Where to get a legit or non-tampered version TrueCrypt

Posted on 2016-10-06
Medium Priority
Last Modified: 2016-10-07
We were reading up on TrueCrypt issue regarding it’s end-of-life or no-longer-available version and found a link within the reads that seems legit download link (from grc site).  We have no knowledge of grc or its developers, can EE recommend a link we can download the actual TrueCrypt last working version 7.1a? (or if the link we provided above is an actual good download link)

Note, we have. Series of volumes in a backup drives that are TC but one our computers have been damages and until now couldn't bring up.
Question by:rayluvs
  • 2
LVL 58

Assisted Solution

McKnife earned 1000 total points
ID: 41832047
IIRC, you can use veracrypt to mount truecrypt drives. Read their FAQ, please. Would be recommendable, because veracrypt is a maintained project.
LVL 66

Accepted Solution

btan earned 1000 total points
ID: 41832206
Agree with McKnife, instead use Veracrypt which is equivalent capable just that the TC container will not be interoperable and need to be exported out of the files and then create the VC container to import those files. The VC also has list of hash to ascertain its assured legit executable. See  

Also there is review on VC that shared a leveled up security checks done
VeraCrypt not only enhances security over the original TrueCrypt through an increased iterations count, but it also solves all the serious security issues and weaknesses discovered so far in the source code. A good list of these weaknesses can be found in the https://opencryptoaudit.org/reports/iSec_Final_Open_Crypto_Audit_Project_TrueCrypt_Security_Assessment.pdf

We have documented these security changes in the git commits. The important ones start with "Windows vulnerability fix" and "Static Code Analysis".

Author Comment

ID: 41832309
Ok will go.

Author Comment

ID: 41833940
Thank you both.

Featured Post

The Firewall Audit Checklist

Preparing for a firewall audit today is almost impossible.
AlgoSec, together with some of the largest global organizations and auditors, has created a checklist to follow when preparing for your firewall audit. Simplify risk mitigation while staying compliant all of the time!

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

You do not need to be a security expert to make the RIGHT security. You just need some 3D guidance, to help lay out an action plan to secure your business operations. It does not happen overnight. You just need to start now and do the first thin…
In computing, Vulnerability assessment and penetration testing are used to assess systems in light of the organization's security posture, but they have different purposes.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…

597 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question