In baffling move, TrueCrypt open-source crypto project shuts down
Project managers warn that software is insecure but offer no explanations
Computerworld - In a move that appears designed to provoke widespread questions, the anonymous managers of the TrueCrypt open-source encryption project abruptly pulled the plug on the effort without explanation.
The website provided detailed steps for TrueCrypt users to migrate to BitLocker, a commercial encryption tool. BitLocker is also Microsoft's encryption tool that ships with Windows.
"This page exists only to help migrate existing data encrypted by TrueCrypt," the website stated. "The development of TrueCrypt was ended in 5/2014 after Microsoft terminated support of Windows XP. Windows 8/7/Vista and later offer integrated support for encrypted disks and virtual disk images." The message urged users to migrate data encrypted by TrueCrypt to encrypted disks or virtual disk images supported by their operating system platform.
The announcement caused widespread bafflement in the IT security industry.
TrueCrypt, a free, open source encryption file and disk encryption software tool for Windows, Mac OS X and Linux, is widely used by corporations, lawyers and other professionals and individuals around the world to encrypt sensitive and confidential data. The software's popularity stems from it ease of use, ability to do on-the-fly encryption of data and robustness.
There have been some 29 million downloads of TrueCrypt . In addition, copies of the software have been distributed via magazine cover CDs and downloaded from servers hosted by others.
Disclosures about the National Security Agency's alleged attempts to subvert popular encryption technologies prompted some to question the trustworthiness of tools like TrueCrypt. The concerns prompted a unique crowdsourced effort to audit TrueCrypt for security issues last fall.
The team behind the open crypto audit project released a report in February summarizing their initial findings. The 32-page report identified several vulnerabilities in the encryption code but none that were considered especially serious.
Wednesday's alert on the TrueCrypt site suggests the decision to pull the plug on the project was somehow tied to Microsoft's decision to stop support for Windows XP.
Almost no one is buying that.
"It makes no sense. This has nothing to do with XP," said Bruce Schneier, noted cryptographer and one of those involved in the TrueCrypt audit.
Like many others posting on blogs and on Twitter, Schneier said he has little idea why the project was killed. He speculated that it might be the result of an internal power struggle within TrueCrypt or a forced shutdown similar to the one at Lavabit a few months ago.
Lavabit, a provider of secure hosted email services, shut down operations last August citing concerns over the FBI's demands for the company's private Secure Sockets Layer (SSL) keys for decrypting email communications. Company founder Ladar Levison said that he would rather shut down the company than hand over the keys that would let the government read customer emails.
- Feds declare big win over Cryptolocker ransomware
- Hackers hit more businesses through remote access accounts
- P.F. Chang's post-breach move to manual processing is telling
- Microsoft withholds monster IE update from Windows 8.1 dawdlers
- In baffling move, TrueCrypt open-source crypto project shuts down
- 'Oleg Pliss' hack makes for a perfect teachable IT moment
- Give IE the heave-ho until Microsoft patches zero-day
- Hackers find first post-retirement Windows XP-related vulnerability
- Researcher claims two hacker gangs exploiting unpatched IE bug
- Update: Third of Internet Explorer users at risk from attacks
- Improving IT Efficiencies: Four Advantages of Multi-Tenant Data Centers Increasing demands on IT are forcing organizations to rethink their data center options. For many organizations, that means turning to the flexibility afforded...
- Accelerating Cloud Deployment and Operations with Managed Services Companies that do not have sufficient in-house expertise to either deploy or maintain an IaaS cloud should turn to Managed Service Providers .
- Rethinking IT Operations in the Cloud This paper breaks down the challenges that often prevent the cloud from delivering the fast, flexible and affordable infrastructure companies seek - and...
- Gartner Magic Quadrant for Cloud-Enabled Managed Hosting, North America Cloud-enabled managed hosting brings cloudlike consumption and provisioning attributes to the traditional managed hosting market
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to...
- Will the Real Endpoint Threat Detection and Response Please Stand Up? This webinar explores new technologies & process for protecting endpoints from advanced attackers as well as the innovations that are pushing the envelope... All Encryption White Papers | Webcasts