Bonum Certa Men Certa

Truecrypt Cannot be Audited Because It's Proprietary Software

Truecrypt



Summary: Why nobody should trust Truecrypt (or any other piece of proprietary software for that matter), even if it claims to have been "audited"

THE other day we alluded to Truecrypt in this post, not quite mentioning the holes in the argument that Truecrypt can be "audited" [1-3]. Unless everyone can view the code and compile it independently (or rely on others to do so independently), we must assume that Truecrypt is not secure and that it might contain back doors (either unidentified or deliberately planted). This whole Internet 'debate' about Truecrypt "audit" should remind us that Free software is vital for dodging surveillance.

The NSA has used corporations to facilitate snooping and it may not be alone [4]. This is happening at many levels [5-7] based on new leaks and revelations, so rather than look for evidence of insecurity (e.g. back door) we should pursue real assurance of security. You know what the spies like to tell us: if you have nothing to fear, you have nothing to hide, right? So come on, Truecrypt, share your source code. What have you got to hide?



Related/contextual items from the news:



  1. Should Truecrypt be audited?
    Truecrypt is a cross-platform, free disk encryption software for Windows and Unix-like operating systems. It is generally considered a good disk encryption software, and not too long ago, I wrote a tutorial that showed how to encrypt the Windows installation of a Windows-Linux dual-boot setup (see Dual-boot Fedora 18 and Windows 7, with full disk encryption configured on both OSs).


  2. New effort to fully audit TrueCrypt raises $16,000+ in a few short weeks


  3. Can you trust 'NSA-proof' TrueCrypt? Cough up some dough and find out
    The source code for the Windows, Linux and Mac OS X utility is publicly available for people to inspect and verify, but this has not been enough to convince every cryptography guru that it's entirely secure.


  4. After Snowden’s leaks, China’s Huawei calls for more transparency in the tech industry
    With all of the recent revelations about the US National Security Agency’s surveillance programs, it must be hard for the Chinese telecom equipment manufacturer Huawei not to gloat a little bit.

    After all, the leaks from former contractor Edward Snowden showed that the NSA enlisted US technology companies to enable its snooping on global telecommunications networks—which is exactly what US intelligence officials have accused Huawei of doing on behalf of the Chinese government.


  5. Europe Moves to Shield Citizens’ Data
    Lawmakers here have introduced a measure in the European Parliament that could require American companies like Google and Yahoo to seek clearance from European officials before complying with United States warrants seeking private data.


  6. Dutch Telcos Used Customer Metadata, Retained To Fight Terrorism, For Everyday Marketing Purposes


    One of the ironies of European outrage over the global surveillance conducted by the NSA and GCHQ is that in the EU, communications metadata must be kept by law anyway, although not many people there realize it.


  7. NSA Harvesting Contact Lists
    A new Snowden document shows that the NSA is harvesting contact lists -- e-mail address books, IM buddy lists, etc. -- from Google, Yahoo, Microsoft, Facebook, and others.


Recent Techrights' Posts

Windows Has Now Fallen to Rather Ridiculous 3% "Market Share" in Iraq (Windows Was Measured at 100% Back in 2010)
Iraq is not a place where Windows can make a comeback
New USPTO Memo Makes Fighting Patent Trolls Even Harder
The U.S. Patent and Trademark Office (USPTO) just made a move that will protect bad patents at the expense of everyone else
An "EU OS" Would Need European Components
There are many European (or Europe-led) distros of GNU/Linux. EU OS developers ought to look at those.
 
Cellphones (Mobile Phones) in Classrooms
A recent study confirmed that people's intelligence has dropped in recent years/decades
Is the FSF Being 'Trolled' by Microsofters Pushing C# (Microsoft)?
Who stands to benefit from training people to use and spread Microsoft?
Matthew J. Garrett is "Former Microsoft Researcher", According to Microsoft's Serial Strangler
Their argument is something along the lines of, "what Roy published damaged my career prospects, so I want Roy to pay me...
Links 24/03/2025: Political Catchup and Environmental Concerns
Links for the day
Gemini Links 24/03/2025: Working With Music and Unconscious Influence
Links for the day
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Sunday, March 23, 2025
IRC logs for Sunday, March 23, 2025
Critics of IBM's Strategy Aren't Racists, But...
the situation is saddening as it serves to obscure the severity of the problem
Mauritania: Windows Falls to All-Time Low of 6% (It Used to be Over 99%)
Windows is 0% in mobile
Outline of Open Source Initiative Coverage to Come (Now That Consensus is Changing)
Policing Wikipedia and attacking critics is not a sustainable strategy
Gemini Links 23/03/2025: "Connor of the Cats" and CSS Naked Day
Links for the day
Links 22/03/2025: Science and Antoine Beaupré on "Losing the War for the Free Internet"
Links for the day
We Probably Served Close to 100 Million Gemini Requests
Many of these requests probably came from bots, but it's hard to distinguish (to block them) ... This coming summer Gemini Protocol will turn 6
Just Because Microsoft Resents Techrights Doesn't Mean SLAPPs Will Silence Techrights
To confront lies the best solution is to speak truth
Windows at New Low Levels in Madagascar (Population About 33 Million)
Madagascar does not need Microsoft
Slop Images Are Bad Optics, Including for Perl.org
Slop devalues one's genuine work
What Happened to the Open Source Initiative (OSI) Elections: Proprietary Software Companies in Control, the Scandals Cannot be Hidden Anymore
We'll talk about it later this month and next month
Slopwatch: Fake News About Security Using LLMs That Make Fake 'Articles' About "Linux" (With Slop for Images)
This cannot end well
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Saturday, March 22, 2025
IRC logs for Saturday, March 22, 2025
Gemini Links 22/03/2025: "Ukay Ukay", Microplastics in Tea, Jujutsu, and More
Links for the day
Links 22/03/2025: Johor Flooded, Ador Traps Young Musicians With Contract
Links for the day
[Video] Richard Stallman on What Patents Would Have Done to Music (Covered by Copyrights)
Our WebM version can be played using Free software, independently of the availability of Invidious mirrors
Our IRC Community Turns 17 Very Shortly
A few years from now our IRC community will turn 20
Microsoft Destroys and Exploits, It Does Not Create
A race to nowhere
Linux Foundation Buys Misleading Puff Pieces About Itself, Earns Some LLM Slop to Accompany the PR (Openwashing and Propaganda as a Service, With the Brand "Linux" Needlessly Borrowed)
Isn't it funny that after the "LF" (misusing the brand "Linux") flooded the Web with press releases and fake articles (that it had paid for) it now gets some LLM slop doing the same?
It's About So Much More Than 2 Microsofters, It's About Freedom to Speak About Crimes at Microsoft
Suffice to say, if some people related to our professional field attack women and get arrested for it, then there's nothing immoral about relaying this information
Links 22/03/2025: Social Security Attacks and More Attacks on the Press
Links for the day
Gemini Links 22/03/2025: INTERPOL, DDoS by "Hey Hi" Hype, and RSS/Feed Readers
Links for the day
Links 22/03/2025: Alzheimer Research and Mega-breaches in the US
Links for the day
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Friday, March 21, 2025
IRC logs for Friday, March 21, 2025