Solved

Where to get a legit or non-tampered version TrueCrypt

Posted on 2016-10-06
4
79 Views
Last Modified: 2016-10-07
We were reading up on TrueCrypt issue regarding it’s end-of-life or no-longer-available version and found a link within the reads that seems legit download link (from grc site).  We have no knowledge of grc or its developers, can EE recommend a link we can download the actual TrueCrypt last working version 7.1a? (or if the link we provided above is an actual good download link)

Note, we have. Series of volumes in a backup drives that are TC but one our computers have been damages and until now couldn't bring up.
0
Comment
Question by:rayluvs
  • 2
4 Comments
 
LVL 54

Assisted Solution

by:McKnife
McKnife earned 250 total points
ID: 41832047
IIRC, you can use veracrypt to mount truecrypt drives. Read their FAQ, please. Would be recommendable, because veracrypt is a maintained project.
0
 
LVL 62

Accepted Solution

by:
btan earned 250 total points
ID: 41832206
Agree with McKnife, instead use Veracrypt which is equivalent capable just that the TC container will not be interoperable and need to be exported out of the files and then create the VC container to import those files. The VC also has list of hash to ascertain its assured legit executable. See  
https://veracrypt.codeplex.com/wikipage?title=Downloads

Also there is review on VC that shared a leveled up security checks done
VeraCrypt not only enhances security over the original TrueCrypt through an increased iterations count, but it also solves all the serious security issues and weaknesses discovered so far in the source code. A good list of these weaknesses can be found in the https://opencryptoaudit.org/reports/iSec_Final_Open_Crypto_Audit_Project_TrueCrypt_Security_Assessment.pdf

We have documented these security changes in the git commits. The important ones start with "Windows vulnerability fix" and "Static Code Analysis".
https://veracrypt.codeplex.com/discussions/569777
0
 

Author Comment

by:rayluvs
ID: 41832309
Ok will go.
0
 

Author Comment

by:rayluvs
ID: 41833940
Thank you both.
0

Featured Post

Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
(Open)LDAP V2.44  search proxy to AD (W2012R2) 37 144
Change administrator password on server 13 53
Lightweight Networking 9 44
User account lockout - Server 2012R2 7 30
If you thought ransomware was bad, think again! Doxware has the potential to be even more damaging.
The new Gmail Phishing Scam going around is surprising even the savviest of users with its sophisticated techniques.
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

832 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question