	{"id":39682,"date":"2015-04-06T12:59:10","date_gmt":"2015-04-06T19:59:10","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=39682"},"modified":"2017-01-06T15:43:24","modified_gmt":"2017-01-06T23:43:24","slug":"truecrypt-has-been-audited-should-you-use-it","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/truecrypt-has-been-audited-should-you-use-it\/","title":{"rendered":"TrueCrypt Has Been Audited! Should You Use It?"},"content":{"rendered":"<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/truecrypt-has-been-audited-should-you-use-it\/truecrypt-audit\/\" rel=\"attachment wp-att-39838\"><img loading=\"lazy\" class=\"aligncenter size-full wp-image-39838\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/04\/truecrypt-audit.jpg\" alt=\"TrueCrypt audit\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/04\/truecrypt-audit.jpg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/04\/truecrypt-audit-150x75.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/04\/truecrypt-audit-300x150.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/a><\/p>\n<p>Close to a year ago, I wrote an article entitled &#8220;<a title=\"TrueCrypt is Dead; What Does This Mean for Mac Users?\" href=\"https:\/\/www.intego.com\/mac-security-blog\/truecrypt-is-dead-what-does-this-mean-for-mac-users\/\" target=\"_blank\">TrueCrypt is Dead; What Does This Mean for Mac Users?<\/a>&#8221; after the developers of the source-available<strong>*<\/strong> disk encryption software abruptly terminated the project.<\/p>\n<p>It might surprise readers, then, to see recent headlines about the second phase of TrueCrypt&#8217;s security audit having been completed. What&#8217;s the point of auditing software that&#8217;s no longer being developed? Is TrueCrypt really dead?<\/p>\n<p>Let&#8217;s address the second question first. The short answer is that, yes, TrueCrypt itself is dead in the sense that it&#8217;s not being developed anymore by its original creators.<\/p>\n<p>It is extremely unlikely that there will ever be another official version of the software under the trademarked TrueCrypt name (and if one should ever surface, it would be viewed with such intense skepticism <a title=\"TrueCrypt is Dead; What Does This Mean for Mac Users?\" href=\"https:\/\/www.intego.com\/mac-security-blog\/truecrypt-is-dead-what-does-this-mean-for-mac-users\/\" target=\"_blank\">after last year&#8217;s brouhaha<\/a>\u00a0that very few people would likely use it).<\/p>\n<p>But some people view TrueCrypt&#8217;s demise more positively: &#8220;TrueCrypt is dead; long live TrueCrypt.&#8221;<\/p>\n<h3>Long live TrueCrypt?<\/h3>\n<p><img loading=\"lazy\" class=\"alignright size-full wp-image-39697\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/04\/TrueCrypt-logo.png\" alt=\"TrueCrypt-logo\" width=\"120\" height=\"155\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/04\/TrueCrypt-logo.png 120w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/04\/TrueCrypt-logo-116x150.png 116w\" sizes=\"(max-width: 120px) 100vw, 120px\" \/>One subset of those people includes the die-hard believers in TrueCrypt who continue to view it as the best software of its kind, in spite of public concerns about its security. Some still prefer it over Microsoft and Apple&#8217;s built-in full-disk encryption alternatives (e.g. Windows&#8217; BitLocker and OS X&#8217;s FileVault 2, respectively; more about the latter later) due to paranoia about whether these major U.S.-based corporations may be beholden to\u2014or compromised by\u2014the government or intelligence agencies such as the NSA.<\/p>\n<p>Still others continue using TrueCrypt for its unique features, including cross-platform encrypted disks (a feature that&#8217;s still being utilized by <a title=\"Amazon Web Services Security FAQ\" href=\"https:\/\/aws.amazon.com\/importexport\/faqs\/#Security\" target=\"_blank\">Amazon Web Services<\/a>\u00a0today), and the <a title=\"Link to Wikipedia article\" href=\"https:\/\/en.wikipedia.org\/wiki\/TrueCrypt#Plausible_deniability\" target=\"_blank\">plausible deniability<\/a>\u00a0hidden operating system feature for Windows users, which allows a user who&#8217;s under duress to use an alternative boot password to log into a different operating system that doesn&#8217;t contain incriminating information.<\/p>\n<p>Another subset of those still interested in TrueCrypt, and thus its ongoing security audit, are programmers who are continuing to develop TrueCrypt independent of the original creators\u2014an undertaking which is known in the software development field as <em>forking<\/em> a project.<\/p>\n<p>There has been some debate about how acceptable it is to create a public fork of the TrueCrypt codebase under its unique source code license, which threatens legal prosecution if the copyright holder feels that some part of the license was not followed precisely, and expressly forbids relicensing the software under any other license. One fork, <a title=\"Link to Wikipedia article\" href=\"https:\/\/en.wikipedia.org\/wiki\/VeraCrypt\" target=\"_blank\">VeraCrypt<\/a>, brazenly defies this prohibition and claims that VeraCrypt is offered under both the TrueCrypt License and the Microsoft Public License. Another fork, <a title=\"Link to Wikipedia article\" href=\"https:\/\/en.wikipedia.org\/wiki\/CipherShed\" target=\"_blank\">CipherShed<\/a>, is currently offered under the TrueCrypt License but intends to eventually undergo a complete code rewrite so that it can legally cut ties with that license and officially be relicensed as truly free (as in freedom) open-source software.<strong>*<\/strong><\/p>\n<p>Naturally, both for those who use continue using TrueCrypt 7.1a (the final full-featured version) and for those who want to develop or use a fork of TrueCrypt, it&#8217;s important to know with confidence that the software is secure and safe to use.<\/p>\n<h3>Is TrueCrypt\u00a0secure and safe to use?<\/h3>\n<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/truecrypt-has-been-audited-should-you-use-it\/audit-with-white-paper-tears\/\" rel=\"attachment wp-att-39856\"><img loading=\"lazy\" class=\"aligncenter size-full wp-image-39856\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/04\/open-crypto-audit.jpg\" alt=\"Open Crypto Audit\" width=\"500\" height=\"250\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/04\/open-crypto-audit.jpg 500w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/04\/open-crypto-audit-150x75.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/04\/open-crypto-audit-300x150.jpg 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/a><\/p>\n<p>In late 2013, prior to TrueCrypt&#8217;s demise, a Canadian student was able to successfully compile the Windows version of TrueCrypt 7.1a&#8217;s source code and output the identical resulting binary that was available to download from TrueCrypt&#8217;s site, and he <a title=\"How I compiled TrueCrypt 7.1a for Win32 and matched the official binaries\" href=\"https:\/\/madiba.encs.concordia.ca\/~x_decarn\/truecrypt-binaries-analysis\/\" target=\"_blank\">shared the results of how he did so<\/a>. This means that if the source code is thoroughly audited and found to be safe, then one can reasonably infer that the pre-compiled software that was originally available from TrueCrypt&#8217;s site is probably safe as well (or at least the Windows version of it).<\/p>\n<p>Around the same time in 2013, cryptographer and Johns Hopkins University research professor Matthew Green, and professional security researcher\u00a0Kenneth White, <a title=\"IsTrueCryptAuditedYet?\" href=\"http:\/\/istruecryptauditedyet.com\/\" target=\"_blank\">kicked off a campaign<\/a>\u00a0to formally and publicly audit the TrueCrypt software, and thus the <a title=\"Open Crypto Audit Project\" href=\"https:\/\/opencryptoaudit.org\/\" target=\"_blank\">Open Crypto Audit Project<\/a>\u00a0(OCAP) was formed. The scope of this project was narrowed to include two phases: the first, to assess the bootloader and Windows kernel driver, and the second, &#8220;to perform a scoped engagement on portions of TrueCrypt&#8217;s cryptographic implementations and use.&#8221;<\/p>\n<p><strong>TrueCrypt audit phase 1<\/strong><\/p>\n<p>The first phase of the project was completed in February 2014 (with the blessing of TrueCrypt&#8217;s development team, and while TrueCrypt 7.1a was still available from the official TrueCrypt site) and was published (<a title=\"Open Crypto Audit Project - Security Assessment\" href=\"https:\/\/opencryptoaudit.org\/reports\/iSec_Final_Open_Crypto_Audit_Project_TrueCrypt_Security_Assessment.pdf\" target=\"_blank\">PDF<\/a>) soon thereafter. The auditors &#8220;found no evidence of backdoors or otherwise intentionally malicious code&#8221; in the bootloader or the Windows kernel driver, and no &#8220;high-severity issues&#8221; were found, although various medium and low-severity and other potential issues were detailed in the report.<\/p>\n<p><strong>TrueCrypt audit phase 2<\/strong><\/p>\n<p>The second phase of the TrueCrypt audit was finally completed in March 2015 and was just published (<a title=\"Open Crypto Audit Project - Cryptographic Review\" href=\"https:\/\/opencryptoaudit.org\/reports\/TrueCrypt_Phase_II_NCC_OCAP_final.pdf\" target=\"_blank\">PDF<\/a>) on Thursday. Green&#8217;s &#8220;TL;DR&#8221; <a title=\"A Few Thoughts on Cryptographic Engineering\" href=\"http:\/\/blog.cryptographyengineering.com\/2015\/04\/truecrypt-report.html\" target=\"_blank\">summary<\/a>\u00a0states that the &#8220;audit found no evidence of deliberate backdoors, or any severe design flaws that will make the software insecure in most instances.&#8221;<\/p>\n<p>However, two &#8220;high-severity issues&#8221; were identified in the second audit (along with a low-severity issue and one of undetermined severity). The more significant of the high-severity issues, Green asserts, is that &#8220;in some extremely rare circumstances&#8221; the Windows version of TrueCrypt doesn&#8217;t properly handle cases where the Windows Cryptography API (application programming interface) fails to initialize correctly, and neglects to warn the user about this failure and proceeds anyway. Green feels that &#8220;the likelihood of such a failure is extremely low,&#8221; and that &#8220;even if the Windows Crypto API does fail on your system, [TrueCrypt] still collects entropy from sources such as system pointers and mouse movements&#8221; which he feels &#8220;are probably good enough to protect you.&#8221; Both Green and the auditors recommended that those developing forks of TrueCrypt rewrite the code to implement better checks for failures of this kind.<\/p>\n<p>The second high-severity issue discovered in the second audit relates to TrueCrypt&#8217;s AES implementation being susceptible to cache-timing attacks, which Green feels &#8220;is probably not a concern unless you&#8217;re perform encryption and decryption on a shared machine [meaning a computer you share with someone else], or in an environment where the attacker can run code on your system (e.g., in a sandbox, or potentially in the browser).&#8221; The auditors offer strategies that could be used in TrueCrypt forks to partially mitigate this weakness.<\/p>\n<p>Both Green&#8217;s TL;DR summary and the second audit&#8217;s Findings Summary seem positive overall with regards to the security of the audited portions of TrueCrypt. The auditors state that none of the four total issues they identified in the second audit &#8220;led to a complete bypass of confidentiality in common usage scenarios,&#8221; and also state that &#8220;the standard workflow of creating a volume and making use of it was reviewed, and no significant flaws were found that would impact it.&#8221;<\/p>\n<h3>What about Mac OS X and Linux versions?<\/h3>\n<p><img loading=\"lazy\" class=\"aligncenter wp-image-5665\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/08\/macbook.jpg\" alt=\"macbook\" width=\"500\" height=\"250\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/08\/macbook.jpg 640w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/08\/macbook-150x75.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/08\/macbook-300x150.jpg 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/08\/macbook-100x50.jpg 100w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/p>\n<p>With these two audits completed, the status at the top of the official audit site IsTrueCryptAuditedYet.com has been changed to a resounding &#8220;Yes!&#8221;\u2014but much more work could be done to throughly audit TrueCrypt. The Mac and Linux versions have not been a focus to date, and there are many other potential areas of focus specified in the Project Goals and Scope sections of the audit reports. An extremely thorough audit of all components and uses of TrueCrypt would be nice, but it would also be extremely expensive. The <a title=\"Open Crypto Audit Project\" href=\"https:\/\/opencryptoaudit.org\/\" target=\"_blank\">homepage\u00a0of the Open Crypto Audit Project<\/a> states,\u00a0&#8220;pending an executive summary, TrueCrypt is Audited,&#8221; which seems to imply that the two audits completed thus far are the only ones that the OCAP plans to spearhead for the time being.<\/p>\n<p>So, should you use TrueCrypt or one of its offshoots? We&#8217;ll leave that as an exercise for you, the reader, to decide after examining the available evidence, but if you need to share encrypted disk images or external drives with someone who uses Windows or Linux, then it&#8217;s probably a decent solution for your use case.<\/p>\n<h3>Apple&#8217;s built-in full-disk encryption alternatives<\/h3>\n<p><img loading=\"lazy\" class=\"aligncenter wp-image-33163\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/osx-yosemite-security-privacy.jpg\" alt=\"OS X Yosemite Security Privacy\" width=\"500\" height=\"250\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/osx-yosemite-security-privacy.jpg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/osx-yosemite-security-privacy-150x75.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/osx-yosemite-security-privacy-300x150.jpg 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/p>\n<p>However, if your goal is to encrypt your Mac&#8217;s boot drive, and assuming you trust Apple (and you probably do if you&#8217;re using a Mac), then you&#8217;ll probably want to use the Apple-supported whole-disk encryption solution that&#8217;s built right into your operating system: FileVault 2.<\/p>\n<p><strong>How to use FileVault 2<\/strong><\/p>\n<p>FileVault 2 (which is different from the original FileVault built into Mac OS X v10.6 Snow Leopard that merely encrypts a user&#8217;s home folder while leaving the rest the disk unencrypted, including memory swap files) is really easy to enable if you&#8217;re not already using it (and you might be, especially if you&#8217;ve<a title=\"OS X Yosemite Encrypts Disks by Default, Better Protecting Privacy\" href=\"https:\/\/www.intego.com\/mac-security-blog\/yosemite-filevault\/\" target=\"_blank\"> upgraded to Yosemite<\/a>). Just click on the <strong>Apple menu<\/strong>, select <strong>System Preferences\u2026<\/strong>, click on <strong>Security &amp; Privacy<\/strong>, and then click on <strong>FileVault<\/strong>.<\/p>\n<p>If you haven&#8217;t already enabled the feature, then you&#8217;ll see a button labeled <strong>Turn On FileVault<\/strong> (note that you may need to first click on the lock icon and enter your administrator password, if prompted, before you can click on the Turn On FileVault button). After clicking on that button, OS X will walk you through the process of encrypting your Mac&#8217;s hard drive. For more information about using FileVault 2, you can review the Apple support article entitled &#8220;<a title=\"Link to Apple Support page\" href=\"https:\/\/support.apple.com\/en-us\/HT4790\" target=\"_blank\">OS X: About FileVault 2<\/a>.&#8221;<\/p>\n<p><strong>How to use Disk Utility<\/strong><\/p>\n<p>If you just want to create an encrypted, portable disk image that you only plan to use on Macs, you can do that with Apple&#8217;s Disk Utility application, which is also part of OS X. You can find it by opening <strong>Macintosh HD<\/strong>, then the <strong>Applications<\/strong> folder, then the <strong>Utilities<\/strong> folder (or simply click on the Spotlight magnifying glass in the upper-right corner of your screen and start typing Disk Utility). We&#8217;ve previously explained how to make an <a title=\"How to Use Apple\u2019s Built-in Features to Encrypt Files and Folders\" href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-use-apples-built-in-features-to-encrypt-files-and-folders\/\" target=\"_blank\">encrypted disk image from an existing folder<\/a>, but you may not know that you can also create a new disk image of just about any size by clicking on the <strong>File menu<\/strong>, selecting <strong>New<\/strong> and then <strong>Blank Disk Image\u2026<\/strong>, and then selecting the disk size, encryption format, and other options, as seen in this screenshot:<\/p>\n<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/truecrypt-has-been-audited-should-you-use-it\/blankdiskimagesecure\/\" rel=\"attachment wp-att-39688\"><img loading=\"lazy\" class=\"aligncenter size-full wp-image-39688\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/04\/BlankDiskImageSecure.png\" alt=\"blank disk image secure\" width=\"500\" height=\"501\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/04\/BlankDiskImageSecure.png 500w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/04\/BlankDiskImageSecure-150x150.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/04\/BlankDiskImageSecure-300x300.png 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/a><\/p>\n<p>But hey, if you have a desire to use TrueCrypt instead of some alternative solution, at least now you know that TrueCrypt has been audited and is therefore safe to use.<\/p>\n<p>\u2026Probably.<\/p>\n<div>\n<hr>\n<div>\n<p><strong>*<\/strong>Technically, TrueCrypt is more accurately referred to as &#8220;source-available&#8221; rather than &#8220;open-source&#8221; software; the TrueCrypt license is somewhat restrictive and <a title=\"Link to Wikipedia article\" href=\"https:\/\/en.wikipedia.org\/wiki\/TrueCrypt#License_and_source_model\" target=\"_blank\">is not recognized<\/a> by the Free Software Foundation or the Open Source Initiative.<\/p>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Close to a year ago, I wrote an article entitled &#8220;TrueCrypt is Dead; What Does This Mean for Mac Users?&#8221; after the developers of the source-available* disk encryption software abruptly terminated the project. It might surprise readers, then, to see recent headlines about the second phase of TrueCrypt&#8217;s security audit having been completed. What&#8217;s the [&hellip;]<\/p>\n","protected":false},"author":14,"featured_media":39844,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[13,5],"tags":[273,309,80,621,1135,149],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Close to a year ago, I wrote an article entitled &quot;TrueCrypt is Dead; What Does This Mean for Mac Users?&quot; after the developers of the source-available*\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/truecrypt-has-been-audited-should-you-use-it\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"TrueCrypt Has Been Audited! Should You Use It? - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Close to a year ago, I wrote an article entitled &quot;TrueCrypt is Dead; What Does This Mean for Mac Users?&quot; after the developers of the source-available*\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/truecrypt-has-been-audited-should-you-use-it\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/JoshLong\" \/>\n<meta property=\"article:published_time\" content=\"2015-04-06T19:59:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-01-06T23:43:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/04\/truecrypt-audited-feature.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"398\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@theJoshMeister\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Joshua Long\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/truecrypt-has-been-audited-should-you-use-it\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/04\/truecrypt-audited-feature.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/04\/truecrypt-audited-feature.jpg\",\"width\":398,\"height\":260,\"caption\":\"TrueCrypt audited: should you use it?\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/truecrypt-has-been-audited-should-you-use-it\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/truecrypt-has-been-audited-should-you-use-it\/\",\"name\":\"TrueCrypt Has Been Audited! Should You Use It? - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/truecrypt-has-been-audited-should-you-use-it\/#primaryimage\"},\"datePublished\":\"2015-04-06T19:59:10+00:00\",\"dateModified\":\"2017-01-06T23:43:24+00:00\",\"description\":\"Close to a year ago, I wrote an article entitled \\\"TrueCrypt is Dead; What Does This Mean for Mac Users?\\\" after the developers of the source-available*\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/truecrypt-has-been-audited-should-you-use-it\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/truecrypt-has-been-audited-should-you-use-it\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/truecrypt-has-been-audited-should-you-use-it\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"TrueCrypt Has Been Audited! Should You Use It?\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/truecrypt-has-been-audited-should-you-use-it\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/truecrypt-has-been-audited-should-you-use-it\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\"},\"headline\":\"TrueCrypt Has Been Audited! Should You Use It?\",\"datePublished\":\"2015-04-06T19:59:10+00:00\",\"dateModified\":\"2017-01-06T23:43:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/truecrypt-has-been-audited-should-you-use-it\/#webpage\"},\"wordCount\":1728,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/truecrypt-has-been-audited-should-you-use-it\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/04\/truecrypt-audited-feature.jpg\",\"keywords\":[\"Encryption\",\"Linux\",\"Mac OS X\",\"Software\",\"TrueCrypt\",\"Windows\"],\"articleSection\":[\"Security &amp; Privacy\",\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/truecrypt-has-been-audited-should-you-use-it\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\",\"name\":\"Joshua Long\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"caption\":\"Joshua Long\"},\"description\":\"Joshua Long (@theJoshMeister), formerly Intego\\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \\u2014\",\"sameAs\":[\"https:\/\/security.thejoshmeister.com\",\"https:\/\/www.facebook.com\/JoshLong\",\"https:\/\/www.instagram.com\/thejoshmeister\/\",\"https:\/\/www.linkedin.com\/in\/thejoshmeister\",\"https:\/\/www.pinterest.com\/thejoshmeister\/\",\"https:\/\/twitter.com\/theJoshMeister\",\"https:\/\/www.youtube.com\/@theJoshMeister\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Close to a year ago, I wrote an article entitled \"TrueCrypt is Dead; What Does This Mean for Mac Users?\" after the developers of the source-available*","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/truecrypt-has-been-audited-should-you-use-it\/","og_locale":"en_US","og_type":"article","og_title":"TrueCrypt Has Been Audited! Should You Use It? - The Mac Security Blog","og_description":"Close to a year ago, I wrote an article entitled \"TrueCrypt is Dead; What Does This Mean for Mac Users?\" after the developers of the source-available*","og_url":"https:\/\/www.intego.com\/mac-security-blog\/truecrypt-has-been-audited-should-you-use-it\/","og_site_name":"The Mac Security Blog","article_author":"https:\/\/www.facebook.com\/JoshLong","article_published_time":"2015-04-06T19:59:10+00:00","article_modified_time":"2017-01-06T23:43:24+00:00","og_image":[{"width":398,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/04\/truecrypt-audited-feature.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_creator":"@theJoshMeister","twitter_misc":{"Written by":"Joshua Long","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/truecrypt-has-been-audited-should-you-use-it\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/04\/truecrypt-audited-feature.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/04\/truecrypt-audited-feature.jpg","width":398,"height":260,"caption":"TrueCrypt audited: should you use it?"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/truecrypt-has-been-audited-should-you-use-it\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/truecrypt-has-been-audited-should-you-use-it\/","name":"TrueCrypt Has Been Audited! Should You Use It? - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/truecrypt-has-been-audited-should-you-use-it\/#primaryimage"},"datePublished":"2015-04-06T19:59:10+00:00","dateModified":"2017-01-06T23:43:24+00:00","description":"Close to a year ago, I wrote an article entitled \"TrueCrypt is Dead; What Does This Mean for Mac Users?\" after the developers of the source-available*","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/truecrypt-has-been-audited-should-you-use-it\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/truecrypt-has-been-audited-should-you-use-it\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/truecrypt-has-been-audited-should-you-use-it\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"TrueCrypt Has Been Audited! Should You Use It?"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/truecrypt-has-been-audited-should-you-use-it\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/truecrypt-has-been-audited-should-you-use-it\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1"},"headline":"TrueCrypt Has Been Audited! Should You Use It?","datePublished":"2015-04-06T19:59:10+00:00","dateModified":"2017-01-06T23:43:24+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/truecrypt-has-been-audited-should-you-use-it\/#webpage"},"wordCount":1728,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/truecrypt-has-been-audited-should-you-use-it\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/04\/truecrypt-audited-feature.jpg","keywords":["Encryption","Linux","Mac OS X","Software","TrueCrypt","Windows"],"articleSection":["Security &amp; Privacy","Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/truecrypt-has-been-audited-should-you-use-it\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1","name":"Joshua Long","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","caption":"Joshua Long"},"description":"Joshua Long (@theJoshMeister), formerly Intego\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \u2014","sameAs":["https:\/\/security.thejoshmeister.com","https:\/\/www.facebook.com\/JoshLong","https:\/\/www.instagram.com\/thejoshmeister\/","https:\/\/www.linkedin.com\/in\/thejoshmeister","https:\/\/www.pinterest.com\/thejoshmeister\/","https:\/\/twitter.com\/theJoshMeister","https:\/\/www.youtube.com\/@theJoshMeister"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/04\/truecrypt-audited-feature.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-ak2","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/39682"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=39682"}],"version-history":[{"count":62,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/39682\/revisions"}],"predecessor-version":[{"id":60988,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/39682\/revisions\/60988"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/39844"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=39682"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=39682"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=39682"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}