<s>
TrueCrypt	B-Application
is	O
a	O
discontinued	O
source-available	B-License
freeware	B-License
utility	B-Application
used	O
for	O
on-the-fly	O
encryption	O
(	O
OTFE	O
)	O
.	O
</s>
<s>
It	B-General_Concept
can	O
create	O
a	O
virtual	O
encrypted	O
disk	O
within	O
a	O
file	O
,	O
or	O
encrypt	O
a	O
partition	B-Application
or	O
the	O
whole	O
storage	B-General_Concept
device	I-General_Concept
(	O
pre-boot	O
authentication	O
)	O
.	O
</s>
<s>
On	O
28	O
May	O
2014	O
,	O
the	O
TrueCrypt	B-Application
website	O
announced	O
that	O
the	O
project	O
was	O
no	O
longer	O
maintained	O
and	O
recommended	O
users	O
find	O
alternative	O
solutions	O
.	O
</s>
<s>
Though	O
development	O
of	O
TrueCrypt	B-Application
has	O
ceased	O
,	O
an	O
independent	O
audit	O
of	O
TrueCrypt	B-Application
(	O
published	O
in	O
March	O
2015	O
)	O
has	O
concluded	O
that	O
no	O
significant	O
flaws	O
are	O
present	O
.	O
</s>
<s>
Two	O
projects	O
forked	O
from	O
TrueCrypt	B-Application
:	O
VeraCrypt	B-Operating_System
(	O
active	O
)	O
and	O
CipherShed	O
(	O
abandoned	O
)	O
.	O
</s>
<s>
TrueCrypt	B-Application
was	O
initially	O
released	O
as	O
version	O
1.0	O
in	O
February	O
2004	O
,	O
based	O
on	O
E4M	B-Application
(	O
Encryption	O
for	O
the	O
Masses	O
)	O
.	O
</s>
<s>
Original	O
release	O
of	O
TrueCrypt	B-Application
was	O
made	O
by	O
anonymous	O
developers	O
called	O
"	O
the	O
TrueCrypt	B-Application
Team	O
"	O
.	O
</s>
<s>
Shortly	O
after	O
version	O
1.0	O
was	O
released	O
in	O
2004	O
,	O
the	O
TrueCrypt	B-Application
Team	O
reported	O
receiving	O
email	O
from	O
Wilfried	O
Hafner	O
,	O
manager	O
of	O
SecurStar	O
,	O
a	O
computer	O
security	O
company	O
.	O
</s>
<s>
According	O
to	O
the	O
TrueCrypt	B-Application
Team	O
,	O
Hafner	O
claimed	O
in	O
the	O
email	O
that	O
the	O
acknowledged	O
author	O
of	O
E4M	B-Application
,	O
developer	O
Paul	O
Le	O
Roux	O
,	O
had	O
stolen	O
the	O
source	O
code	O
from	O
SecurStar	O
as	O
an	O
employee	O
.	O
</s>
<s>
It	B-General_Concept
was	O
further	O
stated	O
that	O
Le	O
Roux	O
illegally	O
distributed	O
E4M	B-Application
,	O
and	O
authored	O
an	O
illegal	O
license	O
permitting	O
anyone	O
to	O
base	O
derivative	O
work	O
on	O
the	O
code	O
and	O
distribute	O
it	B-General_Concept
freely	O
.	O
</s>
<s>
Hafner	O
alleges	O
all	O
versions	O
of	O
E4M	B-Application
always	O
belonged	O
only	O
to	O
SecurStar	O
,	O
and	O
Le	O
Roux	O
did	O
not	O
have	O
any	O
right	O
to	O
release	O
it	B-General_Concept
under	O
such	O
a	O
license	O
.	O
</s>
<s>
This	O
led	O
the	O
TrueCrypt	B-Application
Team	O
to	O
immediately	O
stop	O
developing	O
and	O
distributing	O
TrueCrypt	B-Application
,	O
which	O
they	O
announced	O
online	O
through	O
usenet	B-Application
.	O
</s>
<s>
TrueCrypt	B-Application
Team	O
member	O
David	O
Tesařík	O
stated	O
that	O
Le	O
Roux	O
informed	O
the	O
team	O
that	O
there	O
was	O
a	O
legal	O
dispute	O
between	O
himself	O
and	O
SecurStar	O
,	O
and	O
that	O
he	O
received	O
legal	O
advisement	O
not	O
to	O
comment	O
on	O
any	O
issues	O
of	O
the	O
case	O
.	O
</s>
<s>
Tesařík	O
concluded	O
that	O
should	O
the	O
TrueCrypt	B-Application
Team	O
continue	O
distributing	O
TrueCrypt	B-Application
,	O
Le	O
Roux	O
may	O
ultimately	O
be	O
held	O
liable	O
and	O
be	O
forced	O
to	O
pay	O
consequent	O
damages	O
to	O
SecurStar	O
.	O
</s>
<s>
To	O
continue	O
in	O
good	O
faith	O
,	O
he	O
said	O
,	O
the	O
team	O
would	O
need	O
to	O
verify	O
the	O
validity	O
of	O
the	O
E4M	B-Application
license	O
.	O
</s>
<s>
However	O
,	O
because	O
of	O
Le	O
Roux	O
's	O
need	O
to	O
remain	O
silent	O
on	O
the	O
matter	O
,	O
he	O
was	O
unable	O
to	O
confirm	O
or	O
deny	O
its	O
legitimacy	O
,	O
keeping	O
TrueCrypt	B-Application
development	O
in	O
limbo	O
.	O
</s>
<s>
Thereafter	O
,	O
would-be	O
visitors	O
reported	O
trouble	O
accessing	O
the	O
TrueCrypt	B-Application
website	O
,	O
and	O
third-party	O
mirrors	O
appeared	O
online	O
making	O
the	O
source	O
code	O
and	O
installer	O
continually	O
available	O
,	O
outside	O
of	O
official	O
sanction	O
by	O
the	O
TrueCrypt	B-Application
Team	O
.	O
</s>
<s>
In	O
the	O
FAQ	O
section	O
of	O
its	O
website	O
,	O
SecurStar	O
maintains	O
its	O
claims	O
of	O
ownership	O
over	O
both	O
E4M	B-Application
and	O
Scramdisk	B-Application
,	O
another	O
free	B-Application
encryption	O
program	O
.	O
</s>
<s>
The	O
company	O
states	O
that	O
with	O
those	O
products	O
,	O
SecurStar	O
"	O
had	O
a	O
long	O
tradition	O
of	O
open	O
source	O
software	O
"	O
,	O
but	O
that	O
"	O
competitors	O
had	O
nothing	O
better	O
to	O
do	O
but	O
to	O
steal	O
our	O
source	O
code	O
"	O
,	O
causing	O
the	O
company	O
to	O
make	O
its	O
products	O
closed-source	B-Application
,	O
forcing	O
potential	O
customers	O
to	O
place	O
a	O
substantial	O
order	O
and	O
sign	O
a	O
non-disclosure	O
agreement	O
before	O
being	O
allowed	O
to	O
review	O
the	O
code	O
for	O
security	O
.	O
</s>
<s>
Le	O
Roux	O
himself	O
has	O
denied	O
developing	O
TrueCrypt	B-Application
in	O
a	O
court	O
hearing	O
in	O
March	O
2016	O
,	O
in	O
which	O
he	O
also	O
confirmed	O
he	O
had	O
written	O
E4M	B-Application
.	O
</s>
<s>
Months	O
later	O
on	O
7	O
June	O
2004	O
,	O
TrueCrypt	B-Application
2.0	O
was	O
released	O
.	O
</s>
<s>
The	O
new	O
version	O
contained	O
a	O
different	O
digital	O
signature	O
from	O
that	O
of	O
the	O
original	O
TrueCrypt	B-Application
Team	O
,	O
with	O
the	O
developers	O
now	O
being	O
referred	O
to	O
as	O
"	O
the	O
TrueCrypt	B-Application
Foundation.	O
"	O
</s>
<s>
The	O
software	B-License
license	I-License
was	O
also	O
changed	O
to	O
the	O
open	O
source	O
GNU	B-License
General	I-License
Public	I-License
License	I-License
(	O
GPL	B-License
)	O
.	O
</s>
<s>
However	O
,	O
given	O
the	O
wide	O
range	O
of	O
components	O
with	O
differing	O
licenses	O
making	O
up	O
the	O
software	O
,	O
and	O
the	O
contested	O
nature	O
of	O
the	O
legality	O
of	O
the	O
program	O
's	O
release	O
,	O
a	O
few	O
weeks	O
later	O
on	O
21	O
June	O
,	O
version	O
2.1	O
was	O
released	O
under	O
the	O
original	O
E4M	B-Application
license	O
to	O
avoid	O
potential	O
problems	O
relating	O
to	O
the	O
GPL	B-License
license	I-License
.	O
</s>
<s>
Version	O
2.1a	O
of	O
the	O
software	O
was	O
released	O
on	O
1	O
October	O
2004	O
on	O
truecrypt.sourceforge.net	O
sub-domain	O
.	O
</s>
<s>
By	O
May	O
2005	O
,	O
the	O
original	O
TrueCrypt	B-Application
website	O
returned	O
and	O
truecrypt.sourceforge.net	O
redirected	O
visitors	O
to	O
truecrypt.org	O
.	O
</s>
<s>
On	O
28	O
May	O
2014	O
,	O
the	O
TrueCrypt	B-Application
official	O
website	O
,	O
truecrypt.org,	O
began	O
redirecting	O
visitors	O
to	O
truecrypt.sourceforge.net	O
with	O
a	O
HTTP	B-Protocol
301	I-Protocol
"	I-Protocol
Moved	I-Protocol
Permanently	I-Protocol
"	I-Protocol
status	I-Protocol
,	O
which	O
warned	O
that	O
the	O
software	O
may	O
contain	O
unfixed	O
security	O
issues	O
,	O
and	O
that	O
development	O
of	O
TrueCrypt	B-Application
was	O
ended	O
in	O
May	O
2014	O
,	O
following	O
Windows	O
XP	O
's	O
end	O
of	O
support	O
.	O
</s>
<s>
The	O
message	O
noted	O
that	O
more	O
recent	O
versions	O
of	O
Windows	O
have	O
built-in	O
support	O
for	O
disk	O
encryption	O
using	O
BitLocker	O
,	O
and	O
that	O
Linux	B-Application
and	O
OS	B-Application
X	I-Application
had	O
similar	O
built-in	O
solutions	O
,	O
which	O
the	O
message	O
states	O
renders	O
TrueCrypt	B-Application
unnecessary	O
.	O
</s>
<s>
The	O
page	O
recommends	O
any	O
data	O
encrypted	O
by	O
TrueCrypt	B-Application
be	O
migrated	O
to	O
other	O
encryption	O
setups	O
and	O
offered	O
instructions	O
on	O
moving	O
to	O
BitLocker	O
.	O
</s>
<s>
The	O
SourceForge	B-Application
project	O
page	O
for	O
the	O
software	O
at	O
sourceforge.net/truecrypt	O
was	O
updated	O
to	O
display	O
the	O
same	O
initial	O
message	O
,	O
and	O
the	O
status	O
was	O
changed	O
to	O
"	O
inactive.	O
"	O
</s>
<s>
Shortly	O
after	O
the	O
end	O
of	O
life	O
announcement	O
of	O
TrueCrypt	B-Application
,	O
Gibson	O
Research	O
Corporation	O
posted	O
an	O
announcement	O
titled	O
"	O
Yes	O
...	O
TrueCrypt	B-Application
is	O
still	O
safe	O
to	O
use	O
"	O
and	O
a	O
Final	O
Release	O
Repository	O
to	O
host	O
the	O
last	O
official	O
non-crippled	O
version	O
7.1a	O
of	O
TrueCrypt	B-Application
.	O
</s>
<s>
Truecrypt.org	O
has	O
been	O
excluded	O
from	O
the	O
Internet	O
Archive	O
Wayback	O
Machine	O
.	O
</s>
<s>
TrueCrypt	B-Application
supports	O
Windows	O
,	O
OS	B-Application
X	I-Application
and	O
Linux	B-Application
operating	I-Application
systems	I-Application
.	O
</s>
<s>
Both	O
32-bit	O
and	O
64-bit	B-Device
versions	O
of	O
these	O
operating	O
systems	O
are	O
supported	O
,	O
except	O
for	O
Windows	O
IA-64	B-General_Concept
(	O
not	O
supported	O
)	O
and	O
Mac	B-Application
OS	I-Application
X	O
10.6	O
Snow	O
Leopard	O
(	O
runs	O
as	O
a	O
32-bit	O
process	O
)	O
.	O
</s>
<s>
The	O
version	O
for	O
Windows	O
7	O
,	O
Windows	B-Application
Vista	I-Application
,	O
and	O
Windows	O
XP	O
can	O
encrypt	O
the	O
boot	B-Operating_System
partition	B-Application
or	O
entire	O
boot	B-Operating_System
drive	O
.	O
</s>
<s>
There	O
is	O
an	O
independent	O
,	O
compatible	O
implementation	O
,	O
tcplay	O
,	O
for	O
DragonFly	B-Application
BSD	I-Application
and	O
Linux	B-Application
.	O
</s>
<s>
The	O
Dm-crypt	O
module	O
included	O
in	O
default	O
Linux	B-Application
kernel	O
supports	O
a	O
TrueCrypt	B-Application
target	O
called	O
"	O
tcw	O
"	O
since	O
Linux	B-Application
version	O
3.13	O
.	O
</s>
<s>
Individual	O
ciphers	B-Application
supported	O
by	O
TrueCrypt	B-Application
are	O
AES	B-Algorithm
,	O
Serpent	B-Algorithm
,	O
and	O
Twofish	B-Algorithm
.	O
</s>
<s>
Additionally	O
,	O
five	O
different	O
combinations	O
of	O
cascaded	O
algorithms	O
are	O
available	O
:	O
AES-Twofish	O
,	O
AES-Twofish-Serpent	O
,	O
Serpent-AES	O
,	O
Serpent-Twofish-AES	O
and	O
Twofish-Serpent	O
.	O
</s>
<s>
The	O
cryptographic	B-Algorithm
hash	I-Algorithm
functions	I-Algorithm
available	O
for	O
use	O
in	O
TrueCrypt	B-Application
are	O
RIPEMD-160	B-Algorithm
,	O
SHA-512	B-Algorithm
,	O
and	O
Whirlpool	B-Algorithm
.	O
</s>
<s>
TrueCrypt	B-Application
currently	O
uses	O
the	O
XTS	O
mode	B-Algorithm
of	I-Algorithm
operation	I-Algorithm
.	O
</s>
<s>
Prior	O
to	O
this	O
,	O
TrueCrypt	B-Application
used	O
LRW	O
mode	O
in	O
versions	O
4.1	O
through	O
4.3a	O
,	O
and	O
CBC	O
mode	O
in	O
versions	O
4.0	O
and	O
earlier	O
.	O
</s>
<s>
Although	O
new	O
volumes	O
can	O
only	O
be	O
created	O
in	O
XTS	O
mode	O
,	O
TrueCrypt	B-Application
is	O
backward	B-General_Concept
compatible	I-General_Concept
with	O
older	O
volumes	O
using	O
LRW	O
mode	O
and	O
CBC	O
mode	O
.	O
</s>
<s>
The	O
header	O
key	O
and	O
the	O
secondary	O
header	O
key	O
(	O
XTS	O
mode	O
)	O
are	O
generated	O
using	O
PBKDF2	O
with	O
a	O
512-bit	O
salt	O
and	O
1000	O
or	O
2000	O
iterations	O
,	O
depending	O
on	O
the	O
underlying	O
hash	B-Algorithm
function	I-Algorithm
used	O
.	O
</s>
<s>
TrueCrypt	B-Application
supports	O
a	O
concept	O
called	O
plausible	O
deniability	O
,	O
by	O
allowing	O
a	O
single	O
"	O
hidden	O
volume	O
"	O
to	O
be	O
created	O
within	O
another	O
volume	O
.	O
</s>
<s>
In	O
addition	O
,	O
the	O
Windows	O
versions	O
of	O
TrueCrypt	B-Application
have	O
the	O
ability	O
to	O
create	O
and	O
run	O
a	O
hidden	O
encrypted	O
operating	O
system	O
whose	O
existence	O
may	O
be	O
denied	O
.	O
</s>
<s>
The	O
TrueCrypt	B-Application
documentation	O
lists	O
many	O
ways	O
in	O
which	O
TrueCrypt	B-Application
's	O
hidden	O
volume	O
deniability	O
features	O
may	O
be	O
compromised	O
(	O
e.g.	O
</s>
<s>
In	O
a	O
paper	O
published	O
in	O
2008	O
and	O
focused	O
on	O
the	O
then	O
latest	O
version	O
(	O
v5.1a	O
)	O
and	O
its	O
plausible	O
deniability	O
,	O
a	O
team	O
of	O
security	O
researchers	O
led	O
by	O
Bruce	O
Schneier	O
states	O
that	O
Windows	B-Application
Vista	I-Application
,	O
Microsoft	B-Application
Word	I-Application
,	O
Google	B-Application
Desktop	I-Application
,	O
and	O
others	O
store	O
information	O
on	O
unencrypted	O
disks	O
,	O
which	O
might	O
compromise	O
TrueCrypt	B-Application
's	O
plausible	O
deniability	O
.	O
</s>
<s>
The	O
study	O
suggested	O
the	O
addition	O
of	O
a	O
hidden	O
operating	O
system	O
functionality	O
;	O
this	O
feature	O
was	O
added	O
in	O
TrueCrypt	B-Application
6.0	O
.	O
</s>
<s>
When	O
a	O
hidden	O
operating	O
system	O
is	O
running	O
,	O
TrueCrypt	B-Application
also	O
makes	O
local	O
unencrypted	O
filesystems	O
and	O
non-hidden	O
TrueCrypt	B-Application
volumes	O
read-only	O
to	O
prevent	O
data	O
leaks	O
.	O
</s>
<s>
The	O
security	O
of	O
TrueCrypt	B-Application
's	O
implementation	O
of	O
this	O
feature	O
was	O
not	O
evaluated	O
because	O
the	O
first	O
version	O
of	O
TrueCrypt	B-Application
with	O
this	O
option	O
had	O
only	O
recently	O
been	O
released	O
.	O
</s>
<s>
There	O
was	O
a	O
functional	O
evaluation	O
of	O
the	O
deniability	O
of	O
hidden	O
volumes	O
in	O
an	O
earlier	O
version	O
of	O
TrueCrypt	B-Application
by	O
Schneier	O
et	O
al	O
.	O
</s>
<s>
When	O
analyzed	O
,	O
TrueCrypt	B-Application
volumes	O
appear	O
to	O
have	O
no	O
header	O
and	O
contain	O
random	O
data	O
.	O
</s>
<s>
TrueCrypt	B-Application
volumes	O
have	O
sizes	O
that	O
are	O
multiples	O
of	O
512	O
due	O
to	O
the	O
block	O
size	O
of	O
the	O
cipher	B-Algorithm
mode	I-Algorithm
and	O
key	O
data	O
is	O
either	O
512	O
bytes	O
stored	O
separately	O
in	O
the	O
case	O
of	O
system	O
encryption	O
or	O
two	O
128	O
kB	O
headers	O
for	O
non-system	O
containers	O
.	O
</s>
<s>
Forensics	O
tools	O
may	O
use	O
these	O
properties	O
of	O
file	O
size	O
,	O
apparent	O
lack	O
of	O
a	O
header	O
,	O
and	O
randomness	O
tests	O
to	O
attempt	O
to	O
identify	O
TrueCrypt	B-Application
volumes	O
.	O
</s>
<s>
Although	O
these	O
features	O
give	O
reason	O
to	O
suspect	O
a	O
file	O
to	O
be	O
a	O
TrueCrypt	B-Application
volume	O
,	O
there	O
are	O
,	O
however	O
,	O
some	O
programs	O
which	O
exist	O
for	O
the	O
purpose	O
of	O
securely	O
erasing	O
files	O
by	O
employing	O
a	O
method	O
of	O
overwriting	O
file	O
contents	O
,	O
and	O
free	B-Application
disk	O
space	O
,	O
with	O
purely	O
random	O
data	O
(	O
i.e.	O
</s>
<s>
"	O
shred	O
"	O
&	O
"	O
scrub	O
"	O
)	O
,	O
thereby	O
creating	O
reasonable	O
doubt	O
to	O
counter	O
pointed	O
accusations	O
declaring	O
a	O
file	O
,	O
made	O
of	O
statistically	O
random	O
data	O
,	O
to	O
be	O
a	O
TrueCrypt	B-Application
file	O
.	O
</s>
<s>
If	O
a	O
system	O
drive	O
,	O
or	O
a	O
partition	B-Application
on	O
it	B-General_Concept
,	O
has	O
been	O
encrypted	O
with	O
TrueCrypt	B-Application
,	O
then	O
only	O
the	O
data	O
on	O
that	O
partition	B-Application
is	O
deniable	O
.	O
</s>
<s>
When	O
the	O
TrueCrypt	B-Application
boot	B-Application
loader	I-Application
replaces	O
the	O
normal	O
boot	B-Application
loader	I-Application
,	O
an	O
offline	O
analysis	O
of	O
the	O
drive	O
can	O
positively	O
determine	O
that	O
a	O
TrueCrypt	B-Application
boot	B-Application
loader	I-Application
is	O
present	O
and	O
so	O
lead	O
to	O
the	O
logical	O
inference	O
that	O
a	O
TrueCrypt	B-Application
partition	B-Application
is	O
also	O
present	O
.	O
</s>
<s>
displaying	O
a	O
BIOS-like	O
message	O
to	O
misdirect	O
an	O
observer	O
such	O
as	O
,	O
"	O
Non-system	O
disk	O
"	O
or	O
"	O
disk	O
error	O
"	O
)	O
,	O
these	O
reduce	O
the	O
functionality	O
of	O
the	O
TrueCrypt	B-Application
boot	B-Application
loader	I-Application
and	O
do	O
not	O
hide	O
the	O
content	O
of	O
the	O
TrueCrypt	B-Application
boot	B-Application
loader	I-Application
from	O
offline	O
analysis	O
.	O
</s>
<s>
TrueCrypt	B-Application
supports	O
parallelized	B-Operating_System
encryption	O
for	O
multi-core	B-Operating_System
systems	I-Operating_System
and	O
,	O
under	O
Microsoft	O
Windows	O
,	O
pipelined	B-General_Concept
read/write	O
operations	O
(	O
a	O
form	O
of	O
asynchronous	O
processing	O
)	O
to	O
reduce	O
the	O
performance	O
hit	O
of	O
encryption	O
and	O
decryption	O
.	O
</s>
<s>
On	O
newer	O
processors	O
supporting	O
the	O
AES-NI	O
instruction	O
set	O
,	O
TrueCrypt	B-Application
supports	O
hardware-accelerated	B-Algorithm
AES	I-Algorithm
to	O
further	O
improve	O
performance	O
.	O
</s>
<s>
The	O
performance	O
impact	O
of	O
disk	O
encryption	O
is	O
especially	O
noticeable	O
on	O
operations	O
which	O
would	O
normally	O
use	O
direct	B-General_Concept
memory	I-General_Concept
access	I-General_Concept
(	O
DMA	O
)	O
,	O
as	O
all	O
data	O
must	O
pass	O
through	O
the	O
CPU	O
for	O
decryption	O
,	O
rather	O
than	O
being	O
copied	O
directly	O
from	O
disk	O
to	O
RAM	B-Architecture
.	O
</s>
<s>
In	O
a	O
test	O
carried	O
out	O
by	O
Tom	O
's	O
Hardware	B-Device
,	O
although	O
TrueCrypt	B-Application
is	O
slower	O
compared	O
to	O
an	O
unencrypted	O
disk	O
,	O
the	O
overhead	O
of	O
real-time	O
encryption	O
was	O
found	O
to	O
be	O
similar	O
regardless	O
of	O
whether	O
mid-range	O
or	O
state-of-the-art	O
hardware	B-Device
is	O
in	O
use	O
,	O
and	O
this	O
impact	O
was	O
"	O
quite	O
acceptable	O
"	O
.	O
</s>
<s>
In	O
another	O
article	O
the	O
performance	O
cost	O
was	O
found	O
to	O
be	O
unnoticeable	O
when	O
working	O
with	O
"	O
popular	O
desktop	O
applications	O
in	O
a	O
reasonable	O
manner	O
"	O
,	O
but	O
it	B-General_Concept
was	O
noted	O
that	O
"	O
power	O
users	O
will	O
complain	O
"	O
.	O
</s>
<s>
Installing	O
third-party	O
software	O
which	O
uses	O
FlexNet	B-Application
Publisher	I-Application
or	O
SafeCast	O
(	O
which	O
are	O
used	O
for	O
preventing	O
software	O
piracy	O
on	O
products	O
by	O
Adobe	O
such	O
as	O
Adobe	B-Operating_System
Photoshop	I-Operating_System
)	O
can	O
damage	O
the	O
TrueCrypt	B-Application
bootloader	B-Application
on	O
Windows	O
partitions/drives	O
encrypted	O
by	O
TrueCrypt	B-Application
and	O
render	O
the	O
drive	O
unbootable	O
.	O
</s>
<s>
This	O
is	O
caused	O
by	O
the	O
inappropriate	O
design	O
of	O
FlexNet	B-Application
Publisher	I-Application
writing	O
to	O
the	O
first	O
drive	O
track	O
and	O
overwriting	O
whatever	O
non-Windows	O
bootloader	B-Application
exists	O
there	O
.	O
</s>
<s>
TrueCrypt	B-Application
is	O
vulnerable	O
to	O
various	O
known	O
attacks	O
which	O
are	O
also	O
present	O
in	O
other	O
disk	O
encryption	O
software	O
releases	O
such	O
as	O
BitLocker	O
.	O
</s>
<s>
To	O
prevent	O
those	O
,	O
the	O
documentation	O
distributed	O
with	O
TrueCrypt	B-Application
requires	O
users	O
to	O
follow	O
various	O
security	O
precautions	O
.	O
</s>
<s>
TrueCrypt	B-Application
stores	O
its	O
keys	O
in	O
RAM	B-Architecture
;	O
on	O
an	O
ordinary	O
personal	O
computer	O
the	O
DRAM	O
will	O
maintain	O
its	O
contents	O
for	O
several	O
seconds	O
after	O
power	O
is	O
cut	O
(	O
or	O
longer	O
if	O
the	O
temperature	O
is	O
lowered	O
)	O
.	O
</s>
<s>
Even	O
if	O
there	O
is	O
some	O
degradation	O
in	O
the	O
memory	B-Architecture
contents	O
,	O
various	O
algorithms	O
can	O
intelligently	O
recover	O
the	O
keys	O
.	O
</s>
<s>
This	O
method	O
,	O
known	O
as	O
a	O
cold	B-Operating_System
boot	I-Operating_System
attack	O
(	O
which	O
would	O
apply	O
in	O
particular	O
to	O
a	O
notebook	O
computer	O
obtained	O
while	O
in	O
power-on	O
,	O
suspended	O
,	O
or	O
screen-locked	O
mode	O
)	O
,	O
has	O
been	O
successfully	O
used	O
to	O
attack	O
a	O
file	O
system	O
protected	O
by	O
TrueCrypt	B-Application
.	O
</s>
<s>
TrueCrypt	B-Application
documentation	O
states	O
that	O
TrueCrypt	B-Application
is	O
unable	O
to	O
secure	O
data	O
on	O
a	O
computer	O
if	O
an	O
attacker	O
physically	O
accessed	O
it	B-General_Concept
and	O
TrueCrypt	B-Application
is	O
used	O
on	O
the	O
compromised	O
computer	O
by	O
the	O
user	O
again	O
(	O
this	O
does	O
not	O
apply	O
to	O
a	O
common	O
case	O
of	O
a	O
stolen	O
,	O
lost	O
,	O
or	O
confiscated	O
computer	O
)	O
.	O
</s>
<s>
The	O
attacker	O
having	O
physical	O
access	O
to	O
a	O
computer	O
can	O
,	O
for	O
example	O
,	O
install	O
a	O
hardware/software	O
keylogger	O
,	O
a	O
bus-mastering	B-Architecture
device	O
capturing	O
memory	B-Architecture
,	O
or	O
install	O
any	O
other	O
malicious	O
hardware	B-Device
or	O
software	O
,	O
allowing	O
the	O
attacker	O
to	O
capture	O
unencrypted	O
data	O
(	O
including	O
encryption	O
keys	O
and	O
passwords	O
)	O
,	O
or	O
to	O
decrypt	O
encrypted	O
data	O
using	O
captured	O
passwords	O
or	O
encryption	O
keys	O
.	O
</s>
<s>
TrueCrypt	B-Application
documentation	O
states	O
that	O
TrueCrypt	B-Application
cannot	O
secure	O
data	O
on	O
a	O
computer	O
if	O
it	B-General_Concept
has	O
any	O
kind	O
of	O
malware	O
installed	O
.	O
</s>
<s>
The	O
"	O
Stoned	O
"	O
bootkit	O
,	O
an	O
MBR	B-Device
rootkit	O
presented	O
by	O
Austrian	O
software	O
developer	O
Peter	O
Kleissner	O
at	O
the	O
Black	O
Hat	O
Technical	O
Security	O
Conference	O
USA	O
2009	O
,	O
has	O
been	O
shown	O
capable	O
of	O
tampering	O
TrueCrypt	B-Application
's	O
MBR	B-Device
,	O
effectively	O
bypassing	O
TrueCrypt	B-Application
's	O
full	O
volume	O
encryption	O
.	O
</s>
<s>
Potentially	O
every	O
hard	B-Device
disk	I-Device
encryption	O
software	O
is	O
affected	O
by	O
this	O
kind	O
of	O
attack	O
if	O
the	O
encryption	O
software	O
does	O
not	O
rely	O
on	O
hardware-based	O
encryption	O
technologies	O
like	O
TPM	O
,	O
or	O
if	O
the	O
attack	O
is	O
made	O
with	O
administrative	O
privileges	O
while	O
the	O
encrypted	O
operating	O
system	O
is	O
running	O
.	O
</s>
<s>
Two	O
types	O
of	O
attack	O
scenarios	O
exist	O
in	O
which	O
it	B-General_Concept
is	O
possible	O
to	O
maliciously	O
take	O
advantage	O
of	O
this	O
bootkit	O
:	O
in	O
the	O
first	O
one	O
,	O
the	O
user	O
is	O
required	O
to	O
launch	B-General_Concept
the	O
bootkit	O
with	O
administrative	O
privileges	O
once	O
the	O
PC	O
has	O
already	O
booted	O
into	O
Windows	O
;	O
in	O
the	O
second	O
one	O
,	O
analogously	O
to	O
hardware	B-Device
keyloggers	O
,	O
a	O
malicious	O
person	O
needs	O
physical	O
access	O
to	O
the	O
user	O
's	O
TrueCrypt-encrypted	O
hard	B-Device
disk	I-Device
:	O
in	O
this	O
context	O
this	O
is	O
needed	O
to	O
modify	O
the	O
user	O
's	O
TrueCrypt	B-Application
MBR	B-Device
with	O
that	O
of	O
the	O
Stoned	O
bootkit	O
and	O
then	O
place	O
the	O
hard	B-Device
disk	I-Device
back	O
on	O
the	O
unknowing	O
user	O
's	O
PC	O
,	O
so	O
that	O
when	O
the	O
user	O
boots	O
the	O
PC	O
and	O
types	O
his/her	O
TrueCrypt	B-Application
password	O
on	O
boot	B-Operating_System
,	O
the	O
"	O
Stoned	O
"	O
bootkit	O
intercepts	O
it	B-General_Concept
thereafter	O
because	O
,	O
from	O
that	O
moment	O
on	O
,	O
the	O
Stoned	O
bootkit	O
is	O
loaded	O
before	O
TrueCrypt	B-Application
's	O
MBR	B-Device
in	O
the	O
boot	B-Operating_System
sequence	I-Operating_System
.	O
</s>
<s>
avoid	O
running	O
non-trusted	O
executables	B-Application
with	O
administrative	O
privileges	O
.	O
</s>
<s>
The	O
second	O
one	O
can	O
be	O
successfully	O
neutralized	O
by	O
the	O
user	O
if	O
he/she	O
suspects	O
that	O
the	O
encrypted	O
hard	B-Device
disk	I-Device
might	O
have	O
been	O
physically	O
available	O
to	O
someone	O
he/she	O
does	O
not	O
trust	O
,	O
by	O
booting	B-Operating_System
the	O
encrypted	O
operating	O
system	O
with	O
TrueCrypt	B-Application
's	O
Rescue	B-Application
Disk	I-Application
instead	O
of	O
booting	B-Operating_System
it	B-General_Concept
directly	O
from	O
the	O
hard	B-Device
disk	I-Device
.	O
</s>
<s>
With	O
the	O
rescue	B-Application
disk	I-Application
,	O
the	O
user	O
can	O
restore	O
TrueCrypt	B-Application
's	O
MBR	B-Device
to	O
the	O
hard	B-Device
disk	I-Device
.	O
</s>
<s>
The	O
FAQ	O
section	O
of	O
the	O
TrueCrypt	B-Application
website	O
states	O
that	O
the	O
Trusted	O
Platform	O
Module	O
(	O
TPM	O
)	O
cannot	O
be	O
relied	O
upon	O
for	O
security	O
,	O
because	O
if	O
the	O
attacker	O
has	O
physical	O
or	O
administrative	O
access	O
to	O
the	O
computer	O
and	O
you	O
use	O
it	B-General_Concept
afterwards	O
,	O
the	O
computer	O
could	O
have	O
been	O
modified	O
by	O
the	O
attacker	O
e.g.	O
</s>
<s>
a	O
malicious	O
component	O
—	O
such	O
as	O
a	O
hardware	B-Device
keystroke	O
logger	O
—	O
could	O
have	O
been	O
used	O
to	O
capture	O
the	O
password	O
or	O
other	O
sensitive	O
information	O
.	O
</s>
<s>
Since	O
the	O
TPM	O
does	O
not	O
prevent	O
an	O
attacker	O
from	O
maliciously	O
modifying	O
the	O
computer	O
,	O
TrueCrypt	B-Application
will	O
not	O
support	O
the	O
TPM	O
.	O
</s>
<s>
A	O
crowdfunding	O
campaign	O
attempting	O
to	O
conduct	O
an	O
independent	O
security	O
audit	O
of	O
TrueCrypt	B-Application
was	O
successfully	O
funded	O
in	O
October	O
2013	O
.	O
</s>
<s>
A	O
non-profit	O
organization	O
called	O
the	O
Open	O
Crypto	O
Audit	O
Project	O
(	O
OCAP	O
)	O
was	O
formed	O
,	O
calling	O
itself	O
"	O
a	O
community-driven	O
global	O
initiative	O
which	O
grew	O
out	O
of	O
the	O
first	O
comprehensive	O
public	O
audit	O
and	O
cryptanalysis	O
of	O
the	O
widely	O
used	O
encryption	O
software	O
TrueCrypt	B-Application
"	O
.	O
</s>
<s>
The	O
organization	O
established	O
contact	O
with	O
TrueCrypt	B-Application
developers	O
,	O
who	O
welcomed	O
the	O
audit	O
.	O
</s>
<s>
Matthew	O
D	O
.	O
Green	O
,	O
one	O
of	O
the	O
auditors	O
,	O
added	O
"	O
I	O
think	O
it	B-General_Concept
's	O
good	O
that	O
we	O
did	O
n't	O
find	O
anything	O
super	O
critical.	O
"	O
</s>
<s>
One	O
day	O
after	O
TrueCrypt	B-Application
's	O
end	O
of	O
life	O
announcement	O
,	O
OCAP	O
confirmed	O
that	O
the	O
audit	O
would	O
continue	O
as	O
planned	O
,	O
with	O
Phase	O
II	O
expected	O
to	O
begin	O
in	O
June	O
2014	O
and	O
wrap	O
up	O
by	O
the	O
end	O
of	O
September	O
.	O
</s>
<s>
The	O
French	O
National	O
Agency	O
for	O
the	O
Security	O
of	O
Information	O
Systems	O
(	O
ANSSI	O
)	O
stated	O
that	O
while	O
TrueCrypt	B-Application
6.0	O
and	O
7.1a	O
have	O
previously	O
attained	O
ANSSI	O
certification	O
,	O
migration	O
to	O
an	O
alternate	O
certified	O
product	O
is	O
recommended	O
as	O
a	O
precautionary	O
measure	O
.	O
</s>
<s>
According	O
to	O
Gibson	O
Research	O
Corporation	O
,	O
Steven	O
Barnhart	O
wrote	O
to	O
an	O
email	O
address	O
for	O
a	O
TrueCrypt	B-Application
Foundation	O
member	O
he	O
had	O
used	O
in	O
the	O
past	O
and	O
received	O
several	O
replies	O
from	O
"	O
David	O
"	O
.	O
</s>
<s>
According	O
to	O
Barnhart	O
,	O
the	O
main	O
points	O
of	O
the	O
email	O
messages	O
were	O
that	O
the	O
TrueCrypt	B-Application
Foundation	O
was	O
"	O
happy	O
with	O
the	O
audit	O
,	O
it	B-General_Concept
did	O
n't	O
spark	O
anything	O
"	O
,	O
and	O
that	O
the	O
reason	O
for	O
the	O
announcement	O
was	O
that	O
"	O
there	O
is	O
no	O
longer	O
interest	O
[	O
in	O
maintaining	O
the	O
project ]	O
.	O
"	O
</s>
<s>
According	O
to	O
a	O
study	O
released	O
29	O
September	O
2015	O
,	O
TrueCrypt	B-Application
includes	O
two	O
vulnerabilities	O
in	O
the	O
driver	O
that	O
TrueCrypt	B-Application
installs	O
on	O
Windows	O
systems	O
allowing	O
an	O
attacker	O
arbitrary	O
code	O
execution	O
and	O
privilege	O
escalation	O
via	O
DLL	O
hijacking	O
.	O
</s>
<s>
In	O
January	O
2016	O
,	O
the	O
vulnerability	O
was	O
fixed	O
in	O
VeraCrypt	B-Operating_System
,	O
but	O
it	B-General_Concept
remains	O
unpatched	O
in	O
TrueCrypt	B-Application
's	O
unmaintained	O
installers	O
.	O
</s>
<s>
In	O
July	O
2008	O
,	O
several	O
TrueCrypt-secured	O
hard	B-Device
drives	I-Device
were	O
seized	O
from	O
Brazilian	O
banker	O
Daniel	O
Dantas	O
,	O
who	O
was	O
suspected	O
of	O
financial	O
crimes	O
.	O
</s>
<s>
The	O
Brazilian	O
National	O
Institute	O
of	O
Criminology	O
(	O
INC	O
)	O
tried	O
unsuccessfully	O
for	O
five	O
months	O
to	O
obtain	O
access	O
to	O
his	O
files	O
on	O
the	O
TrueCrypt-protected	O
disks	O
.	O
</s>
<s>
In	O
2012	O
the	O
United	O
States	O
11th	O
Circuit	O
Court	O
of	O
Appeals	O
ruled	O
that	O
a	O
John	O
Doe	O
TrueCrypt	B-Application
user	O
could	O
not	O
be	O
compelled	O
to	O
decrypt	O
several	O
of	O
his	O
hard	B-Device
drives	I-Device
.	O
</s>
<s>
The	O
court	O
's	O
ruling	O
noted	O
that	O
FBI	O
forensic	O
examiners	O
were	O
unable	O
to	O
get	O
past	O
TrueCrypt	B-Application
's	O
encryption	O
(	O
and	O
therefore	O
were	O
unable	O
to	O
access	O
the	O
data	O
)	O
unless	O
Doe	O
either	O
decrypted	O
the	O
drives	O
or	O
gave	O
the	O
FBI	O
the	O
password	O
,	O
and	O
the	O
court	O
then	O
ruled	O
that	O
Doe	O
's	O
Fifth	O
Amendment	O
right	O
to	O
remain	O
silent	O
legally	O
prevented	O
the	O
Government	O
from	O
making	O
him	O
or	O
her	O
do	O
so	O
.	O
</s>
<s>
He	O
was	O
carrying	O
with	O
him	O
an	O
external	O
hard	B-Device
drive	I-Device
said	O
to	O
be	O
containing	O
sensitive	O
documents	O
pertaining	O
to	O
the	O
2013	O
global	O
surveillance	O
disclosures	O
sparked	O
by	O
Edward	O
Snowden	O
.	O
</s>
<s>
Contents	O
of	O
the	O
drive	O
were	O
encrypted	O
by	O
TrueCrypt	B-Application
,	O
which	O
authorities	O
said	O
"	O
renders	O
the	O
material	O
extremely	O
difficult	O
to	O
access.	O
"	O
</s>
<s>
Detective	O
Superintendent	O
Caroline	O
Goode	O
stated	O
the	O
hard	B-Device
drive	I-Device
contained	O
around	O
60	O
gigabytes	O
of	O
data	O
,	O
"	O
of	O
which	O
only	O
20	O
have	O
been	O
accessed	O
to	O
date.	O
"	O
</s>
<s>
She	O
further	O
stated	O
the	O
process	O
to	O
decode	O
the	O
material	O
was	O
complex	O
and	O
"	O
so	O
far	O
only	O
75	O
documents	O
have	O
been	O
reconstructed	B-Application
since	O
the	O
property	O
was	O
initially	O
received.	O
"	O
</s>
<s>
Guardian	O
contributor	O
Naomi	O
Colvin	O
concluded	O
the	O
statements	O
were	O
misleading	O
,	O
stating	O
that	O
it	B-General_Concept
was	O
possible	O
Goode	O
was	O
not	O
even	O
referring	O
to	O
any	O
actual	O
encrypted	O
material	O
,	O
but	O
rather	O
deleted	O
files	O
reconstructed	B-Application
from	O
unencrypted	O
,	O
unallocated	O
space	O
on	O
the	O
hard	B-Device
drive	I-Device
,	O
or	O
even	O
plaintext	O
documents	O
from	O
Miranda	O
's	O
personal	O
effects	O
.	O
</s>
<s>
In	O
February	O
2014	O
,	O
an	O
Arizona	O
Department	O
of	O
Real	O
Estate	O
IT	B-General_Concept
department	O
employee	O
,	O
James	O
DeSilva	O
,	O
was	O
arrested	O
on	O
charges	O
of	O
sexual	O
exploitation	O
of	O
a	O
minor	O
through	O
the	O
sharing	O
of	O
explicit	O
images	O
over	O
the	O
Internet	O
.	O
</s>
<s>
His	O
computer	O
,	O
encrypted	O
with	O
TrueCrypt	B-Application
,	O
was	O
seized	O
,	O
and	O
DeSilva	O
refused	O
to	O
reveal	O
the	O
password	O
.	O
</s>
<s>
On	O
10	O
May	O
2016	O
a	O
District	O
Judge	O
(	O
Magistrate	O
's	O
Court	O
)	O
rejected	O
a	O
request	O
by	O
the	O
NCA	O
that	O
Love	O
be	O
forced	O
to	O
turn	O
over	O
his	O
encryption	O
keys	O
or	O
passwords	O
to	O
TrueCrypt	B-Application
files	O
on	O
an	O
SD	O
card	O
and	O
hard	B-Device
drives	I-Device
that	O
were	O
among	O
the	O
confiscated	O
property	O
.	O
</s>
<s>
In	O
the	O
special	O
prosecutor	O
investigation	O
for	O
Druking	O
in	O
South	O
Korea	O
,	O
the	O
special	O
prosecutor	O
decrypted	O
some	O
of	O
the	O
files	O
encrypted	O
by	O
TrueCrypt	B-Application
by	O
guessing	O
the	O
passphrase	O
.	O
</s>
<s>
TrueCrypt	B-Application
was	O
released	O
as	O
source-available	B-License
,	O
under	O
the	O
"	O
TrueCrypt	B-Application
License	O
,	O
"	O
which	O
is	O
unique	O
to	O
the	O
TrueCrypt	B-Application
software	O
.	O
</s>
<s>
As	O
of	O
version	O
7.1a	O
(	O
the	O
last	O
full	O
version	O
of	O
the	O
software	O
,	O
released	O
Feb	O
2012	O
)	O
,	O
the	O
TrueCrypt	B-Application
License	O
was	O
version	O
3.0	O
.	O
</s>
<s>
It	B-General_Concept
is	O
not	O
part	O
of	O
the	O
panoply	O
of	O
widely	O
used	O
open	B-Application
source	I-Application
licenses	I-Application
.	O
</s>
<s>
The	B-Operating_System
Free	I-Operating_System
Software	I-Operating_System
Foundation	I-Operating_System
(	O
FSF	O
)	O
states	O
that	O
it	B-General_Concept
is	O
not	O
a	O
free	B-License
software	I-License
license	I-License
.	O
</s>
<s>
Discussion	O
of	O
the	O
licensing	O
terms	O
on	O
the	O
Open	O
Source	O
Initiative	O
(	O
OSI	O
)	O
'	O
s	O
license-discuss	O
mailing	O
list	O
in	O
October	O
2013	O
suggests	O
that	O
the	O
TrueCrypt	B-Application
License	O
has	O
made	O
progress	O
towards	O
compliance	O
with	O
the	O
Open	O
Source	O
Definition	O
but	O
would	O
not	O
yet	O
pass	O
if	O
proposed	O
for	O
certification	O
as	O
Open	O
Source	O
software	O
.	O
</s>
<s>
According	O
to	O
current	O
OSI	O
president	O
Simon	B-Language
Phipps	I-Language
:	O
</s>
<s>
it	B-General_Concept
...	O
is	O
not	O
at	O
all	O
appropriate	O
for	O
 [ TrueCrypt ] 	O
to	O
describe	O
itself	O
as	O
"	O
open	O
source.	O
"	O
</s>
<s>
As	O
a	O
result	O
of	O
its	O
questionable	O
status	O
with	O
regard	O
to	O
copyright	O
restrictions	O
and	O
other	O
potential	O
legal	O
issues	O
,	O
major	O
Linux	B-Application
distributions	I-Application
do	O
not	O
consider	O
the	O
TrueCrypt	B-Application
License	O
free	B-Application
:	O
TrueCrypt	B-Application
is	O
not	O
included	O
with	O
Debian	O
,	O
Ubuntu	O
,	O
Fedora	O
,	O
or	O
openSUSE	O
.	O
</s>
<s>
28	O
May	O
2014	O
announcement	O
of	O
discontinuation	O
of	O
TrueCrypt	B-Application
also	O
came	O
with	O
a	O
new	O
version	O
7.2	O
of	O
the	O
software	O
.	O
</s>
<s>
Among	O
the	O
many	O
changes	O
to	O
the	O
source	O
code	O
from	O
the	O
previous	O
release	O
were	O
changes	O
to	O
the	O
TrueCrypt	B-Application
License	O
—	O
including	O
removal	O
of	O
specific	O
language	O
that	O
required	O
attribution	O
of	O
TrueCrypt	B-Application
as	O
well	O
as	O
a	O
link	O
to	O
the	O
official	O
website	O
to	O
be	O
included	O
on	O
any	O
derivative	O
products	O
—	O
forming	O
a	O
license	O
version	O
3.1	O
.	O
</s>
<s>
Cryptographer	O
Matthew	O
Green	O
,	O
who	O
had	O
help	O
raise	O
funds	O
for	O
TrueCrypt	B-Application
's	O
audit	O
noted	O
a	O
connection	O
between	O
TrueCrypt	B-Application
's	O
refusal	O
to	O
change	O
the	O
license	O
and	O
their	O
departure-time	O
warning	O
.	O
</s>
<s>
"	O
They	O
set	O
the	O
whole	O
thing	O
on	O
fire	O
,	O
and	O
now	O
maybe	O
nobody	O
is	O
going	O
to	O
trust	O
it	B-General_Concept
because	O
they	O
'll	O
think	O
there	O
's	O
some	O
big	O
evil	O
vulnerability	O
in	O
the	O
code.	O
"	O
</s>
<s>
On	O
16	O
June	O
2014	O
,	O
the	O
only	O
alleged	O
TrueCrypt	B-Application
developer	O
still	O
answering	O
email	O
replied	O
to	O
a	O
message	O
by	O
Matthew	O
Green	O
asking	O
for	O
permission	O
to	O
use	O
the	O
TrueCrypt	B-Application
trademark	O
for	O
a	O
fork	O
released	O
under	O
a	O
standard	O
open	O
source	O
license	O
.	O
</s>
<s>
Permission	O
was	O
denied	O
,	O
which	O
led	O
to	O
the	O
two	O
known	O
forks	O
being	O
named	O
VeraCrypt	B-Operating_System
and	O
CipherShed	O
as	O
well	O
as	O
a	O
re-implementation	O
named	O
tc-play	O
rather	O
than	O
TrueCrypt	B-Application
.	O
</s>
<s>
In	O
2007	O
a	O
US	O
trademark	O
for	O
TrueCrypt	B-Application
was	O
registered	O
under	O
the	O
name	O
of	O
Ondrej	O
Tesarik	O
with	O
a	O
company	O
name	O
TrueCrypt	B-Application
Developers	O
Association	O
and	O
a	O
trademark	O
on	O
the	O
"	O
key	O
"	O
logo	O
was	O
registered	O
under	O
the	O
name	O
of	O
David	O
Tesarik	O
with	O
a	O
company	O
name	O
TrueCrypt	B-Application
Developers	O
Association	O
.	O
</s>
<s>
In	O
2009	O
the	O
company	O
name	O
TrueCrypt	B-Application
Foundation	O
was	O
registered	O
in	O
the	O
US	O
by	O
a	O
person	O
named	O
David	O
Tesarik	O
.	O
</s>
<s>
The	O
TrueCrypt	B-Application
Foundation	O
non-profit	O
organization	O
last	O
filed	O
tax	O
returns	O
in	O
2010	O
,	O
and	O
the	O
company	O
was	O
dissolved	O
in	O
2014	O
.	O
</s>
