Ilmu Komputer    
   
Daftar Isi
(Sebelumnya) true and false (commands)TrueSpace (Berikutnya)

TrueCrypt

TrueCrypt
TrueCrypt Logo.png
TrueCrypt on windows vista.png
TrueCrypt on Windows
Developer(s)TrueCrypt Foundation
Stable release7.1a / February 7, 2012; 13 months ago (2012-02-07)
Written inC, C++, Assembly
Operating systemCross-platform - Windows, Mac OS, Linux, DragonFly BSD [1] using the tcplay implementation
Available in30 languages
(although most are incomplete translations)
TypeDisk encryption software
LicenseTrueCrypt License v 3.0
Websitewww.truecrypt.org

TrueCrypt is a freeware software application used for on-the-fly encryption (OTFE). It can create a virtual encrypted disk within a file or encrypt a partition or (under Microsoft Windows except Windows 2000) the entire storage device (pre-boot authentication).

Contents

Operating systems

TrueCrypt supports Microsoft Windows, Mac OS X and Linux operating systems[2] (using FUSE). Both 32-bit and 64-bit versions of these operating systems are supported, except for Windows IA-64 (not supported) and Mac OS X 10.6 Snow Leopard (runs as a 32-bit process).[2] The version for Windows 7, Windows Vista, or Windows XP can encrypt the boot partition or entire boot drive.[3] There is an independent, compatible[1][4] implementation, tcplay, for DragonFly BSD [1] and Linux.[4][5]

Cryptographic algorithms

Individual algorithms supported by TrueCrypt are AES, Serpent, and Twofish. Additionally, five different combinations of cascaded algorithms are available: AES-Twofish, AES-Twofish-Serpent, Serpent-AES, Serpent-Twofish-AES and Twofish-Serpent. The cryptographic hash functions used by TrueCrypt are RIPEMD-160, SHA-512, and Whirlpool.

Modes of operation

TrueCrypt currently uses the XTS mode of operation. Prior to this, TrueCrypt used LRW mode in versions 4.1 through 4.3a, and CBC mode in versions 4.0 and earlier.[6] XTS mode is thought to be more secure than LRW mode, which in turn is more secure than CBC mode.[7]

Although new volumes can only be created in XTS mode, TrueCrypt is backward compatible with older volumes using LRW mode and CBC mode.[6] Later versions produce a security warning when mounting CBC mode volumes and recommend that they be replaced with new volumes in XTS mode.

Performance

TrueCrypt supports parallelized[8] encryption for multi-core systems and, under Microsoft Windows, pipelined read/write operations (a form of asynchronous processing)[9] to reduce the performance hit of encryption and decryption. On newer processors supporting the AES-NI instruction set, TrueCrypt supports hardware-accelerated AES to further improve performance.[10] The performance impact of disk encryption is especially noticeable on operations which would normally use Direct Memory Access (DMA), as all data must pass through the CPU for decryption, rather than being copied directly from disk to RAM.

In a test carried out by Tom's Hardware, although TrueCrypt is slower compared to an unencrypted disk, the overhead of real-time encryption was found to be similar regardless of whether mid-range or state-of-the-art hardware is in use, and this impact was "quite acceptable".[11] In another article the performance cost was found to be unnoticeable when working with "popular desktop applications in a reasonable manner", but it was noted that "power users will complain".[12]

Security concerns

TrueCrypt is vulnerable to various known attacks which are also present in other software-based disk encryption software such as BitLocker. To prevent those, the documentation distributed with TrueCrypt requires users to follow various security precautions.[13] Some of those attacks are detailed below.

Plausible deniability

TrueCrypt supports a concept called plausible deniability,[14] by allowing a single "hidden volume" to be created within another volume.[15] In addition, the Windows versions of TrueCrypt have the ability to create and run a hidden encrypted operating system whose existence may be denied.[16]

The TrueCrypt documentation lists many ways in which TrueCrypt's hidden volume deniability features may be compromised (e.g. by third party software which may leak information through temporary files, thumbnails, etc., to unencrypted disks) and possible ways to avoid this.[17] In a paper published in 2008 and focused on the then latest version (v5.1a) and its plausible deniability, a team of security researchers led by Bruce Schneier states that Windows Vista, Microsoft Word, Google Desktop, and others store information on unencrypted disks, which might compromise TrueCrypt's plausible deniability. The study suggested the addition of a hidden operating system functionality; this feature was added in TrueCrypt 6.0. When a hidden operating system is running, TrueCrypt also makes local unencrypted filesystems and non-hidden TrueCrypt volumes read-only to prevent data leaks.[18] The security of TrueCrypt's implementation of this feature was not evaluated because the first version of TrueCrypt with this option had only recently been released.[19]

Identifying TrueCrypt volumes

Since TrueCrypt volumes do not contain file headers and their content is indistinguishable from random data, it is theoretically impossible to identify such files as being TrueCrypt volumes without knowing their passwords.[citation needed] However, this brings up the question as to whether the presence of a file made entirely of statistically random bits may be sufficient to create reasonable suspicion that they contain encrypted data,[original research?] thereby giving rise to probable cause. TrueCrypt volume files have file sizes that are evenly divisible by 512 and their content passes chi-squared randomness tests.[citation needed] Although these features give reason to suspect a file to be a TrueCrypt volume, there are, however, some programs which exist for the purpose of securely erasing files by employing a method of overwriting file contents, and free disk space, with purely random data (i.e., "shred" & "scrub"[20]), thereby creating reasonable doubt to counter pointed accusations declaring a file, made of statistically random data, to be a TrueCrypt file.[21][22]

If a system drive, or a partition on it, has been encrypted with TrueCrypt, then the above paragraph applies only to the contents of that drive/partition.[original research?] However, when the TrueCrypt boot loader replaces the normal boot loader, an offline analysis of the drive can positively determine that a TrueCrypt boot loader is present. Even though there are features to obfuscate its purpose (i.e., displaying a BIOS-like message to misdirect an observer such as, "Non-system disk" or "disk error"), these reduce the functionality of the TrueCrypt boot loader, and there still remains anecdotal evidence[citation needed] that there may be an alternate scheme in place (e.g., the flicker of the hard-drive light when the "Return" key is pressed and the entered password is checked).[citation needed]

Encryption keys stored in memory

TrueCrypt stores its keys in RAM; on an ordinary personal computer the DRAM will maintain its contents for several seconds after power is cut (or longer if the temperature is lowered). Even if there is some degradation in the memory contents, various algorithms can intelligently recover the keys. This method, known as a cold boot attack (which would apply in particular to a notebook computer obtained while in power-on, suspended, or screen-locked mode), has been successfully used to attack a file system protected by TrueCrypt.[23]

Physical security

TrueCrypt documentation states that TrueCrypt is unable to secure data on a computer if an attacker physically accessed it and TrueCrypt is used on the compromised computer by the user again (this does not apply to a common case of a stolen, lost, or confiscated computer).[24] The attacker having physical access to a computer can, for example, install a hardware/software keylogger, a bus-mastering device capturing memory, or install any other malicious hardware or software, allowing the attacker to capture unencrypted data (including encryption keys and passwords), or to decrypt encrypted data using captured passwords or encryption keys. Therefore, physical security is a basic premise of a secure system. Attacks such as this are often called "evil maid attacks".[25]

Malware

TrueCrypt documentation states that TrueCrypt cannot secure data on a computer if it has any kind of malware installed. Some kinds of malware are designed to log keystrokes, including typed passwords, that may then be sent to the attacker over the Internet or saved to an unencrypted local drive from which the attacker might be able to read it later, when he or she gains physical access to the computer.[26]

The "Stoned" bootkit

The "Stoned" bootkit, an MBR rootkit presented by Austrian software developer Peter Kleissner at the Black Hat Technical Security Conference USA 2009,[27][28] has been shown capable of tampering TrueCrypt's MBR effectively bypassing TrueCrypt's full volume encryption.[29][30][31][32][33] (but potentially every hard disk encryption software is affected too if it does not rely on hardware-based encryption technologies like TPM, or—even if it does—if this type of attack is made with administrative privileges while the encrypted operating system is running).[34][35]

Two types of attack scenarios exist in which it is possible to maliciously take advantage of this bootkit: in the first one, the user is required to launch the bootkit with administrative privileges once the PC has already booted into Windows; in the second one, analogously to hardware keyloggers, a malicious person needs physical access to the user's TrueCrypt-encrypted hard disk: in this context this is needed to modify the user's TrueCrypt MBR with the Stoned's one and then place the hard disk back on the unknowing user's PC, so that when the user boots the PC and types his/her TrueCrypt password on boot, the "Stoned" bootkit intercepts it thereafter because, from that moment on, the Stoned bootkit is loaded before TrueCrypt's MBR in the boot sequence. The first type of attack can be prevented as usual by good security practices, e.g. avoid running non-trusted executables with administrative privileges. The second one can be successfully neutralized by the user if he/she suspects that the encrypted hard disk might have been physically available to someone he/she does not trust, by booting the encrypted operating system with TrueCrypt's Rescue Disk instead of booting it directly from the hard disk and restoring boot loader in MBR.[36]

Reasonable paranoia

If relying on TrueCrypt encryption for life and death matters, it is worth noting that TrueCrypt (or any other software) is only as trustworthy as the people writing and reviewing the code.[37][38][39] Also, when using distributed binaries instead of compiling from the source code, a user may be running code that was inserted during packaging and that is not available in the open source repository (possible backdoors, etc.).[40][41][42] It is challenging to create binaries from source code that match the official binaries for purposes of verifying their integrity due to compiler options, etc.[43][40][41]

The developers of TrueCrypt have been only anonymously referred to on the site as “The TrueCrypt Foundation” since 2010,[44] though there are potentially good reasons related to privacy why they might have chosen to remain thus.

There has been no known comprehensive review of the source code by a qualified cryptographer.[45][43] Thorough security code review and testing is hard, tedious, and painstaking work, and very few people have the skills to do it. There was, however, a functional evaluation of the deniability of hidden volumes in an earlier version of TrueCrypt by Schneier et al. that found security leaks.[46]

The "TrueCrypt License" is unique and contains distribution and copyright-liability restrictions.[47]

Various other open source projects including Fedora[48] and the Tails[49] live CD have removed or forbidden TrueCrypt from their distributions due to the closed fashion in which development is performed.

Legal Aspects

In 2012 the United States 11th Circuit Court of Appeals ruled that a John Doe TrueCrypt user could not be compelled to decrypt several of his hard drives.[50][51]

Operation Satyagraha

In July 2008, several TrueCrypt-secured hard drives were seized from a Brazilian banker Daniel Dantas, who was suspected of financial crimes. The Brazilian National Institute of Criminology (INC) tried unsuccessfully for five months to obtain access to his files on the TrueCrypt-protected disks. They enlisted the help of the FBI, who used dictionary attacks against Dantas' disks for over 12 months, but were still unable to decrypt them.[52] The case presented a noteworthy real-world test which proved the strength of TrueCrypt.

Licensing

The TrueCrypt License has not been officially approved by the Open Source Initiative and is not considered "free" by several major Linux distributions (Arch Linux,[53] Debian,[54] Ubuntu,[55] Fedora,[56] openSUSE,[57] Gentoo[58]), mainly because of distribution and copyright-liability reasons.[59]

TrueCrypt 6.3a (released Nov 2009) comes under TrueCrypt License Version 2.8 which was changed in some places from the 2.5 license, but TrueCrypt is still not included in any of the major Linux distributions.

Trademarks

The TrueCrypt trademark was registered in the Czech Republic under name of "David Tesařík".[60]

In February 2010, the TrueCrypt website published a contact address in Nevada, USA for the TrueCrypt Foundation. The domain name truecrypt.org and the TrueCrypt trademarks (US and international/WIPO) were subsequently registered to the TrueCrypt Developers Association, LC, also registered in Nevada.[citation needed]

Planned features

According to the TrueCrypt website[61] the following features are planned for future releases:

  • Ability to encrypt Windows system partitions/drives on UEFI-based computers
  • Command line options for volume creation (already implemented in Linux and Mac OS X versions)
  • "Raw" CD/DVD volumes

TrueCrypt and the Trusted Platform Module

The FAQ section of the TrueCrypt website states that the Trusted Platform Module (TPM) cannot be relied upon for security, because if the attacker has physical or administrative access to the computer and you use it afterwards, the computer could have been modified by the attacker e.g. a malicious component—such as a hardware keystroke logger—could have been used to capture the password or other sensitive information. Since the TPM does not prevent an attacker from maliciously modifying the computer, TrueCrypt will not support the TPM.[35]

Incompatibility with FlexNet Publisher

Installing 3rd party software which uses FlexNet Publisher (used for preventing software piracy) on products such as Adobe Photoshop and other software by Adobe, can damage the TrueCrypt bootloader on Windows partitions/drives encrypted by TrueCrypt and render the drive unbootable.[62] This is caused by the inappropriate design of FlexNet Publisher writing to the first drive track and overwriting whatever non-Windows bootloader exists there,[63] which also damages a dual-boot setup when dual-booting Windows and Linux.[64]

Version history

TrueCrypt is based on Encryption for the Masses (E4M), an open source on-the-fly encryption program first released in 1997. However, E4M was discontinued in 2000 as the author, Paul Le Roux, began working on commercial encryption software.

VersionRelease DateSignificant Changes
1.0February 2, 2004Initial release. Featured support for Windows 98, ME, 2000, and XP. Added plausible deniability for containers (although due to its simplistic nature, the practical value of the "plausible deniability" offered in this version is debatable),[65] and various bugfixes and improvements over E4M.
1.0aFebruary 3, 2004Removed support for Windows 98 and ME because the author of the Windows 9x driver for E4M (the ScramDisk driver) gave no permission that would allow his code to be used in projects derived from E4M.[66]
2.0June 7, 2004Added AES algorithm. Release made under the GNU General Public License, and signed as the TrueCrypt Foundation – previous versions were signed by TrueCrypt Team.
2.1June 21, 2004New release due to licencing issues relating to the GNU General Public License. This release was made under original E4M license.[67] Added RIPEMD-160, size of a volume was no longer limited to 2048 GB, ability to create NTFS volumes.
2.1aOctober 1, 2004Removed IDEA encryption algorithm. Version released on SourceForge.net, which became the official TrueCrypt domain. The official TrueCrypt domain moved back to truecrypt.org again at the beginning of May 2005, and the SourceForge website redirects to there.
3.0December 10, 2004Added hidden volume support for containers. Added the Serpent and Twofish algorithms, along with cascaded cipher support.
3.1January 22, 2005Added portable "Traveller mode", along with new volume mounting options such as being able to mount as "read only".
4.0November 1, 2005Added support for Linux, x86-64, Big Endian machines, keyfiles, hot keys, ability to protect hidden volumes against corruption when their outer volumes are mounted, favorite volumes, the Whirlpool hash algorithm, and language packs.
4.1November 25, 2005Added LRW mode, which is more secure than CBC mode for on-the-fly storage encryption.[7] LRW mode also neutralized an exploit that could (under certain circumstances) be used to compromise the plausible deniability of a TrueCrypt volume by allowing it to be distinguished from random data.[6]
4.2April 17, 2006Added various features to the Linux version, such as the ability to create volumes, change passwords and keyfiles, generate keyfiles, and backup/restore volume headers. In the Windows version, it introduced support for dynamic (sparse file) volumes.
4.3March 19, 2007Added support for Windows Vista, support for file systems using sector sizes other than 512 bytes. This release phased out support of 64-bit block ciphers, disallowing creation of new containers using the Blowfish, CAST-128, or Triple DES algorithms.
5.0February 5, 2008Introduced XTS mode of operation, which is more secure than LRW mode. Added Mac OS X support, Linux GUI and Windows system disk encryption with pre-boot authentication, ability of creation of hidden volumes within NTFS volumes, but removed the ability to create hidden volumes on Linux, use the tool on a non-gui console and the ability to create encrypted partitions from the text mode. Encrypting the system volume for Windows 2000 is no longer supported (encrypting containers and non-system volumes are still supported, however). Pipelining, SHA-512.
5.1March 10, 2008Added support for hibernation on Windows computers where the system partition is encrypted, the ability to mount a partition in Windows that is within the key scope of system encryption without pre-boot authentication, and added command line options for creating new volumes in Linux and Mac OS X. This version also reduced the minimum memory requirements for the TrueCrypt Boot Loader (AES) from 42 KB to 27 KB in Windows and included significant improvements in AES encryption/decryption performance. Changed to assembly implementation of AES.[68]
6.0July 4, 2008Parallelized encryption/decryption on multi-core processors (or multi-processor systems). Increase in encryption/decryption speed is directly proportional to the number of cores and/or processors. Deniable encryption support. Volume format updated to allow for a built-in backup, which allows recovery of containers with minor damage to their headers. Ability to create hidden volumes under Mac OS X and Linux.
6.0aJuly 8, 2008On systems where certain inappropriately designed chipset drivers were installed, it was impossible to encrypt the system partition/drive. This will no longer occur. Other minor bug fixes.
6.1October 31, 2008Ability to encrypt a non-system partition without losing existing data on the partition (in place encryption) on Windows Vista and Windows 2008. Added support for security tokens and smart cards (two-factor authentication), though only to store keyfiles (without encryption). TrueCrypt boot loader now customizable. Pre-boot passwords can be used to mount non-system volumes. Linux and Mac OS X versions can now mount an encrypted Windows system partition.
6.1aDecember 1, 2008Minor improvements, bug fixes, and security enhancements.
6.2May 11, 2009The I/O pipeline of the Windows version now uses read-ahead buffering to improve read performance, especially on solid-state drives.
6.2aJune 15, 2009Improved file container creation speed on systems that have issues with write block sizes greater than 64 KB. The "Device not ready" error will no longer occur when the process of decrypting a system partition/drive is finished. Other minor improvements and bug fixes.
6.3October 21, 2009Full support for Windows 7 and Mac OS X 10.6 Snow Leopard. "System Favorite Volumes" that allow regular TrueCrypt volumes to be mounted before system and application services start and before users start logging on.
6.3aNovember 23, 2009"Minor" unspecified improvements and bug fixes.
7.0July 19, 2010Hardware-accelerated AES. Encryption of hibernation files on Windows Vista and later. Automounting of volumes.
7.0aSeptember 6, 2010Workaround for a bug that caused system crashes when hibernating Truecrypt-encrypted systems. Other minor bug fixes and minor improvements.
7.1September 1, 2011Full compatibility with 64-bit and 32-bit Mac OS X 10.7 Lion. Minor improvements and bug fixes (Windows, Mac OS X, and Linux).
7.1aFebruary 7, 2012Minor improvements and bug fixes (Windows, Mac OS X, and Linux).

See also

References

  1. ^ a b c "DragonFly On-Line Manual Pages". DragonFly BSD Project. http://leaf.dragonflybsd.org/cgi/web- man?command=tcplay&section=ANY. Retrieved 2011-07-17.
  2. ^ a b "Supported Operating Systems". TrueCrypt Foundation. http://www.truecrypt.org/docs/?s=supp orted-operating-systems. Retrieved 2010-08-13.
  3. ^ "Operating Systems Supported for System Encryption". TrueCrypt Foundation. http://www.truecrypt.org/docs/?s=sys- encryption-supported-os. Retrieved 2010-08-13.
  4. ^ a b "README". tc-play. https://github.com/bwalex/tc-play/blo b/master/README. Retrieved 2013-02-16.
  5. ^ "FEDORA : Review Request: tcplay - Utility to create/open/map TrueCrypt-compatible volumes". FEDORA. https://bugzilla.redhat.com/show_bug. cgi?id=743497. Retrieved 2012-01-25.
  6. ^ a b c "TrueCrypt version history". TrueCrypt Foundation. http://www.truecrypt.org/docs/?s=vers ion-history. Retrieved 2009-10-01.
  7. ^ a b Fruhwirth, Clemens (2005-07-18). "New Methods in Hard Disk Encryption" (PDF). Institute for Computer Languages, Theory and Logic Group, Vienna University of Technology. http://clemens.endorphin.org/nmihde/n mihde-A4-ds.pdf. Retrieved 2007-03-10.
  8. ^ Parallel encryption for multi-core systems
  9. ^ Pipelining support only under Windows as for ver 6.3a
  10. ^ TrueCrypt - Free Open-Source Disk Encryption Software - Documentation - Hardware Acceleration
  11. ^ Conclusion : System Encryption: BitLocker And TrueCrypt Compared
  12. ^ Conclusion : Protect Your Data With Encryption
  13. ^ Security Requirements and Precautions
  14. ^ Plausible Deniability
  15. ^ TrueCrypt - Free Open-Source Disk Encryption - Documentation - Hidden Volume
  16. ^ TrueCrypt - Free Open-Source Disk Encryption Software - Documentation - Hidden Operating System
  17. ^ TrueCrypt - Free Open-Source Disk Encryption - Documentation - Hidden Volume Precautions
  18. ^ TrueCrypt - Free Open-Source Disk Encryption - Documentation - Hidden Operating System
  19. ^ Alexei Czeskis, David J. St. Hilaire, Karl Koscher, Steven D. Gribble, Tadayoshi Kohno, Bruce Schneier (2008-07-18). "Defeating Encrypted and Deniable File Systems: TrueCrypt v5.1a and the Case of the Tattling OS and Applications". 3rd USENIX Workshop on Hot Topics in Security. http://www.cs.washington.edu/homes/su persat/paper-truecrypt-dfs.pdf.
  20. ^ diskscrub - disk overwrite utility - Google Project Hosting
  21. ^ Plausible Deniability
  22. ^ [1][dead link]
  23. ^ Alex Halderman et al.. "Lest We Remember: Cold Boot Attacks on Encryption Keys". http://www.usenix.org/event/sec08/tec h/full_papers/halderman/halderman_htm l/.
  24. ^ "TrueCrypt documentation - Physical security". truecrypt.org. http://www.truecrypt.org/docs/?s=phys ical-security.
  25. ^ Bruce Schneier (2009-10-23). ""Evil Maid" Attacks on Encrypted Hard Drives". Schneier on Security. https://www.schneier.com/blog/archive s/2009/10/evil_maid_attac.html.
  26. ^ TrueCrypt documentation: Malware. Accessed on: April 10, 2011
  27. ^ "Stoned bootkit White Paper" (PDF). Black Hat Technical Security Conference USA 2009. Peter Kleissner. http://www.blackhat.com/presentations /bh-usa-09/KLEISSNER/BHUSA09-Kleissne r-StonedBootkit-PAPER.pdf. Retrieved 2009-08-05.
  28. ^ "Stoned bootkit Presentation Slides" (PDF). Black Hat Technical Security Conference USA 2009. Peter Kleissner. http://www.blackhat.com/presentations /bh-usa-09/KLEISSNER/BHUSA09-Kleissne r-StonedBootkit-SLIDES.pdf. Retrieved 2009-08-05.
  29. ^ "Bootkit bypasses hard disk encryption". The H-Security (H-Online.com). Heise Media UK Ltd.. http://www.h-online.com/security/Boot kit-bypasses-hard-disk-encryption--/n ews/113884. Retrieved 2009-08-05.
  30. ^ David M Williams (2009-09-07). "The dark side of open source software is Stoned". iTWire. 
  31. ^ "TrueCrypt vs Peter Kleissner, Or Stoned BootKit Revisited..". Simon Hunt. http://simonhunt.wordpress.com/2009/0 8/04/truecrypt-vs-peter-kleissner-or- stoned-bootkit-revisited. Retrieved 2009-08-05.
  32. ^ Uli Ries (2009-07-30). "Bootkit hebelt Festplattenverschlüsselung aus" (in German). Heise Online. 
  33. ^ "Windows-Hacking: TrueCrypt Verschlüsselung umgangen" (in German). Gulli News. 2009-07-30. 
  34. ^ "Stoned bootkit attacking TrueCrypt's full volume encryption". TrueCrypt Foundation mail in response to Peter Kleissner on 18/07/2009. http://www.stoned-vienna.com/download s/TrueCrypt%20Foundation%20Mail%2018. %20Juli%202009.tif. Retrieved 2009-08-05.
  35. ^ a b "Some encryption programs use TPM to prevent attacks. Will TrueCrypt use it too?". TrueCrypt FAQ. TrueCrypt Foundation. http://www.truecrypt.org/faq#tpm. Retrieved 2011-08-24.
  36. ^ "TrueCrypt Foundation is a joke to the security industry, pro Microsoft". Peter Kleissner post and expert comments about Stoned bootkit. Peter Kleissner. http://peterkleissner.com/?p=11. Retrieved 2009-08-05.
  37. ^ Goodin, Dan (2012-02-17). "Malicious backdoor in open-source messaging apps not spotted for 3 months". Ars Technica. http://arstechnica.com/business/2012/ 02/malicious-backdoor-in-open-source- messaging-apps-not-spotted-for-4-mont hs/. Retrieved 2012-09-26.
  38. ^ Naraine, Ryan (2010-12-03). "Open-source ProFTPD hacked, backdoor planted in source code". ZDNet. http://www.zdnet.com/blog/security/op en-source-proftpd-hacked-backdoor-pla nted-in-source-code/7787. Retrieved 2012-09-26.
  39. ^ "ftp.proftpd.org compromised". Forums.proftpd.org. 2010-12-02. https://forums.proftpd.org/smf/index. php?topic=5206.0. Retrieved 2012-09-26.
  40. ^ a b metatags generator. "Backdoors and Rootkits". Airdemon.net. http://www.airdemon.net/backdoors.htm l. Retrieved 2012-09-26.
  41. ^ a b Chu, Mark C. (2007-04-15). "Strange Loops: Ken Thompson and the Self-referencing C Compiler – Good Math, Bad Math". Scienceblogs.com. http://scienceblogs.com/goodmath/2007 /04/15/strange-loops-dennis-ritchie-a /. Retrieved 2012-09-26.
  42. ^ "phpMyAdmin distributed with backdoor - The H Open: News and Features". H-online.com. http://www.h-online.com/open/news/ite m/phpMyAdmin-distributed-with-backdoo r-1717644.html. Retrieved 2012-09-26.
  43. ^ a b "Analysis: Is there a backdoor in Truecrypt? Is Truecrypt a CIA honeypot?". Privacy Lover. 2010-08-14. http://www.privacylover.com/encryptio n/analysis-is-there-a-backdoor-in-tru ecrypt-is-truecrypt-a-cia-honeypot/. Retrieved 2012-09-26.
  44. ^ Analysis: Is there a backdoor in Truecrypt? Is Truecrypt a CIA honeypot?. Accessed on: May 21, 2012
  45. ^ 03:13 PM. "Is their anyone who has actually examined Truecrypts code? - Wilders Security Forums". Wilderssecurity.com. http://www.wilderssecurity.com/showth read.php?t=240940. Retrieved 2012-09-26.
  46. ^ Schneier, UW Team Show Flaw In TrueCrypt Deniability. Accessed on: June 12, 2012
  47. ^ TrueCrypt License. Accessed on: May 21, 2012
  48. ^ Fedora Project Forbidden Items. Accessed on: May 21, 2012
  49. ^ Tails TrueCrypt Security Considerations. Accessed on: May 21, 2012
  50. ^ Court Rules TrueCrypt User Cannot Be Compelled To Decrypt Hard Disk - informationliberation
  51. ^ Court rules that TrueCrypt user cannot be compelled to decrypt hard disk [PDF] : technology
  52. ^ J. Leyden (2010). "Brazilian banker's crypto baffles FBI". The Register. http://www.theregister.co.uk/2010/06/ 28/brazil_banker_crypto_lock_out/. Retrieved 2010-08-13.
  53. ^ Arch Linux Truecrypt PKGBUILD Accessed on: July 17, 2011
  54. ^ Debian Bug report logs - #364034. Accessed on: January 12, 2009.
  55. ^ Bug #109701 in Ubuntu. Accessed on: April 20, 2009
  56. ^ TrueCrypt licensing concern Accessed on: April 20, 2009
  57. ^ non-OSI compliant packages in the openSUSE Build Service. Accessed on: April 20, 2009
  58. ^ Gentoo bug 241650. Accessed on: April 20, 2009
  59. ^ Tom Calloway of Red Hat about TrueCrypt licensing concern Accessed on July 10, 2009
  60. ^ Intellectual Property Digital Library; search trademarks directory for IRN/925625
  61. ^ Features to be implemented in future versions
  62. ^ "Freeze when you reboot a Windows system that has TrueCrypt Disk Encryption software and Adobe applications installed". 16 November 2009. http://helpx.adobe.com/creative-suite /kb/freeze-reboot-windows-system-true crypt.html. Retrieved 5 April 2012.
  63. ^ "TrueCrypt Documentation: Incompatibilities". http://www.truecrypt.org/docs/incompa tibilities. Retrieved 5 April 2012.
  64. ^ "grub fails after running Windows". 4 October 2009. https://bugs.launchpad.net/ubuntu/+so urce/grub2/+bug/441941. Retrieved 5 April 2012. FlexNet Publisher has been implicated as the cause of this problem.
  65. ^ Plausible Deniability
  66. ^ The authors of Scramdisk and E4M exchanged some code – the author of Scramdisk provided a driver for Windows 9x, and the author of E4M provided a driver for Windows NT, enabling cross-platform versions of both programs.
  67. ^ "TrueCrypt User's Guide" (PDF). TrueCrypt Version 3.1a. TrueCrypt Foundation. 2005-02-07. p. 44. Archived from the original on 2007-03-27. http://web.archive.org/web/2007032714 0654/http://security.ngoinabox.org/Pr ograms/Security/Encryption+Tools/True Crypt/TrueCrypt+User+Guide.pdf. Retrieved 2007-05-01.
  68. ^ "Version History Part 1". TrueCrypt Documentation. TrueCrypt Foundation. http://www.truecrypt.org/docs/?s=vers ion-history. Retrieved 2008-06-04.

External links

(Sebelumnya) true and false (commands)TrueSpace (Berikutnya)