if not set up correctly I would tend to agree.
What does the set up have to do with it? If the backdoor is built-in already, it's built in. Right?
Page 15 of the PDF mentioned...
What is a backdoor?
A method to bypass data encryption or security.
Blah blah blah
"Currently available for major encryption software - Microsoft
BitLocker, FIleVault, BestCrypt, TrueCrypt, etc." - the paragraph is a direct quote.
------------- True Crypt shouldn't of been added/listed -----------------
First TrueCrypt hasn't been backdoored. The fact they even mentioned it I figure
if it's setup up wrong it can be accessed, or worry you.
I reinstall OS's a lot, I had a TrueCrypt volume but after switching OS's it never would
show again. (I didn't try to recover it).
Given it's the opposite of back dooring, but I lost a lot of work in the process. That's when
I felt I should RTFM. One needs to be very careful with TrueCrypt, NTFS isn't that secure, and
TrueCrypt will tell you that, In fact a lot of precautions are required
----- Not back doored by reading memory block ------
A recent /. article mentioned TrueCrypt was back doored by reading a memory block.
A post and link by MidSpeck negated the claim:
"Still working as intended
by MidSpeck (1516577)
While good to know these types of attacks exist, TrueCrypt's security model is still holding strong. http://www.truecrypt.org/docs/... "
Which states, "TrueCrypt does not:
Encrypt or secure any portion of RAM (the main memory of a computer)."
True Crypt needs to be audited to set matters straight once and for all.
A lot of disinformation is being released to where one doesn't know what to believe.