In baffling move, TrueCrypt open-source crypto project shuts down
Project managers warn that software is insecure but offer no explanations
Computerworld - In a move that appears designed to provoke widespread questions, the anonymous managers of the TrueCrypt open-source encryption project abruptly pulled the plug on the effort without explanation.
The website provided detailed steps for TrueCrypt users to migrate to BitLocker, a commercial encryption tool. BitLocker is also Microsoft's encryption tool that ships with Windows.
"This page exists only to help migrate existing data encrypted by TrueCrypt," the website stated. "The development of TrueCrypt was ended in 5/2014 after Microsoft terminated support of Windows XP. Windows 8/7/Vista and later offer integrated support for encrypted disks and virtual disk images." The message urged users to migrate data encrypted by TrueCrypt to encrypted disks or virtual disk images supported by their operating system platform.
The announcement caused widespread bafflement in the IT security industry.
TrueCrypt, a free, open source encryption file and disk encryption software tool for Windows, Mac OS X and Linux, is widely used by corporations, lawyers and other professionals and individuals around the world to encrypt sensitive and confidential data. The software's popularity stems from it ease of use, ability to do on-the-fly encryption of data and robustness.
There have been some 29 million downloads of TrueCrypt . In addition, copies of the software have been distributed via magazine cover CDs and downloaded from servers hosted by others.
Disclosures about the National Security Agency's alleged attempts to subvert popular encryption technologies prompted some to question the trustworthiness of tools like TrueCrypt. The concerns prompted a unique crowdsourced effort to audit TrueCrypt for security issues last fall.
The team behind the open crypto audit project released a report in February summarizing their initial findings. The 32-page report identified several vulnerabilities in the encryption code but none that were considered especially serious.
Wednesday's alert on the TrueCrypt site suggests the decision to pull the plug on the project was somehow tied to Microsoft's decision to stop support for Windows XP.
Almost no one is buying that.
"It makes no sense. This has nothing to do with XP," said Bruce Schneier, noted cryptographer and one of those involved in the TrueCrypt audit.
Like many others posting on blogs and on Twitter, Schneier said he has little idea why the project was killed. He speculated that it might be the result of an internal power struggle within TrueCrypt or a forced shutdown similar to the one at Lavabit a few months ago.
Lavabit, a provider of secure hosted email services, shut down operations last August citing concerns over the FBI's demands for the company's private Secure Sockets Layer (SSL) keys for decrypting email communications. Company founder Ladar Levison said that he would rather shut down the company than hand over the keys that would let the government read customer emails.
- Russian credential theft shows why the password is dead
- Cybersecurity should be professionalized
- Feds declare big win over Cryptolocker ransomware
- Hackers hit more businesses through remote access accounts
- P.F. Chang's post-breach move to manual processing is telling
- Microsoft withholds monster IE update from Windows 8.1 dawdlers
- In baffling move, TrueCrypt open-source crypto project shuts down
- 'Oleg Pliss' hack makes for a perfect teachable IT moment
- Give IE the heave-ho until Microsoft patches zero-day
- Hackers find first post-retirement Windows XP-related vulnerability
- Troubleshooting Common Issues in VoIP Learn more about Voice over Internet Protocol (VoIP), including common VoIP metrics used, best practices in VoIP management and tips and tricks for...
- IDG Research Survey: Are you Paying Too Much for Your NMS? Feel like you're paying too much for network monitoring? You're not alone. This survey brief summarizes findings from research recently fielded by IDG...
- 2013 Network Management Software (NMS) Buyers Guide This white paper contains an independent comparison study of six different network management solutions and provides guidance on how you can choose the...
- Rightsizing Your Network Performance Management Solution: 4 Case Studies This white paper discusses challenges encountered as organizations search for the most cost-effective network performance management solution.
- Tips to Simplify Database Administration and Development Make your job easier while getting the most from the leading productivity tool for database professionals. Learn tips from Dell Software's Oracle® ACE,...
- E-Signature RFP Checklist Webcast If your organization is looking to adopt e-signatures, you may be overwhelmed by the number of providers that offer seemingly similar solutions. How... All Encryption White Papers | Webcasts