![]() So, speaking only in terms of back doors, TrueCrypt (the version before last) is "safer" because it can be and has been examined by experts. No back doors or purposeful weaknesses were found. TrueCrypt's source code is available and has (as of today) been audited. (And even if you could, a purposeful weakness might be very difficult to spot, even for an experienced cryptographer.) You cannot examine the source code to find out, either. It is unknown (except probably to Microsoft and the NSA) whether BitLocker has a back door. ![]() It also isn't clear whether that driver is installed only for full-disk encryption or at any time a TrueCrypt volume is in use. ![]() It isn't clear from the article whether those flaws compromise the crypto or the underlying Windows OS, or both. Edit: OctoAn article in IT World for Septemreveals the existence of, but doesn't describe fully, two serious flaws in the Windows driver that TrueCrypt installed.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |