The Following User Says Thank You to malfunctioning For This Useful Post: | ||
|
2015-09-29
, 20:39
|
Posts: 2,076 |
Thanked: 3,268 times |
Joined on Feb 2011
|
#62
|
The Following 6 Users Say Thank You to szopin For This Useful Post: | ||
|
2015-09-30
, 05:16
|
Posts: 646 |
Thanked: 1,124 times |
Joined on Jul 2010
@ Espoo, Finland
|
#63
|
Well, it's great that the independent audit found nothing:
http://www.itworld.com/article/29874...ompromise.html
The Following 6 Users Say Thank You to minimos For This Useful Post: | ||
|
2015-09-30
, 09:00
|
Posts: 2,076 |
Thanked: 3,268 times |
Joined on Feb 2011
|
#64
|
The Following 2 Users Say Thank You to szopin For This Useful Post: | ||
|
2015-09-30
, 09:27
|
Posts: 735 |
Thanked: 1,054 times |
Joined on Jun 2010
|
#65
|
The Following User Says Thank You to Jedibeeftrix For This Useful Post: | ||
|
2015-09-30
, 10:15
|
|
Posts: 6,447 |
Thanked: 20,981 times |
Joined on Sep 2012
@ UK
|
#66
|
https://www.reddit.com/r/netsec/comm...nfhn?context=3
The programming error that allows escalation isn't in Windows, it's in *crypt.
The Following 2 Users Say Thank You to pichlo For This Useful Post: | ||
|
2015-09-30
, 15:38
|
Posts: 92 |
Thanked: 144 times |
Joined on Apr 2014
|
#67
|
Tags |
cryptography, encrypted, kernelcrypto, security, truecrypt |
|
But as long as 7.1a is proven solid, I think that should be enough for most people.
Then there is the question of any libraries TrueCrypt may use. I'm not familiar with the code, but I guess it's not a monolithic statically compiled chunk of code.
Last edited by malfunctioning; 2014-10-13 at 17:53.