True Crypt Compromised / Removed?

Published: 2014-05-28
Last Updated: 2014-05-29 03:09:40 UTC
by Johannes Ullrich (Version: 1)
7 comment(s)

Earlier today, the popular disk encryption tool Truecrypt was essentially removed from Sourceforge, and replaced with a warning that Truecrypt is no longer secure and people should switch to Bitlocker  (with instructions as to how to do this). The source code was updated and essentially all functionality was removed but the installer will now just show a message similar to the one displayed on the homepage.

What you probably are asking first about: What does this mean for me if I use Truecrypt?

At this point, there are many rumors, and few facts. It is my recommendation (as always) to stay calm. One thing you want to do right away: Get a copy of the last working version and burn it to CD (actually: 3 CDs) in case it is no longer available and you need to access offline media that are encrypted using Truecrypt. Find out what your alternatives are. In Windows you have Bitlocker, in OS X you got FileVault and in Linux you got LUKS. Sadly, these are not compatible with each other. You will need to find a replacement for portable media that need to move between operating systems. PGP/GnuPG comes to mind as an option. 

Now back to what we know so far:

Recently, a community effort was launched to review the Truecrypt code, in particular to check for backdoors and incorrectly implemented crypto algorithms. As far as I know, no significant issue was found to date.

This very much smells to me like a compromised Sourceforge repository. Truecrypt uses Sourceforge for all of its content. At this point, sit back, don't visit the Truecrypt Sourceforge page or download the crippled version, but don't panic (yet).

But, via twitter and e-mail, some additional disturbing facts came in that make this look worse then a simple web site compromise:

  • The new "decrypt only" binary was signed with what looks like a valid Truecrypt code signing key (I believe investigated this)
  • The PGP signature was valid as well
  • The Truecrypt development team is anonymous, and so far, no word if the code review team was able to reach them.

Correction about the earlier note that Sourceforge was compromised: Turns out that they asked users to change passwords NOT because of a compromise, but because they changed the hashing algorithm.


Johannes B. Ullrich, Ph.D.
SANS Technology Institute

7 comment(s)


Sounds like someone with a tin foil hat has decided that even TrueCrypt has been back-doored by the NSA, so they've used an existing exploit against Sourceforge to make their point.
A post has been made to HackerNews by a person claiming to be a SourceForge employee, to the effect that there doesn't seem to be anything unusual in recent traffic and usage of the TrueCrypt account:
FreeOTFE can be used, with a bit of effort, to create and access encrypted Linux volumes on Windows (including LUKS). Unfortunately not maintained any more but still available on Sourceforge: Drivers are unsigned, though, which causes problems with Windows 7 and later.
"Truecrypt development team is anonymous"

Put your trust in the shadows, secure your secrets with ignorance. Sorry, but the code was never truly open source, could have been anyone in major nation-state espionage including the NSA creating it.
"Truecrypt is alive and well and living in Switzerland" found via
The German website: post some news about the further "development"/existence of *crypt"
"Deutscher Nachfolger für TrueCrypt angekündigt" -

(sorry for this German only link, I haven't found one in English yet.)
Yes, I am agree with you. And now we can ask: what to do? Possible to find a good alternative? What applications can we use, to not be depending from NSA?

Diary Archives