posted on Feb, 11 2020 @ 01:15 PM
So the news dropped that the CIA has been selling encryption devices to state governments for the last 70 years. They did so using a front company
based in Switzerland. This allowed them to intercept secret communications of any suckers that bought into it. (
archive.today...)
This is a huge discussion worthy story, but not what I am thinking about.
This story, along with the steady march to force weaker encryption via legislation, and bribery to push faulty protocols into the standards
(
archive.ph...) lead me to a positive conclusion:
Encryption can work as advertised. There is no silver bullet to defeat it.
This is further evidenced in the take down of one of the modern day's most notorious pirates. Where the concern of full disk encryption led to them
ambushing him in a library. (
archive.today...)
The conspiracy I want to talk about today is with the pinnacle full disk encryption applications from a decade ago: TrueCrypt.
They have an interesting story. Edward Snowden's revelations led to an audit prompting the company to cease development citing something about
Microsoft's support of Windows XP. But not really. They have since released updates using officially signed binaries. (
archive.today...)
For the last 6 years the Truecrypt website has remained up with the same red warning: "WARNING: Using TrueCrypt is not secure as it may contain
unfixed security issues". (
archive.today...)
That is some peculiar phrasing: "not secure as".