The Russian cyber gangs must rejoice at the demise of TrueCrypt. Me? I’m still using TrueCrypt until the audit is complete and I’ll make a decision then about a transition. Others who are reliable, like Bruce Schneier, are shifting to commercial products, despite the risks of unknown backdoors. You pays your money and takes your chances.

Bruce Schneier applauds BestCrypt for continually developing Linux file encryption. Version 3.0 of Jetico’s TrueCrypt alternative is now available. Oct 02, 2015 · Other alternatives include Veracrypt, a fork of Truecrypt, and Bestcrypt. Bruce Schneier, the security expert, prefers the latter. I’ve been using Veracrypt since a few months ago. Since it is based on Truecrypt, it had the same vulnerabilities but the new developers have patched it. Truecrypt users will find it looks and feels the same and Bruce Schneier, a crypto expert who this week told The Register he used TrueCrypt but is switching to Symantec OpenPGP, suggested that the puzzling tale of TrueCrypt may not yet be over. Numerous security experts weighed in with their opinions, from the likes of Johns Hopkins cryptography professor Matthew Green (who was instrumental in initiating the recent and ongoing independent audit of TrueCrypt), noted cryptography expert Bruce Schneier, independent security reporter and researcher Brian Krebs, and Security Now! podcast Jul 04, 2014 · In a bit of irony, Schneier’s comment was also made way before TrueCrypt was shuttered, and before TrueCrypt developers began suggesting that people use BitLocker. The irony: TrueCrypt is open source, whereas BitLocker is closed source. Recently, Bruce Schneier has raised a few red flags by his strange advice that seems to indicate that he is being paid now for his “services to the community” by parties not so interested in keeping the community secure. One more thing is his advice to switch from TrueCrypt to BitLocker.

On the note of encryption algorithms, Blowfish, designed by Bruce Schneier, has the following notes based on cryptanalysis work: There is no effective cryptanalysis on the full-round version of Blowfish known publicly as of 2011. A sign extension bug in one publication of C code has been identified.

Numerous security experts weighed in with their opinions, from the likes of Johns Hopkins cryptography professor Matthew Green (who was instrumental in initiating the recent and ongoing independent audit of TrueCrypt), noted cryptography expert Bruce Schneier, independent security reporter and researcher Brian Krebs, and Security Now! podcast Jul 04, 2014 · In a bit of irony, Schneier’s comment was also made way before TrueCrypt was shuttered, and before TrueCrypt developers began suggesting that people use BitLocker. The irony: TrueCrypt is open source, whereas BitLocker is closed source.

There is also a very interesting discussion about “Evil Maid’ in Bruce Schneier’s blog. As a conclusion, both BitLocker and TrueCrypt are excellent programs that can encrypt data. Now that you know the pros and cons of the programs and also the attack methods I hope it is easier to select the appropriate one for your needs.

There is also a very interesting discussion about “Evil Maid’ in Bruce Schneier’s blog. As a conclusion, both BitLocker and TrueCrypt are excellent programs that can encrypt data. Now that you know the pros and cons of the programs and also the attack methods I hope it is easier to select the appropriate one for your needs.