<s>
TrueCrypt	O
is	O
a	O
discontinued	O
source-available	B-License
freeware	B-License
utility	B-Application
used	O
for	O
on-the-fly	O
encryption	O
(	O
OTFE	O
)	O
.	O
</s>
<s>
It	B-General_Concept
can	O
create	O
a	O
virtual	O
encrypted	O
disk	O
within	O
a	O
file	O
,	O
or	O
encrypt	O
a	O
partition	B-Application
or	O
the	O
whole	O
storage	B-General_Concept
device	I-General_Concept
(	O
pre-boot	O
authentication	O
)	O
.	O
</s>
<s>
Two	O
projects	O
forked	O
from	O
TrueCrypt	O
:	O
VeraCrypt	B-Operating_System
(	O
active	O
)	O
and	O
CipherShed	O
(	O
abandoned	O
)	O
.	O
</s>
<s>
TrueCrypt	O
was	O
initially	O
released	O
as	O
version	O
1.0	O
in	O
February	O
2004	O
,	O
based	O
on	O
E4M	B-Application
(	O
Encryption	O
for	O
the	O
Masses	O
)	O
.	O
</s>
<s>
According	O
to	O
the	O
TrueCrypt	O
Team	O
,	O
Hafner	O
claimed	O
in	O
the	O
email	O
that	O
the	O
acknowledged	O
author	O
of	O
E4M	B-Application
,	O
developer	O
Paul	O
Le	O
Roux	O
,	O
had	O
stolen	O
the	O
source	O
code	O
from	O
SecurStar	O
as	O
an	O
employee	O
.	O
</s>
<s>
It	B-General_Concept
was	O
further	O
stated	O
that	O
Le	O
Roux	O
illegally	O
distributed	O
E4M	B-Application
,	O
and	O
authored	O
an	O
illegal	O
license	O
permitting	O
anyone	O
to	O
base	O
derivative	O
work	O
on	O
the	O
code	O
and	O
distribute	O
it	B-General_Concept
freely	O
.	O
</s>
<s>
Hafner	O
alleges	O
all	O
versions	O
of	O
E4M	B-Application
always	O
belonged	O
only	O
to	O
SecurStar	O
,	O
and	O
Le	O
Roux	O
did	O
not	O
have	O
any	O
right	O
to	O
release	O
it	B-General_Concept
under	O
such	O
a	O
license	O
.	O
</s>
<s>
This	O
led	O
the	O
TrueCrypt	O
Team	O
to	O
immediately	O
stop	O
developing	O
and	O
distributing	O
TrueCrypt	O
,	O
which	O
they	O
announced	O
online	O
through	O
usenet	B-Application
.	O
</s>
<s>
To	O
continue	O
in	O
good	O
faith	O
,	O
he	O
said	O
,	O
the	O
team	O
would	O
need	O
to	O
verify	O
the	O
validity	O
of	O
the	O
E4M	B-Application
license	O
.	O
</s>
<s>
In	O
the	O
FAQ	O
section	O
of	O
its	O
website	O
,	O
SecurStar	O
maintains	O
its	O
claims	O
of	O
ownership	O
over	O
both	O
E4M	B-Application
and	O
Scramdisk	B-Application
,	O
another	O
free	B-Application
encryption	O
program	O
.	O
</s>
<s>
The	O
company	O
states	O
that	O
with	O
those	O
products	O
,	O
SecurStar	O
"	O
had	O
a	O
long	O
tradition	O
of	O
open	O
source	O
software	O
"	O
,	O
but	O
that	O
"	O
competitors	O
had	O
nothing	O
better	O
to	O
do	O
but	O
to	O
steal	O
our	O
source	O
code	O
"	O
,	O
causing	O
the	O
company	O
to	O
make	O
its	O
products	O
closed-source	B-Application
,	O
forcing	O
potential	O
customers	O
to	O
place	O
a	O
substantial	O
order	O
and	O
sign	O
a	O
non-disclosure	O
agreement	O
before	O
being	O
allowed	O
to	O
review	O
the	O
code	O
for	O
security	O
.	O
</s>
<s>
Le	O
Roux	O
himself	O
has	O
denied	O
developing	O
TrueCrypt	O
in	O
a	O
court	O
hearing	O
in	O
March	O
2016	O
,	O
in	O
which	O
he	O
also	O
confirmed	O
he	O
had	O
written	O
E4M	B-Application
.	O
</s>
<s>
The	O
software	B-License
license	I-License
was	O
also	O
changed	O
to	O
the	O
open	O
source	O
GNU	B-License
General	I-License
Public	I-License
License	I-License
(	O
GPL	B-License
)	O
.	O
</s>
<s>
However	O
,	O
given	O
the	O
wide	O
range	O
of	O
components	O
with	O
differing	O
licenses	O
making	O
up	O
the	O
software	O
,	O
and	O
the	O
contested	O
nature	O
of	O
the	O
legality	O
of	O
the	O
program	O
's	O
release	O
,	O
a	O
few	O
weeks	O
later	O
on	O
21	O
June	O
,	O
version	O
2.1	O
was	O
released	O
under	O
the	O
original	O
E4M	B-Application
license	O
to	O
avoid	O
potential	O
problems	O
relating	O
to	O
the	O
GPL	B-License
license	I-License
.	O
</s>
<s>
Version	O
2.1a	O
of	O
the	O
software	O
was	O
released	O
on	O
1	O
October	O
2004	O
on	O
truecrypt.sourceforge.net	O
sub-domain	O
.	O
</s>
<s>
By	O
May	O
2005	O
,	O
the	O
original	O
TrueCrypt	O
website	O
returned	O
and	O
truecrypt.sourceforge.net	O
redirected	O
visitors	O
to	O
truecrypt.org	O
.	O
</s>
<s>
On	O
28	O
May	O
2014	O
,	O
the	O
TrueCrypt	O
official	O
website	O
,	O
truecrypt.org,	O
began	O
redirecting	O
visitors	O
to	O
truecrypt.sourceforge.net	O
with	O
a	O
HTTP	B-Protocol
301	I-Protocol
"	I-Protocol
Moved	I-Protocol
Permanently	I-Protocol
"	I-Protocol
status	I-Protocol
,	O
which	O
warned	O
that	O
the	O
software	O
may	O
contain	O
unfixed	O
security	O
issues	O
,	O
and	O
that	O
development	O
of	O
TrueCrypt	O
was	O
ended	O
in	O
May	O
2014	O
,	O
following	O
Windows	O
XP	O
's	O
end	O
of	O
support	O
.	O
</s>
<s>
The	O
message	O
noted	O
that	O
more	O
recent	O
versions	O
of	O
Windows	O
have	O
built-in	O
support	O
for	O
disk	O
encryption	O
using	O
BitLocker	O
,	O
and	O
that	O
Linux	B-Application
and	O
OS	B-Application
X	I-Application
had	O
similar	O
built-in	O
solutions	O
,	O
which	O
the	O
message	O
states	O
renders	O
TrueCrypt	O
unnecessary	O
.	O
</s>
<s>
The	O
SourceForge	B-Application
project	O
page	O
for	O
the	O
software	O
at	O
sourceforge.net/truecrypt	O
was	O
updated	O
to	O
display	O
the	O
same	O
initial	O
message	O
,	O
and	O
the	O
status	O
was	O
changed	O
to	O
"	O
inactive.	O
"	O
</s>
<s>
TrueCrypt	O
supports	O
Windows	O
,	O
OS	B-Application
X	I-Application
and	O
Linux	B-Application
operating	I-Application
systems	I-Application
.	O
</s>
<s>
Both	O
32-bit	O
and	O
64-bit	B-Device
versions	O
of	O
these	O
operating	O
systems	O
are	O
supported	O
,	O
except	O
for	O
Windows	O
IA-64	B-General_Concept
(	O
not	O
supported	O
)	O
and	O
Mac	B-Application
OS	I-Application
X	O
10.6	O
Snow	O
Leopard	O
(	O
runs	O
as	O
a	O
32-bit	O
process	O
)	O
.	O
</s>
<s>
The	O
version	O
for	O
Windows	O
7	O
,	O
Windows	B-Application
Vista	I-Application
,	O
and	O
Windows	O
XP	O
can	O
encrypt	O
the	O
boot	B-Operating_System
partition	B-Application
or	O
entire	O
boot	B-Operating_System
drive	O
.	O
</s>
<s>
There	O
is	O
an	O
independent	O
,	O
compatible	O
implementation	O
,	O
tcplay	O
,	O
for	O
DragonFly	B-Application
BSD	I-Application
and	O
Linux	B-Application
.	O
</s>
<s>
The	O
Dm-crypt	O
module	O
included	O
in	O
default	O
Linux	B-Application
kernel	O
supports	O
a	O
TrueCrypt	O
target	O
called	O
"	O
tcw	O
"	O
since	O
Linux	B-Application
version	O
3.13	O
.	O
</s>
<s>
Individual	O
ciphers	B-Application
supported	O
by	O
TrueCrypt	O
are	O
AES	B-Algorithm
,	O
Serpent	B-Algorithm
,	O
and	O
Twofish	B-Algorithm
.	O
</s>
<s>
Additionally	O
,	O
five	O
different	O
combinations	O
of	O
cascaded	O
algorithms	O
are	O
available	O
:	O
AES-Twofish	O
,	O
AES-Twofish-Serpent	O
,	O
Serpent-AES	O
,	O
Serpent-Twofish-AES	O
and	O
Twofish-Serpent	O
.	O
</s>
<s>
The	O
cryptographic	B-Algorithm
hash	I-Algorithm
functions	I-Algorithm
available	O
for	O
use	O
in	O
TrueCrypt	O
are	O
RIPEMD-160	B-Algorithm
,	O
SHA-512	B-Algorithm
,	O
and	O
Whirlpool	B-Algorithm
.	O
</s>
<s>
TrueCrypt	O
currently	O
uses	O
the	O
XTS	O
mode	B-Algorithm
of	I-Algorithm
operation	I-Algorithm
.	O
</s>
<s>
Although	O
new	O
volumes	O
can	O
only	O
be	O
created	O
in	O
XTS	O
mode	O
,	O
TrueCrypt	O
is	O
backward	B-General_Concept
compatible	I-General_Concept
with	O
older	O
volumes	O
using	O
LRW	O
mode	O
and	O
CBC	O
mode	O
.	O
</s>
<s>
The	O
header	O
key	O
and	O
the	O
secondary	O
header	O
key	O
(	O
XTS	O
mode	O
)	O
are	O
generated	O
using	O
PBKDF2	O
with	O
a	O
512-bit	O
salt	O
and	O
1000	O
or	O
2000	O
iterations	O
,	O
depending	O
on	O
the	O
underlying	O
hash	B-Algorithm
function	I-Algorithm
used	O
.	O
</s>
<s>
In	O
a	O
paper	O
published	O
in	O
2008	O
and	O
focused	O
on	O
the	O
then	O
latest	O
version	O
(	O
v5.1a	O
)	O
and	O
its	O
plausible	O
deniability	O
,	O
a	O
team	O
of	O
security	O
researchers	O
led	O
by	O
Bruce	O
Schneier	O
states	O
that	O
Windows	B-Application
Vista	I-Application
,	O
Microsoft	B-Application
Word	I-Application
,	O
Google	B-Application
Desktop	I-Application
,	O
and	O
others	O
store	O
information	O
on	O
unencrypted	O
disks	O
,	O
which	O
might	O
compromise	O
TrueCrypt	O
's	O
plausible	O
deniability	O
.	O
</s>
<s>
TrueCrypt	O
volumes	O
have	O
sizes	O
that	O
are	O
multiples	O
of	O
512	O
due	O
to	O
the	O
block	O
size	O
of	O
the	O
cipher	B-Algorithm
mode	I-Algorithm
and	O
key	O
data	O
is	O
either	O
512	O
bytes	O
stored	O
separately	O
in	O
the	O
case	O
of	O
system	O
encryption	O
or	O
two	O
128	O
kB	O
headers	O
for	O
non-system	O
containers	O
.	O
</s>
<s>
Although	O
these	O
features	O
give	O
reason	O
to	O
suspect	O
a	O
file	O
to	O
be	O
a	O
TrueCrypt	O
volume	O
,	O
there	O
are	O
,	O
however	O
,	O
some	O
programs	O
which	O
exist	O
for	O
the	O
purpose	O
of	O
securely	O
erasing	O
files	O
by	O
employing	O
a	O
method	O
of	O
overwriting	O
file	O
contents	O
,	O
and	O
free	B-Application
disk	O
space	O
,	O
with	O
purely	O
random	O
data	O
(	O
i.e.	O
</s>
<s>
If	O
a	O
system	O
drive	O
,	O
or	O
a	O
partition	B-Application
on	O
it	B-General_Concept
,	O
has	O
been	O
encrypted	O
with	O
TrueCrypt	O
,	O
then	O
only	O
the	O
data	O
on	O
that	O
partition	B-Application
is	O
deniable	O
.	O
</s>
<s>
When	O
the	O
TrueCrypt	O
boot	B-Application
loader	I-Application
replaces	O
the	O
normal	O
boot	B-Application
loader	I-Application
,	O
an	O
offline	O
analysis	O
of	O
the	O
drive	O
can	O
positively	O
determine	O
that	O
a	O
TrueCrypt	O
boot	B-Application
loader	I-Application
is	O
present	O
and	O
so	O
lead	O
to	O
the	O
logical	O
inference	O
that	O
a	O
TrueCrypt	O
partition	B-Application
is	O
also	O
present	O
.	O
</s>
<s>
displaying	O
a	O
BIOS-like	O
message	O
to	O
misdirect	O
an	O
observer	O
such	O
as	O
,	O
"	O
Non-system	O
disk	O
"	O
or	O
"	O
disk	O
error	O
"	O
)	O
,	O
these	O
reduce	O
the	O
functionality	O
of	O
the	O
TrueCrypt	O
boot	B-Application
loader	I-Application
and	O
do	O
not	O
hide	O
the	O
content	O
of	O
the	O
TrueCrypt	O
boot	B-Application
loader	I-Application
from	O
offline	O
analysis	O
.	O
</s>
<s>
TrueCrypt	O
supports	O
parallelized	B-Operating_System
encryption	O
for	O
multi-core	B-Operating_System
systems	I-Operating_System
and	O
,	O
under	O
Microsoft	O
Windows	O
,	O
pipelined	B-General_Concept
read/write	O
operations	O
(	O
a	O
form	O
of	O
asynchronous	O
processing	O
)	O
to	O
reduce	O
the	O
performance	O
hit	O
of	O
encryption	O
and	O
decryption	O
.	O
</s>
<s>
On	O
newer	O
processors	O
supporting	O
the	O
AES-NI	O
instruction	O
set	O
,	O
TrueCrypt	O
supports	O
hardware-accelerated	B-Algorithm
AES	I-Algorithm
to	O
further	O
improve	O
performance	O
.	O
</s>
<s>
The	O
performance	O
impact	O
of	O
disk	O
encryption	O
is	O
especially	O
noticeable	O
on	O
operations	O
which	O
would	O
normally	O
use	O
direct	B-General_Concept
memory	I-General_Concept
access	I-General_Concept
(	O
DMA	O
)	O
,	O
as	O
all	O
data	O
must	O
pass	O
through	O
the	O
CPU	O
for	O
decryption	O
,	O
rather	O
than	O
being	O
copied	O
directly	O
from	O
disk	O
to	O
RAM	B-Architecture
.	O
</s>
<s>
In	O
a	O
test	O
carried	O
out	O
by	O
Tom	O
's	O
Hardware	B-Device
,	O
although	O
TrueCrypt	O
is	O
slower	O
compared	O
to	O
an	O
unencrypted	O
disk	O
,	O
the	O
overhead	O
of	O
real-time	O
encryption	O
was	O
found	O
to	O
be	O
similar	O
regardless	O
of	O
whether	O
mid-range	O
or	O
state-of-the-art	O
hardware	B-Device
is	O
in	O
use	O
,	O
and	O
this	O
impact	O
was	O
"	O
quite	O
acceptable	O
"	O
.	O
</s>
<s>
In	O
another	O
article	O
the	O
performance	O
cost	O
was	O
found	O
to	O
be	O
unnoticeable	O
when	O
working	O
with	O
"	O
popular	O
desktop	O
applications	O
in	O
a	O
reasonable	O
manner	O
"	O
,	O
but	O
it	B-General_Concept
was	O
noted	O
that	O
"	O
power	O
users	O
will	O
complain	O
"	O
.	O
</s>
<s>
Installing	O
third-party	O
software	O
which	O
uses	O
FlexNet	B-Application
Publisher	I-Application
or	O
SafeCast	O
(	O
which	O
are	O
used	O
for	O
preventing	O
software	O
piracy	O
on	O
products	O
by	O
Adobe	O
such	O
as	O
Adobe	B-Operating_System
Photoshop	I-Operating_System
)	O
can	O
damage	O
the	O
TrueCrypt	O
bootloader	B-Application
on	O
Windows	O
partitions/drives	O
encrypted	O
by	O
TrueCrypt	O
and	O
render	O
the	O
drive	O
unbootable	O
.	O
</s>
<s>
This	O
is	O
caused	O
by	O
the	O
inappropriate	O
design	O
of	O
FlexNet	B-Application
Publisher	I-Application
writing	O
to	O
the	O
first	O
drive	O
track	O
and	O
overwriting	O
whatever	O
non-Windows	O
bootloader	B-Application
exists	O
there	O
.	O
</s>
<s>
TrueCrypt	O
stores	O
its	O
keys	O
in	O
RAM	B-Architecture
;	O
on	O
an	O
ordinary	O
personal	O
computer	O
the	O
DRAM	O
will	O
maintain	O
its	O
contents	O
for	O
several	O
seconds	O
after	O
power	O
is	O
cut	O
(	O
or	O
longer	O
if	O
the	O
temperature	O
is	O
lowered	O
)	O
.	O
</s>
<s>
Even	O
if	O
there	O
is	O
some	O
degradation	O
in	O
the	O
memory	B-Architecture
contents	O
,	O
various	O
algorithms	O
can	O
intelligently	O
recover	O
the	O
keys	O
.	O
</s>
<s>
This	O
method	O
,	O
known	O
as	O
a	O
cold	B-Operating_System
boot	I-Operating_System
attack	O
(	O
which	O
would	O
apply	O
in	O
particular	O
to	O
a	O
notebook	O
computer	O
obtained	O
while	O
in	O
power-on	O
,	O
suspended	O
,	O
or	O
screen-locked	O
mode	O
)	O
,	O
has	O
been	O
successfully	O
used	O
to	O
attack	O
a	O
file	O
system	O
protected	O
by	O
TrueCrypt	O
.	O
</s>
<s>
TrueCrypt	O
documentation	O
states	O
that	O
TrueCrypt	O
is	O
unable	O
to	O
secure	O
data	O
on	O
a	O
computer	O
if	O
an	O
attacker	O
physically	O
accessed	O
it	B-General_Concept
and	O
TrueCrypt	O
is	O
used	O
on	O
the	O
compromised	O
computer	O
by	O
the	O
user	O
again	O
(	O
this	O
does	O
not	O
apply	O
to	O
a	O
common	O
case	O
of	O
a	O
stolen	O
,	O
lost	O
,	O
or	O
confiscated	O
computer	O
)	O
.	O
</s>
<s>
The	O
attacker	O
having	O
physical	O
access	O
to	O
a	O
computer	O
can	O
,	O
for	O
example	O
,	O
install	O
a	O
hardware/software	O
keylogger	O
,	O
a	O
bus-mastering	B-Architecture
device	O
capturing	O
memory	B-Architecture
,	O
or	O
install	O
any	O
other	O
malicious	O
hardware	B-Device
or	O
software	O
,	O
allowing	O
the	O
attacker	O
to	O
capture	O
unencrypted	O
data	O
(	O
including	O
encryption	O
keys	O
and	O
passwords	O
)	O
,	O
or	O
to	O
decrypt	O
encrypted	O
data	O
using	O
captured	O
passwords	O
or	O
encryption	O
keys	O
.	O
</s>
<s>
TrueCrypt	O
documentation	O
states	O
that	O
TrueCrypt	O
cannot	O
secure	O
data	O
on	O
a	O
computer	O
if	O
it	B-General_Concept
has	O
any	O
kind	O
of	O
malware	O
installed	O
.	O
</s>
<s>
The	O
"	O
Stoned	O
"	O
bootkit	O
,	O
an	O
MBR	B-Device
rootkit	O
presented	O
by	O
Austrian	O
software	O
developer	O
Peter	O
Kleissner	O
at	O
the	O
Black	O
Hat	O
Technical	O
Security	O
Conference	O
USA	O
2009	O
,	O
has	O
been	O
shown	O
capable	O
of	O
tampering	O
TrueCrypt	O
's	O
MBR	B-Device
,	O
effectively	O
bypassing	O
TrueCrypt	O
's	O
full	O
volume	O
encryption	O
.	O
</s>
<s>
Potentially	O
every	O
hard	B-Device
disk	I-Device
encryption	O
software	O
is	O
affected	O
by	O
this	O
kind	O
of	O
attack	O
if	O
the	O
encryption	O
software	O
does	O
not	O
rely	O
on	O
hardware-based	O
encryption	O
technologies	O
like	O
TPM	O
,	O
or	O
if	O
the	O
attack	O
is	O
made	O
with	O
administrative	O
privileges	O
while	O
the	O
encrypted	O
operating	O
system	O
is	O
running	O
.	O
</s>
<s>
Two	O
types	O
of	O
attack	O
scenarios	O
exist	O
in	O
which	O
it	B-General_Concept
is	O
possible	O
to	O
maliciously	O
take	O
advantage	O
of	O
this	O
bootkit	O
:	O
in	O
the	O
first	O
one	O
,	O
the	O
user	O
is	O
required	O
to	O
launch	B-General_Concept
the	O
bootkit	O
with	O
administrative	O
privileges	O
once	O
the	O
PC	O
has	O
already	O
booted	O
into	O
Windows	O
;	O
in	O
the	O
second	O
one	O
,	O
analogously	O
to	O
hardware	B-Device
keyloggers	O
,	O
a	O
malicious	O
person	O
needs	O
physical	O
access	O
to	O
the	O
user	O
's	O
TrueCrypt-encrypted	O
hard	B-Device
disk	I-Device
:	O
in	O
this	O
context	O
this	O
is	O
needed	O
to	O
modify	O
the	O
user	O
's	O
TrueCrypt	O
MBR	B-Device
with	O
that	O
of	O
the	O
Stoned	O
bootkit	O
and	O
then	O
place	O
the	O
hard	B-Device
disk	I-Device
back	O
on	O
the	O
unknowing	O
user	O
's	O
PC	O
,	O
so	O
that	O
when	O
the	O
user	O
boots	O
the	O
PC	O
and	O
types	O
his/her	O
TrueCrypt	O
password	O
on	O
boot	B-Operating_System
,	O
the	O
"	O
Stoned	O
"	O
bootkit	O
intercepts	O
it	B-General_Concept
thereafter	O
because	O
,	O
from	O
that	O
moment	O
on	O
,	O
the	O
Stoned	O
bootkit	O
is	O
loaded	O
before	O
TrueCrypt	O
's	O
MBR	B-Device
in	O
the	O
boot	B-Operating_System
sequence	I-Operating_System
.	O
</s>
<s>
avoid	O
running	O
non-trusted	O
executables	B-Application
with	O
administrative	O
privileges	O
.	O
</s>
<s>
The	O
second	O
one	O
can	O
be	O
successfully	O
neutralized	O
by	O
the	O
user	O
if	O
he/she	O
suspects	O
that	O
the	O
encrypted	O
hard	B-Device
disk	I-Device
might	O
have	O
been	O
physically	O
available	O
to	O
someone	O
he/she	O
does	O
not	O
trust	O
,	O
by	O
booting	B-Operating_System
the	O
encrypted	O
operating	O
system	O
with	O
TrueCrypt	O
's	O
Rescue	B-Application
Disk	I-Application
instead	O
of	O
booting	B-Operating_System
it	B-General_Concept
directly	O
from	O
the	O
hard	B-Device
disk	I-Device
.	O
</s>
<s>
With	O
the	O
rescue	B-Application
disk	I-Application
,	O
the	O
user	O
can	O
restore	O
TrueCrypt	O
's	O
MBR	B-Device
to	O
the	O
hard	B-Device
disk	I-Device
.	O
</s>
<s>
The	O
FAQ	O
section	O
of	O
the	O
TrueCrypt	O
website	O
states	O
that	O
the	O
Trusted	O
Platform	O
Module	O
(	O
TPM	O
)	O
cannot	O
be	O
relied	O
upon	O
for	O
security	O
,	O
because	O
if	O
the	O
attacker	O
has	O
physical	O
or	O
administrative	O
access	O
to	O
the	O
computer	O
and	O
you	O
use	O
it	B-General_Concept
afterwards	O
,	O
the	O
computer	O
could	O
have	O
been	O
modified	O
by	O
the	O
attacker	O
e.g.	O
</s>
<s>
a	O
malicious	O
component	O
—	O
such	O
as	O
a	O
hardware	B-Device
keystroke	O
logger	O
—	O
could	O
have	O
been	O
used	O
to	O
capture	O
the	O
password	O
or	O
other	O
sensitive	O
information	O
.	O
</s>
<s>
Matthew	O
D	O
.	O
Green	O
,	O
one	O
of	O
the	O
auditors	O
,	O
added	O
"	O
I	O
think	O
it	B-General_Concept
's	O
good	O
that	O
we	O
did	O
n't	O
find	O
anything	O
super	O
critical.	O
"	O
</s>
<s>
According	O
to	O
Barnhart	O
,	O
the	O
main	O
points	O
of	O
the	O
email	O
messages	O
were	O
that	O
the	O
TrueCrypt	O
Foundation	O
was	O
"	O
happy	O
with	O
the	O
audit	O
,	O
it	B-General_Concept
did	O
n't	O
spark	O
anything	O
"	O
,	O
and	O
that	O
the	O
reason	O
for	O
the	O
announcement	O
was	O
that	O
"	O
there	O
is	O
no	O
longer	O
interest	O
[	O
in	O
maintaining	O
the	O
project ]	O
.	O
"	O
</s>
<s>
In	O
January	O
2016	O
,	O
the	O
vulnerability	O
was	O
fixed	O
in	O
VeraCrypt	B-Operating_System
,	O
but	O
it	B-General_Concept
remains	O
unpatched	O
in	O
TrueCrypt	O
's	O
unmaintained	O
installers	O
.	O
</s>
<s>
In	O
July	O
2008	O
,	O
several	O
TrueCrypt-secured	O
hard	B-Device
drives	I-Device
were	O
seized	O
from	O
Brazilian	O
banker	O
Daniel	O
Dantas	O
,	O
who	O
was	O
suspected	O
of	O
financial	O
crimes	O
.	O
</s>
<s>
In	O
2012	O
the	O
United	O
States	O
11th	O
Circuit	O
Court	O
of	O
Appeals	O
ruled	O
that	O
a	O
John	O
Doe	O
TrueCrypt	O
user	O
could	O
not	O
be	O
compelled	O
to	O
decrypt	O
several	O
of	O
his	O
hard	B-Device
drives	I-Device
.	O
</s>
<s>
He	O
was	O
carrying	O
with	O
him	O
an	O
external	O
hard	B-Device
drive	I-Device
said	O
to	O
be	O
containing	O
sensitive	O
documents	O
pertaining	O
to	O
the	O
2013	O
global	O
surveillance	O
disclosures	O
sparked	O
by	O
Edward	O
Snowden	O
.	O
</s>
<s>
Detective	O
Superintendent	O
Caroline	O
Goode	O
stated	O
the	O
hard	B-Device
drive	I-Device
contained	O
around	O
60	O
gigabytes	O
of	O
data	O
,	O
"	O
of	O
which	O
only	O
20	O
have	O
been	O
accessed	O
to	O
date.	O
"	O
</s>
<s>
She	O
further	O
stated	O
the	O
process	O
to	O
decode	O
the	O
material	O
was	O
complex	O
and	O
"	O
so	O
far	O
only	O
75	O
documents	O
have	O
been	O
reconstructed	B-Application
since	O
the	O
property	O
was	O
initially	O
received.	O
"	O
</s>
<s>
Guardian	O
contributor	O
Naomi	O
Colvin	O
concluded	O
the	O
statements	O
were	O
misleading	O
,	O
stating	O
that	O
it	B-General_Concept
was	O
possible	O
Goode	O
was	O
not	O
even	O
referring	O
to	O
any	O
actual	O
encrypted	O
material	O
,	O
but	O
rather	O
deleted	O
files	O
reconstructed	B-Application
from	O
unencrypted	O
,	O
unallocated	O
space	O
on	O
the	O
hard	B-Device
drive	I-Device
,	O
or	O
even	O
plaintext	O
documents	O
from	O
Miranda	O
's	O
personal	O
effects	O
.	O
</s>
<s>
In	O
February	O
2014	O
,	O
an	O
Arizona	O
Department	O
of	O
Real	O
Estate	O
IT	B-General_Concept
department	O
employee	O
,	O
James	O
DeSilva	O
,	O
was	O
arrested	O
on	O
charges	O
of	O
sexual	O
exploitation	O
of	O
a	O
minor	O
through	O
the	O
sharing	O
of	O
explicit	O
images	O
over	O
the	O
Internet	O
.	O
</s>
<s>
On	O
10	O
May	O
2016	O
a	O
District	O
Judge	O
(	O
Magistrate	O
's	O
Court	O
)	O
rejected	O
a	O
request	O
by	O
the	O
NCA	O
that	O
Love	O
be	O
forced	O
to	O
turn	O
over	O
his	O
encryption	O
keys	O
or	O
passwords	O
to	O
TrueCrypt	O
files	O
on	O
an	O
SD	O
card	O
and	O
hard	B-Device
drives	I-Device
that	O
were	O
among	O
the	O
confiscated	O
property	O
.	O
</s>
<s>
TrueCrypt	O
was	O
released	O
as	O
source-available	B-License
,	O
under	O
the	O
"	O
TrueCrypt	O
License	O
,	O
"	O
which	O
is	O
unique	O
to	O
the	O
TrueCrypt	O
software	O
.	O
</s>
<s>
It	B-General_Concept
is	O
not	O
part	O
of	O
the	O
panoply	O
of	O
widely	O
used	O
open	B-Application
source	I-Application
licenses	I-Application
.	O
</s>
<s>
The	B-Operating_System
Free	I-Operating_System
Software	I-Operating_System
Foundation	I-Operating_System
(	O
FSF	O
)	O
states	O
that	O
it	B-General_Concept
is	O
not	O
a	O
free	B-License
software	I-License
license	I-License
.	O
</s>
<s>
According	O
to	O
current	O
OSI	O
president	O
Simon	B-Language
Phipps	I-Language
:	O
</s>
<s>
it	B-General_Concept
...	O
is	O
not	O
at	O
all	O
appropriate	O
for	O
 [ TrueCrypt ] 	O
to	O
describe	O
itself	O
as	O
"	O
open	O
source.	O
"	O
</s>
<s>
As	O
a	O
result	O
of	O
its	O
questionable	O
status	O
with	O
regard	O
to	O
copyright	O
restrictions	O
and	O
other	O
potential	O
legal	O
issues	O
,	O
major	O
Linux	B-Application
distributions	I-Application
do	O
not	O
consider	O
the	O
TrueCrypt	O
License	O
free	B-Application
:	O
TrueCrypt	O
is	O
not	O
included	O
with	O
Debian	O
,	O
Ubuntu	O
,	O
Fedora	O
,	O
or	O
openSUSE	O
.	O
</s>
<s>
"	O
They	O
set	O
the	O
whole	O
thing	O
on	O
fire	O
,	O
and	O
now	O
maybe	O
nobody	O
is	O
going	O
to	O
trust	O
it	B-General_Concept
because	O
they	O
'll	O
think	O
there	O
's	O
some	O
big	O
evil	O
vulnerability	O
in	O
the	O
code.	O
"	O
</s>
<s>
Permission	O
was	O
denied	O
,	O
which	O
led	O
to	O
the	O
two	O
known	O
forks	O
being	O
named	O
VeraCrypt	B-Operating_System
and	O
CipherShed	O
as	O
well	O
as	O
a	O
re-implementation	O
named	O
tc-play	O
rather	O
than	O
TrueCrypt	O
.	O
</s>
