[cryptome] Re: TrueCrypt compromised

  • From: tpb-crypto@xxxxxxxxxxx
  • To: cryptome@xxxxxxxxxxxxx
  • Date: Sun, 01 Jun 2014 00:09:16 +0200

EncFS for starters.

> Message du 31/05/14 08:16
> De : "In Harms Way" <11414150173@xxxxxxxxxx>
> A : cryptome@xxxxxxxxxxxxx
> Copie à : 
> Objet : [cryptome] Re: TrueCrypt compromised
>

> 
> Now serious: Which open-source programme for container-encryption of all
> files and disks the professionals like medical doctors, lawyers, priests
> et. al. still can use to fulfil their legal obligation to store patient
> or client data 100% secure ????
> 
> To my understanding PGP encryption with UCE (only user has the private
> key - private key not grabbed by any webmail etc.) for e-mails (e.g. via
> Thunderbird and enigmail) is still not broken (if user disabled
> hibernation on his/her machine to avert pass-phrase stealing from the
> hibernation dump).
> 
> But which other truecrypt-like open-source programme still stands strong
> for file/disk-encryption.?
> 
> Any suggestions?
> 
> Shaun O'Connor wrote, On 30/05/2014 12:06:
> > got to agree on that point and tails 1.0 was only released recently too!!
> > On 30/05/2014 00:14, tpb-crypto@xxxxxxxxxxx wrote:
> >>> Message du 29/05/14 19:49
> >>> De : "Jean-Philippe Décarie-Mathieu" 
> >>>
> >>> Oh, I'm nowhere near giving up. I'm aware of the alternatives; it's just
> >>> that this whole TC story is obscure as hell. Still no words from the
> >>> developer(s)... It's gotta suck for Tails and other projects that have
> >>> integrated TC also.
> >>>
> >> Other projects will not be affected. That's the nature of open source, you 
> >> close a door, a window opens.
> >>
> >> Those interested will keep truecrypt alive, it just takes interest.
> >>
> >> .
> >>
> >
> > -- 
> > https://www.resetthenet.org/ *On June 5 2014, this email addrfess will
> > NOT be accepting any mails....are you in?*
> 
> 
> -- 
> We have nothing to hide, but something to protect: 
> LIBERTY, PRIVACY & FREEDOM
> - and the people, whose human rights these are.
> 
>

Other related posts: