[cryptography] Backdoors in software

Eugen Leitl eugen at leitl.org
Mon Sep 9 15:28:41 EDT 2013


On Mon, Sep 09, 2013 at 01:50:54PM -0500, Nicolai wrote:
> On Mon, Sep 09, 2013 at 02:20:35PM +0200, David D wrote:
> 
> > TrueCrypt can be assumed "ok" based on Greenwald using it.    If Snowden
> > knew of a hole in TrueCrypt then Greenwald would not be using it.  IMO.
> 
> I don't think this is a useful criteria.  After all, Greenwald probably
> uses Windows, right?

Schneier uses Windows, too. 

http://www.truecrypt.org/docs/supported-operating-systems

TrueCrypt currently supports the following operating systems:

Windows 7  (32-bit and 64-bit)
Windows Vista  (32-bit and 64-bit)
Windows XP  (32-bit and 64-bit)
Windows Server 2008 R2  (64-bit)
Windows Server 2008  (32-bit and 64-bit)
Windows Server 2003  (32-bit and 64-bit)
Windows 2000 SP4

Mac OS X 10.8 Mountain Lion  (32-bit and 64-bit)
Mac OS X 10.7 Lion  (32-bit and 64-bit)
Mac OS X 10.6 Snow Leopard  (32-bit)
Mac OS X 10.5 Leopard
Mac OS X 10.4 Tiger

Linux  (32-bit and 64-bit versions, kernel 2.6 or compatible)

Note: The following operating systems (among others) are not supported: Windows RT, Windows 2003 IA-64, Windows 2008 IA-64, Windows XP IA-64, and the Embedded/Tablet versions of Windows.
 
> NB: I'm not making any claim for or against TrueCrypt.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 836 bytes
Desc: Digital signature
URL: <http://lists.randombit.net/pipermail/cryptography/attachments/20130909/f6ebefd8/attachment.asc>


More information about the cryptography mailing list