55 Blog Posts Need Correction #TrueCrypt
Last time we'll see this...?
Did you know that I have 55 different blog posts that reference TrueCrypt? All of those are now obsolete due to the announcement that TrueCrypt is "no longer secure:"
WARNING: Using TrueCrypt is not secure as it may contain unfixed security issuesSo, what to do in the absence of Truecrypt?
This page exists only to help migrate existing data encrypted by TrueCrypt.
The development of TrueCrypt was ended in 5/2014 after Microsoft terminated support of Windows XP. Windows 8/7/Vista and later offer integrated support for encrypted disks and virtual disk images. Such integrated support is also available on other platforms (click here for more information). You should migrate any data encrypted by TrueCrypt to encrypted disks or virtual disk images supported on your platform.
Update 05/28/2014: Try DiskCryptor for Windows systems. Thanks for the suggestion!Some other solutions I rely on to secure confidential personally identifiable information, medical records, other confidential stuff cross-platform:
- AESCrypt.com - Use this to encrypt individual files. It's a free, open source project. Read this overview. (or read this one). Works on Windows, Mac, and Linux. Also works on Android.
- SSE File Encryptor - Use this to encrypt individual files and/or folders. Read this write-up. Works on Windows, Mac and Linux provided there is Java support. Also works on Android.
- 7zip File Format
The main issue with TrueCrypt's demise is that it leaves us without a free, open source encrypted volume solution. That means that any files that you encrypt or decrypt will leave a trail on your hard drive. With TrueCrypt, you could have done encryption and decryption in the encrypted volume, leaving no trace on the hard drive.
To get past that, you have to "erase" or "wipe" your hard drive. Computer forensics might still be able to access the data. The value of encrypted volumes is elaborated below:
FDE drives still leave your data and personal information vulnerable in at least two scenarios: 1) You are forced to turn over your password (as in Judge Blackburn's District Court ruling), or 2) Someone has hacked into your live machine and remotely recording your keystrokes/data while you work.
To address these issues, we are also going to put our personal/business files in an encrypted directory-but not using just any encryption scheme. Encryption with hidden volumes is the key to really protecting your information and rights. With a correctly implemented hidden volume on your encrypted hard drive, you don't have to worry when someone cracks (or coerces you into giving up) the password. When they use it to open the door, they will only see the closet. Source: LifeHackerIn the meantime, time to say goodbye to a program I referenced in 55 blog posts. Sheesh.
View my Flipboard Magazine.
Make Donations via PayPal below:
Everything posted on Miguel Guhlin's blogs/wikis are his personal opinion and do not necessarily represent the views of his employer(s) or its clients. Read Full Disclosure