Skip to content

Instantly share code, notes, and snippets.

@ValdikSS
Last active January 23, 2024 18:42
Show Gist options
  • Save ValdikSS/c13a82ca4a2d8b7e87ff to your computer and use it in GitHub Desktop.
Save ValdikSS/c13a82ca4a2d8b7e87ff to your computer and use it in GitHub Desktop.
TrueCrypt hack info
  • Developers have responded:

https://www.grc.com/misc/truecrypt/truecrypt.htm | https://twitter.com/stevebarnhart/status/472192457145597952

Steven Barnhart (@stevebarnhart) wrote to an eMail address he had used before and received several replies from “David.” The following snippets were taken from a twitter conversation which then took place between Steven Barnhart (@stevebarnhart) and Matthew Green (@matthew_d_green):

TrueCrypt Developer “David”: “We were happy with the audit, it didn't spark anything. We worked hard on this for 10 years, nothing lasts forever.”

Steven Barnhart: (Paraphrasing) Developer “personally” feels that fork is harmful: “The source is still available as a reference though.”

Steven Barnhart: “I asked and it was clear from the reply that "he" believes forking's harmful because only they are really familiar w/code.”

Steven Barnhart: “Also said no government contact except one time inquiring about a ‘support contract.’ ”

TrueCrypt Developer “David”: Said “Bitlocker is ‘good enough’ and Windows was original ‘goal of the project.’ ”

Quoting TrueCrypt Developer David: “There is no longer interest.”


The binary on the website is capable only to decode encrypted data, not encode, and may contain trojan (seems like it doesn't, but don't believe me). The binary is signed with the valid (usual) key. All old versions are wiped, the repository is wiped too.


Assumption #1 The website is presumed hacked, the keys are presumed compromised. Please do not download or run it. And please don't switch to bitlocker.

Latest working version is 7.1a. Version 7.2 is a hoax

On the SourceForge, the keys were changed before any TrueCrypt files uploaded, but now they are deleted and the old keys got reverted back.

Why I think so: strange key change, why bitlocker?


Assumption #2 Something bad happened to TrueCrypt developers (i.e. take down or death) or to TrueCrypt itself (i.e. found the worst vulnerability ever) which made them do such a thing. So this version is legit

Why I think so: all files are with valid signatures, all the releases are available (Windows; Linux x86, x86_64, console versions, Mac OS, sources), the binaries seems like was built on the usual developer PC (there are some paths like c:\truecrypt-7.2\driver\obj_driver_release\i386\truecrypt.pdb, which were the same for 7.1a). License text is changed too (see the diff below).

Why is it ridiculous for TrueCrypt developers to suggest moving to BitLocker? Well, TrueCrypt was strictly against of using TPM because it may contain extra key chains which allow agencies like NSA to extract your private key. Although I find TPM to be a great solution in some cases (like embedded systems where you can't return to OS from fullscreen application) and used it a lot as a developer, I can't imagine why would TrueCrypt developers suggest such a thing and not other open-source alternatives. It looks like a clear sign that the developer can't say he's in danger so he did this. As many suppose, this could be the sort of warrant canary

Assumption #2 is more likely true than assumption #1. Sad but true.


Assumption #3 7.1a is backdoored and the developer wants all users to stop using it.

Why I think so: there is a website http://truecryptcheck.wordpress.com which contains all the hash sums for TrueCrypt 7.1a. Is has only 1 blog record from August 15, 2013, only for TrueCrypt and only for 7.1a. It's a bit strange to make a website with the hash sums for only one program and only one version of it.

And another one thing: http://truecrypt.org.ua/news

April 12, 2014: Site is set to read-only mode. All the user accounts are deleted. Thanks everybody for participating in the project!

More assumptions here: http://www.etcwiki.org/wiki/What_happened_to_Truecrypt_-_May_2014


SourceForge sent emails on 22 May, they said they changed password algorithms and everybody should change their passwords.

SourceForge claims everything is as usual (from https://news.ycombinator.com/item?id=7813121):

Providing some details from SourceForge:

  1. We have had no contact with the TrueCrypt project team (and thus no complaints).

  2. We see no indicator of account compromise; current usage is consistent with past usage.

  3. Our recent SourceForge forced password change was triggered by infrastructure improvements not a compromise. FMI see http://sourceforge.net/blog/forced-password-change/

Thank you,

The SourceForge Team communityteam@sourceforge.net

TrueCrypt developers are unknown and currently there is no way to know who is who and who should we listen to.

From wikileaks twitter https://twitter.com/wikileaks/status/471769936038461440:

(1/4) Truecrypt has released an update saying that it is insecure and development has been terminated http://truecrypt.sf.net

(2/4) the style of the announcement is very odd; however we believe it is likely to be legitimate and not a simple defacement

(3/4) the new executable contains the same message and is cryptographically signed. We believe that there is either a power conflict..

(4/4) in the dev team or psychological issues, coersion of some form, or a hacker with access to site and keys.

From Matthew Green (one of TrueCrypt auditor) twitter https://twitter.com/matthew_d_green/status/471752508147519488:

@SteveBellovin @mattblaze @0xdaeda1a I think this is legit.

TrueCrypt Setup 7.1a.exe:

  • sha1: 7689d038c76bd1df695d295c026961e50e4a62ea
  • md5: 7a23ac83a0856c352025a6f7c9cc1526

TrueCrypt 7.1a Mac OS X.dmg:

  • sha1: 16e6d7675d63fba9bb75a9983397e3fb610459a1
  • md5: 89affdc42966ae5739f673ba5fb4b7c5

truecrypt-7.1a-linux-x86.tar.gz:

  • sha1: 0e77b220dbbc6f14101f3f913966f2c818b0f588
  • md5: 09355fb2e43cf51697a15421816899be

truecrypt-7.1a-linux-x64.tar.gz:

  • sha1: 086cf24fad36c2c99a6ac32774833c74091acc4d
  • md5: bb355096348383987447151eecd6dc0e

Diff between latest version and the hoax one: https://github.com/warewolf/truecrypt/compare/master...7.2

Screenshot: http://habrastorage.org/getpro/habr/post_images/da1/1bf/6a5/da11bf6a5225fa718987ba4e54038fc1.png

Other interesting thoughts and information: http://www.reddit.com/r/crypto/comments/26px1i/truecrypt_shutting_down_development_of_truecrypt/chu5bhr

http://krebsonsecurity.com/2014/05/true-goodbye-using-truecrypt-is-not-secure/comment-page-1/#comment-255908

http://bradkovach.com/2014/05/the-death-of-truecrypt-a-symptom-of-a-greater-problem/

http://boingboing.net/2014/05/29/mysterious-announcement-from-t.html

http://steve.grc.com/2014/05/29/an-imagined-letter-from-the-truecrypt-developers/

Topics and articles: https://news.ycombinator.com/item?id=7812133

http://www.reddit.com/r/netsec/comments/26pz9b/truecrypt_development_has_ended_052814/

http://www.reddit.com/r/sysadmin/comments/26pxol/truecrypt_is_dead/

http://www.reddit.com/r/crypto/comments/26px1i/truecrypt_shutting_down_development_of_truecrypt/

http://arstechnica.com/security/2014/05/truecrypt-is-not-secure-official-sourceforge-page-abruptly-warns/

http://krebsonsecurity.com/2014/05/true-goodbye-using-truecrypt-is-not-secure/

http://www.pcworld.com/article/2241300/truecrypt-now-encouraging-users-to-use-microsofts-bitlocker.html#tk.twt_pcworld

http://www.coindesk.com/popular-encryption-tool-truecrypt-mysteriously-shuts/

http://business.kaspersky.com/truecrypt-unexplained-disappearance/

http://www.forbes.com/sites/jameslyne/2014/05/29/open-source-crypto-truecrypt-disappears-with-suspicious-cloud-of-mystery/ ­— that is a good one

http://news.softodrom.ru/ap/b19702.shtml

http://pastebin.com/7LNQUsrA — some more info about developers

Twitter stream: https://twitter.com/search?q=truecrypt&src=typd

You may join IRC #truecrypt@irc.freenode.net, although there is no OPs right now.

@Ghost99
Copy link

Ghost99 commented May 30, 2014

truecrypt-7.1a.tar.gz sources archive

sha1: d43e0dbe05c04e316447d87413c4f74c68f5de24
md5: 102d9652681db11c813610882332ae48

Downloaded 2012-02-22

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment