Skip to content
Create a gist now

Instantly share code, notes, and snippets.

Embed URL


Subversion checkout URL

You can clone with
Download ZIP
TrueCrypt hack info
  • Developers have responded: |

Steven Barnhart (@stevebarnhart) wrote to an eMail address he had used before and received several replies from “David.” The following snippets were taken from a twitter conversation which then took place between Steven Barnhart (@stevebarnhart) and Matthew Green (@matthew_d_green):

TrueCrypt Developer “David”: “We were happy with the audit, it didn't spark anything. We worked hard on this for 10 years, nothing lasts forever.”

Steven Barnhart: (Paraphrasing) Developer “personally” feels that fork is harmful: “The source is still available as a reference though.”

Steven Barnhart: “I asked and it was clear from the reply that "he" believes forking's harmful because only they are really familiar w/code.”

Steven Barnhart: “Also said no government contact except one time inquiring about a ‘support contract.’ ”

TrueCrypt Developer “David”: Said “Bitlocker is ‘good enough’ and Windows was original ‘goal of the project.’ ”

Quoting TrueCrypt Developer David: “There is no longer interest.”

The binary on the website is capable only to decode encrypted data, not encode, and may contain trojan (seems like it doesn't, but don't believe me). The binary is signed with the valid (usual) key. All old versions are wiped, the repository is wiped too.

Assumption #1 The website is presumed hacked, the keys are presumed compromised. Please do not download or run it. And please don't switch to bitlocker.

Latest working version is 7.1a. Version 7.2 is a hoax

On the SourceForge, the keys were changed before any TrueCrypt files uploaded, but now they are deleted and the old keys got reverted back.

Why I think so: strange key change, why bitlocker?

Assumption #2 Something bad happened to TrueCrypt developers (i.e. take down or death) or to TrueCrypt itself (i.e. found the worst vulnerability ever) which made them do such a thing. So this version is legit

Why I think so: all files are with valid signatures, all the releases are available (Windows; Linux x86, x86_64, console versions, Mac OS, sources), the binaries seems like was built on the usual developer PC (there are some paths like c:\truecrypt-7.2\driver\obj_driver_release\i386\truecrypt.pdb, which were the same for 7.1a). License text is changed too (see the diff below).

Why is it ridiculous for TrueCrypt developers to suggest moving to BitLocker? Well, TrueCrypt was strictly against of using TPM because it may contain extra key chains which allow agencies like NSA to extract your private key. Although I find TPM to be a great solution in some cases (like embedded systems where you can't return to OS from fullscreen application) and used it a lot as a developer, I can't imagine why would TrueCrypt developers suggest such a thing and not other open-source alternatives. It looks like a clear sign that the developer can't say he's in danger so he did this. As many suppose, this could be the sort of warrant canary

Assumption #2 is more likely true than assumption #1. Sad but true.

Assumption #3 7.1a is backdoored and the developer wants all users to stop using it.

Why I think so: there is a website which contains all the hash sums for TrueCrypt 7.1a. Is has only 1 blog record from August 15, 2013, only for TrueCrypt and only for 7.1a. It's a bit strange to make a website with the hash sums for only one program and only one version of it.

And another one thing:

April 12, 2014: Site is set to read-only mode. All the user accounts are deleted. Thanks everybody for participating in the project!

More assumptions here:

SourceForge sent emails on 22 May, they said they changed password algorithms and everybody should change their passwords.

SourceForge claims everything is as usual (from

Providing some details from SourceForge:

  1. We have had no contact with the TrueCrypt project team (and thus no complaints).

  2. We see no indicator of account compromise; current usage is consistent with past usage.

  3. Our recent SourceForge forced password change was triggered by infrastructure improvements not a compromise. FMI see

Thank you,

The SourceForge Team

TrueCrypt developers are unknown and currently there is no way to know who is who and who should we listen to.

From wikileaks twitter

(1/4) Truecrypt has released an update saying that it is insecure and development has been terminated

(2/4) the style of the announcement is very odd; however we believe it is likely to be legitimate and not a simple defacement

(3/4) the new executable contains the same message and is cryptographically signed. We believe that there is either a power conflict..

(4/4) in the dev team or psychological issues, coersion of some form, or a hacker with access to site and keys.

From Matthew Green (one of TrueCrypt auditor) twitter

@SteveBellovin @mattblaze @0xdaeda1a I think this is legit.

TrueCrypt Setup 7.1a.exe:

  • sha1: 7689d038c76bd1df695d295c026961e50e4a62ea
  • md5: 7a23ac83a0856c352025a6f7c9cc1526

TrueCrypt 7.1a Mac OS X.dmg:

  • sha1: 16e6d7675d63fba9bb75a9983397e3fb610459a1
  • md5: 89affdc42966ae5739f673ba5fb4b7c5


  • sha1: 0e77b220dbbc6f14101f3f913966f2c818b0f588
  • md5: 09355fb2e43cf51697a15421816899be


  • sha1: 086cf24fad36c2c99a6ac32774833c74091acc4d
  • md5: bb355096348383987447151eecd6dc0e

Diff between latest version and the hoax one:


Other interesting thoughts and information:

Topics and articles: ­— that is a good one — some more info about developers

Twitter stream:

You may join IRC, although there is no OPs right now.


Could you also give checksum of source package and download links for clean version, please? :)


TrueCrypt Setup 7.1a.exe:

sha1: 7689d038c76bd1df695d295c026961e50e4a62ea
md5: 7a23ac83a0856c352025a6f7c9cc1526

Matches my binary downloaded on 4/22/13. hth


How is this different? It's the same.


Added assumption #3


And another surprise on this topic:*/


This URL has been excluded from the Wayback Machine."


Added info about


Added some links


published these information on
i hope its okay! thank you very much. i also gave credits


Added developers reply!


truecrypt-7.1a.tar.gz sources archive

sha1: d43e0dbe05c04e316447d87413c4f74c68f5de24
md5: 102d9652681db11c813610882332ae48

Downloaded 2012-02-22

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Something went wrong with that request. Please try again.