LOGO

TrueCrypt Alternatives: Secure Encryption Options

November 30, 2014
TrueCrypt Alternatives: Secure Encryption Options

The Unexpected End of TrueCrypt and Viable Alternatives

The abrupt cessation of TrueCrypt’s operations in May 2014 came as a surprise to many. Previously, TrueCrypt had consistently been the primary recommendation for users seeking robust full-disk encryption software.

The developers unexpectedly announced that the underlying code possessed security vulnerabilities and subsequently ceased all further development efforts.

Uncertainties Surrounding TrueCrypt’s Discontinuation

The precise reasons behind TrueCrypt’s shutdown remain unclear. Speculation suggests potential governmental pressure exerted on the developers, or alternatively, developer fatigue stemming from the ongoing maintenance demands.

Despite the ambiguity, it is crucial to identify alternative solutions for safeguarding data.

Recommended Alternatives to TrueCrypt

Given the circumstances, several alternatives can be considered to maintain data security:

  • VeraCrypt: This is a direct fork of TrueCrypt, created by some of the original developers.
  • DiskCryptor: An open-source option specifically for Windows systems.
  • LUKS/dm-crypt: A standard for disk encryption commonly used in Linux distributions.
  • FileVault 2: Apple’s built-in full-disk encryption solution for macOS.

Each of these options provides a strong level of data encryption and can serve as a reliable replacement for TrueCrypt.

Selecting the most appropriate alternative will depend on your specific operating system and security requirements.

TrueCrypt 7.1a: Continued Usability

Despite the official cessation of development and the removal of its original download page, TrueCrypt remains a topic of discussion. The original developers have expressed a lack of further interest in the project and voiced concerns regarding the reliability of third-party maintenance.

However, the Gibson Research Corporation (GRC) maintains that TrueCrypt 7.1a is still a secure option for data encryption. This version, released in February 2012, has been widely utilized by millions of users since its debut. Currently, the open-source code of TrueCrypt is undergoing a comprehensive, independent security audit.

Independent Audit Progress

This audit commenced prior to the project's abrupt halt, and the initial phase has been completed without the discovery of significant vulnerabilities. TrueCrypt stands as the sole software to have been subjected to such an exhaustive independent review.

Upon completion, any identified issues can be addressed through community-driven patches within a new fork of the TrueCrypt codebase, potentially ensuring its continued functionality. The open-source nature of TrueCrypt means its development isn't solely reliant on the original creators.

This is the core argument presented by GRC. Furthermore, organizations like the Committee To Protect Journalists also recommend the continued use of the TrueCrypt code base.

Related: How to Secure Sensitive Files on Your PC with VeraCrypt

Should you choose to continue utilizing TrueCrypt, it is crucial to obtain version 7.1a. The official website currently offers TrueCrypt 7.2, which intentionally disables the creation of new encrypted volumes.

This version is designed to facilitate data migration away from TrueCrypt towards alternative encryption solutions. Prioritizing security, ensure you download TrueCrypt 7.1a from a reputable source and verify the integrity of the downloaded files.

Trusted Download Sources

The Open Crypto Audit Project provides a verified mirror for downloads. Alternatively, the files are also available from the GRC website.

If you proceed with this approach, the established best practices for TrueCrypt usage remain relevant. It's important to monitor the ongoing TrueCrypt audit results closely.

Eventually, a consensus regarding a successor to TrueCrypt will likely emerge. Potential candidates include projects like CipherShed and TCnext, though these are not yet fully mature.

3-alternatives-to-the-now-defunct-truecrypt-for-your-encryption-needs-1.jpg

VeraCrypt

VeraCrypt represents a continuation of the TrueCrypt project, currently gaining prominence as a security solution. It functions as a fork, meaning its codebase is directly derived from that of TrueCrypt.

Mounir Idrassi, the lead developer, has detailed the distinctions between TrueCrypt and VeraCrypt. Essentially, the development team asserts that they have addressed all significant security vulnerabilities and weaknesses identified within the source code by the Open Crypto Audit Project.

Furthermore, various memory leaks and potential buffer overflows have been resolved. Unlike initiatives like CipherShed and TCnext, VeraCrypt intentionally introduced incompatibility with TrueCrypt’s volume format.

Consequently, VeraCrypt is unable to directly access container files created by TrueCrypt. Users are required to decrypt their existing data and then re-encrypt it utilizing VeraCrypt.

The VeraCrypt project has enhanced the security of the PBKDF2 algorithm by increasing the number of iterations. This measure adds a layer of defense against brute-force attacks by substantially slowing down the process.

However, this improvement is ineffective if a weak passphrase is used for encryption. Increased iteration counts also result in longer boot times and decryption processes for encrypted volumes. More information regarding the project can be found in a recent interview with Idrassi conducted by eSecurity Planet.

VeraCrypt has undergone its initial security audit, leading to the correction of several identified vulnerabilities. This indicates positive progress for the project’s ongoing development.

3-alternatives-to-the-now-defunct-truecrypt-for-your-encryption-needs-2.jpg

Your Operating System's Integrated Encryption Capabilities

Related: 6 Popular Operating Systems Offering Encryption by Default

The vast majority of contemporary operating systems incorporate encryption features. However, the extent of encryption included in standard, or Home, editions of Windows is somewhat restricted. Considering the built-in encryption offered by your operating system, rather than solely relying on TrueCrypt, may be advantageous.

Encryption Options by Operating System

  • Windows 7 Home/Windows 8/Windows 8.1: The Home and "core" versions of Windows 8 and 8.1 lack a native full disk encryption capability. This limitation contributed to the widespread adoption of TrueCrypt.
  • Windows 8.1+ on New Computers: A "Device Encryption" feature is available in Windows 8.1, but its functionality is limited to newly purchased computers running Windows 8.1 and meeting specific hardware criteria. Furthermore, it necessitates uploading a recovery key copy to Microsoft’s servers, or your organization’s domain servers, which may be a security concern.
  • Windows Professional: Professional versions of Windows – including Windows 8 and 8.1 – feature BitLocker encryption. While not activated by default, it can be manually enabled to provide full-disk encryption. Note that Windows 7 Ultimate is necessary for BitLocker functionality, as the Pro edition does not include it.
  • Mac OS X: Apple’s macOS includes FileVault disk encryption. macOS Yosemite prompts users to automatically enable this feature during initial setup. Alternatively, it can be activated later through the System Preferences dialog.
  • Linux: A diverse range of encryption technologies are available within Linux. Many modern Linux distributions seamlessly integrate these technologies into their installation processes, offering easy full-disk encryption during setup. For instance, current Ubuntu versions utilize LUKS (Linux Unified Key Setup) for hard disk encryption.

Modern mobile devices also employ encryption methods, and even Chromebooks offer a degree of data protection.

Windows remains the sole platform where actively seeking out and enabling full-disk encryption is still necessary to safeguard your data. This contrasts with other operating systems where encryption is more readily available or automatically implemented.

#TrueCrypt#encryption#data security#VeraCrypt#LUKS#BitLocker