This could also be a prelude to people investigating this being targeted, and massive backups increases the chances of something incriminating being saved to take them down with. Remember folks, encrypt everything.
As a reminder, TrueCrypt 7.1a is the last real version of True Crypt before all of the drama, key changes, and as many suspect, compromise of the software.
Find a binary of 7.1a, then check multiple reputable websites of your own finding for the hash of 7.1a and verify your binary before trusting it.
Any reason to not use VeraCrypt at this point, for Windows users? They did go through that code audit, but I can understand if people still feel real uneasy.
Linux users can use LVM encryption on your disks. It's built-in to the kernel, no extra software needed. Your preferred distro's installer probably has a checkbox you can just select to do all the hard work for you.
Be sure to use an EXTRA BIGASS PASSCODE, and basically just do your best to be RMS. Get anal about binary blobs in your code (backdoors, telemetry), or in your computer's chips (Intel ME, Libreboot), etc. You only need to trust bad software once for shit to go straight out the window.
view the rest of the comments →
Cid ago
This could also be a prelude to people investigating this being targeted, and massive backups increases the chances of something incriminating being saved to take them down with. Remember folks, encrypt everything.
billl ago
As a reminder, TrueCrypt 7.1a is the last real version of True Crypt before all of the drama, key changes, and as many suspect, compromise of the software.
Find a binary of 7.1a, then check multiple reputable websites of your own finding for the hash of 7.1a and verify your binary before trusting it.
happy_snek ago
Any reason to not use VeraCrypt at this point, for Windows users? They did go through that code audit, but I can understand if people still feel real uneasy.
Linux users can use LVM encryption on your disks. It's built-in to the kernel, no extra software needed. Your preferred distro's installer probably has a checkbox you can just select to do all the hard work for you.
psymin ago
Been using dmcrypt for years. Got suggestions for best practices?
happy_snek ago
Be sure to use an EXTRA BIGASS PASSCODE, and basically just do your best to be RMS. Get anal about binary blobs in your code (backdoors, telemetry), or in your computer's chips (Intel ME, Libreboot), etc. You only need to trust bad software once for shit to go straight out the window.