In baffling move, TrueCrypt open-source crypto project shuts down
Project managers warn that software is insecure but offer no explanations
Computerworld - In a move that appears designed to provoke widespread questions, the anonymous managers of the TrueCrypt open-source encryption project abruptly pulled the plug on the effort without explanation.
The website provided detailed steps for TrueCrypt users to migrate to BitLocker, a commercial encryption tool. BitLocker is also Microsoft's encryption tool that ships with Windows.
"This page exists only to help migrate existing data encrypted by TrueCrypt," the website stated. "The development of TrueCrypt was ended in 5/2014 after Microsoft terminated support of Windows XP. Windows 8/7/Vista and later offer integrated support for encrypted disks and virtual disk images." The message urged users to migrate data encrypted by TrueCrypt to encrypted disks or virtual disk images supported by their operating system platform.
The announcement caused widespread bafflement in the IT security industry.
TrueCrypt, a free, open source encryption file and disk encryption software tool for Windows, Mac OS X and Linux, is widely used by corporations, lawyers and other professionals and individuals around the world to encrypt sensitive and confidential data. The software's popularity stems from it ease of use, ability to do on-the-fly encryption of data and robustness.
There have been some 29 million downloads of TrueCrypt . In addition, copies of the software have been distributed via magazine cover CDs and downloaded from servers hosted by others.
Disclosures about the National Security Agency's alleged attempts to subvert popular encryption technologies prompted some to question the trustworthiness of tools like TrueCrypt. The concerns prompted a unique crowdsourced effort to audit TrueCrypt for security issues last fall.
The team behind the open crypto audit project released a report in February summarizing their initial findings. The 32-page report identified several vulnerabilities in the encryption code but none that were considered especially serious.
Wednesday's alert on the TrueCrypt site suggests the decision to pull the plug on the project was somehow tied to Microsoft's decision to stop support for Windows XP.
Almost no one is buying that.
"It makes no sense. This has nothing to do with XP," said Bruce Schneier, noted cryptographer and one of those involved in the TrueCrypt audit.
Like many others posting on blogs and on Twitter, Schneier said he has little idea why the project was killed. He speculated that it might be the result of an internal power struggle within TrueCrypt or a forced shutdown similar to the one at Lavabit a few months ago.
Lavabit, a provider of secure hosted email services, shut down operations last August citing concerns over the FBI's demands for the company's private Secure Sockets Layer (SSL) keys for decrypting email communications. Company founder Ladar Levison said that he would rather shut down the company than hand over the keys that would let the government read customer emails.
- Feds declare big win over Cryptolocker ransomware
- Hackers hit more businesses through remote access accounts
- P.F. Chang's post-breach move to manual processing is telling
- Microsoft withholds monster IE update from Windows 8.1 dawdlers
- In baffling move, TrueCrypt open-source crypto project shuts down
- 'Oleg Pliss' hack makes for a perfect teachable IT moment
- Give IE the heave-ho until Microsoft patches zero-day
- Hackers find first post-retirement Windows XP-related vulnerability
- Researcher claims two hacker gangs exploiting unpatched IE bug
- Update: Third of Internet Explorer users at risk from attacks
- Mission Critical: Managing Mobile Applications & Content Smartphones, tablets and other mobile devices have become embedded in enterprise processes, thanks to the consumerization of IT and a new generation of...
- Securing Mobility, From Device to Network At one time, the process of managing and securing mobile devices and applications was fairly straightforward. Most organizations worried about one application (email)...
- Planning for Mobile Success Many organizations are seeing clear and quantifiable benefits from the deployment of mobile technologies that provide access to data and applications any time,...
- The Challenges and Opportunities of Mobile Application Development Nearly all business users now demand mobile devices--their own or company-owned--along with anywhere access to corporate applications and data. What turns mobile devices...
- Keep Servers Up and Running and Attackers in the Dark An SSL/TLS handshake requires at least 10 times more processing power on a server than on the client. SSL renegotiation attacks can readily...
- On Demand: Mastering the Art of Mobile Content Management Mobile device usage in the enterprise has skyrocketed, and it continues to escalate. IT must answer to users who demand access to their... All Encryption White Papers | Webcasts