you up. Hidden containers (encryption hidden within encryption), as possible with Truecrypt, do not help either. They will just assume the hidden container is there and unless you hand over the key, you will stay locked up. Don't have a hidden container? Though luck. Anybody could claim that.
It assumes there are only two possibilities, either you live in a "free country" where you can refuse to hand over the key, or you live in a totalitarian state where the police will decide to beat you if they suspect you have crypto software, and will keep doing so no matter what you say.
There is a lot of middle ground there. For example in the UK, I believe you are legally required to provide the decryption password. But I don't think the police there would be likely to beat you if they think you may have a hidden container. They could argue that they believe you do, and you would respond with "prove it!", and I doubt it would go any further (unless they had some evidence that you specifically were using hidden containers).
There is value in hidden containers in some circumstances. It's disappointing to see the cryptsetup maintainers take this position.
Place your energy in the alternatives. I wish you could downvote things on HN, if only because this is downright dangerous and needs to be read by as few people as possible.
I see no issue picking up the codebase and running with it.
I really really doubt this is a claim the folks doing the audit would make.
They already found a few flaws. Nothing major though: https://opencryptoaudit.org/reports/iSec_Final_Open_Crypto_A...
Audits aren't perfect.
Why not?
So what options remain for the person that starts the "next Truecrypt"? The only true safe haven I can think of is employment at a public university. In many countries here in Europe the security researchers working at universities can operate under what is called "academic freedom".
I wonder how that will be destroyed.