Welcome Guest.   Make a donation to an author on the site July 26, 2014, 10:11:38 AM  *

Please login or register.
Or did you miss your validation email?

Login with username and password (forgot your password?)
Why not become a lifetime supporting member of the site with a one-time donation of any amount? Your donation entitles you to a ton of additional benefits, including access to exclusive discounts and downloads, the ability to enter monthly free software drawings, and a single non-expiring license key for all of our programs.

You must sign up here before you can post and access some areas of the site. Registration is totally free and confidential.
Free DonationCoder.com Member Kit: Submit Request.
  Forum Home Thread Marks Chat! Downloads Search Login Register  
  Show Posts
      View this member's profile 
      donate to someone Donate to this member 
Pages: Prev 1 ... 8 9 10 11 12 [13] 14 15 16 17 18 ... 413 Next
301  Other Software / DC Gamer Club / Re: The Fight for the PC Ecosystem - AMD vs nVidia - via Watch Dogs on: June 01, 2014, 10:31:43 AM
Nvidia has demonstrated time and time again that they are a very unscrupulous company. I'm not saying AMD is any better, but Nvidia has an unmistakable track record. From inflated benchmarks, knowingly selling defective products and doing nothing about it, and a laundry list of other shenanigans, they have a reputation for not playing nicely.

Agree 100% with all of the above. AMD can be a pain at times. But Nvidia has gone completely over the top these last several years.
302  Main Area and Open Discussion / Living Room / Re: We Drove a Car While It Was Being Hacked on: June 01, 2014, 10:26:08 AM
The problem isn't that the default passwords are simple, because most if not all of them are well documented and therefore readily available. The problem is that so many people keep using them in production environments.

What I meant to include in my original post (but didn't because I sometimes type faster than I can think) is the real problem is often the manufacturer offers no way to change the default password in the product. It's set at the factory to a universal default with no way to alter it...like that Bluetooth-enabled toilet that anyone could connect to and flush. smiley

With some fairness to manufacturers however, they're caught between a rock and a hard place with passwords. People change them and the forget all the time. If the manufacturer has a backdoor, the manufacturer risks liability - and it's only a matter of time before somebody else discovers it. If there isn't one, the customer invariably insists they didn't forget what they changed the password to - then claims it's the manufacturer's fault because something "must have glitched or got corrupted somehow" - and then demands the manufacturer fix it for free.

It's a no-win situation for everybody.
303  Main Area and Open Discussion / Living Room / Re: A three drive system - the sweet spot on: May 31, 2014, 10:14:03 PM
Is it just me, or does most of this stuff seem pretty obvious?  :?|

It might be more you. A lot of what gets discussed here is done for the benefit of those to whom the information may not be quite so obvious. smiley
304  Main Area and Open Discussion / General Software Discussion / Re: What the Heck is Happening to Windows? Article on Windows 8 Disaster on: May 31, 2014, 10:06:49 PM
What melodrama.

Melodrama? Out of curiosity, how so?
305  Main Area and Open Discussion / Non-Windows Software / LINUX: It's official - Mint 17 "Qiana" released to distribution on: May 31, 2014, 10:01:22 PM
It's heeeeeere! smiley

Mint's latest and greatest (codename: Quina) has just been officially released to distribution in both 32 and 64-bit native versions. Cinnamon and MATE desktops are both available now. This is Mint's first LTS release (based off Ubuntu 14.04 "Trusty Tahr") which will receive security updates until 2019 and reflect Mint's new long-term strategy.

More here and here.
306  Main Area and Open Discussion / Living Room / Re: Recommend some music videos to me! on: May 31, 2014, 03:27:41 PM
Well, my that is a bit harsh of a comparison,

Wasn't meant to be harsh. More like me saying it's nice to know that spending a ridiculous amount of money for a built to order guitar like the Klein actually got you something. Whether it was actually worth it is something the potential buyer would need to decide. I personally don't think you'd need to spend anywhere near what a Klein goes for if you're just shopping for superior sound or playability. There are plenty of far less expensive mass produced guitars and basses that will fit the bill. You'll just have to audition several before you find your ideal match.

FWIW I never spent more than $1200 (and that $1200 was only once) for any instrument I've ever owned - although a few in the collection are now supposedly worth considerably more than what I originally paid. I don't really get why. They're the same instrument they were the day I bought them. Just older and a little more shop worn. Like me! Grin
307  Main Area and Open Discussion / General Software Discussion / Re: Anyone using CherryTree for Windows, or Linux for that matter? on: May 31, 2014, 01:41:14 PM
I am just a bit puzzled at any program that can't let me create a 3 level deep node in twelve seconds because that's how I think every day.

My problem with hierarchical trees (and outliners in general) is my tendency to not stop at just three levels. If I'm not careful I can all too easily and fall into a fractal mode of thinking. I think it was one of Herman Hesse's characters (Steppenwolf?) that said something to the effect that in order to accurately explain what he was thinking, a hundred things need to be said simultaneously.

Yeah...that sure sounds like me sometimes. Grin
308  Main Area and Open Discussion / General Software Discussion / Re: TrueCrypt alternative on: May 31, 2014, 12:40:39 PM
2. Why use containers anyway? Use EncFS.

ding ding ding

Precisely. Easy to install and easy to use were TC's biggest selling points for the average user. People that preferred an encrypted file system instead of an encrypted container approach went with Bitlocker and similar tools.

309  Main Area and Open Discussion / Living Room / Re: We Drove a Car While It Was Being Hacked on: May 31, 2014, 08:24:52 AM
Small surprise. Homeland Security and a number of police agencies have been lobbying for a law requiring that car makers provide the police with the ability to remotely disable any motor vehicle. It would make a nice addition to the inaccessibly embedded GPS tracker they also want installed in every car. Nice to see some manufacturers are getting a jump on it in anticipation of those proposed regulations being adopted. And including those "features" shouldn't add more than a few hundred dollars to the price the consumer would have to pay next time they bought a car.

Ain't electronics and wireless technology a grand thing? Wearing chains is so much easier to ignore when they're mostly invisible.

One nation, under surveillance, with monitoring and kill switches for all!  
310  Main Area and Open Discussion / Living Room / Re: Recommend some music videos to me! on: May 30, 2014, 10:52:21 PM
BTW, Jody's guitar is a (Steve) Klein in case anybody's wondering "What in the name of all that's holy is he playing???" (Most guitarists do btw.  Grin)
 (see attachment in previous post)
Awesome! tellme

Aww, yeah!  The boilerplate design for years of ergonomic guitar designs.  I remember that short time in the late early 80s when some guitar makers experimented with ergonomics (remember fan frets?) just before the hair farmers and their ridiculously pointy guitars showed up and trashed the place... Thmbsup

My ideal ergonomic six-string mademoiselle would be the Klein's inspiration, the Ovation Breadwinner. (see attachment in previous post)
* Edvard drools salaciously

One of the guitarists in my old group owned it's cousin the Deacon. None of us were in love with the sound of the thing. (It was kinda harsh played through a SuperTwin Reverb.) And it wasn't any more comfortable or balanced than a Strat was. But what the heck - if you like it, go for it!

That said, having personally had a shot at playing both a Deacon and a Klein, the Deacon is to a Klein as KittyHawk is to an SR-71 Blackbird. No comparison in terms of design, construction, finish or materials.

(remember fan frets?

I do. Lowden, Beneteau, and Dingwall have all used them. Dingwall currently makes some unbelievably wonderful basses that use fanned frets. I tried one (the AR5) at a music show. It didn't seem to want effort to adapt to it. I was comfortable after about 5 minutes. I figure a week of real practice would have been all it would take to no longer notice the frets were fanned. On a 5-string it definitely improved the low B string's clarity and intonation without resorting to a 35" scale across all strings like most good sounding "5-vers" do. Lee Sklar agrees so I guess I wasn't imagining it.

re: Roy Clark: man was amazing. Totally amazing.

ok...back on topic...here's a great live pairing: Australian blues guitarist Fianna Boyes teamed up with Texas swing steel goddess Cindy Cashdolar performing Fiona's song I Got My Eye on You. I really love the melodic interaction between these two on this song. You can see why Ms. Cashdollar is one of the most respected and sought after sidemen in the business.

<a href="http://www.youtube.com/watch?v=6VSsGkrlMQ0" target="_blank">http://www.youtube.com/watch?v=6VSsGkrlMQ0</a>


311  Main Area and Open Discussion / Living Room / Re: Knight to queen's bishop 3 - Snowden charged with espionage. on: May 30, 2014, 09:54:05 PM
he won't come back to the U.S. to face a fair trial

Kerry is correct. He won't come back to face a fair trial. US Espionage Act trials are notorious for being kangaroo courts.

Snowden won't come back to face a farce trial would be a much better a characterization.

312  Main Area and Open Discussion / General Software Discussion / Re: TrueCrypt alternative on: May 30, 2014, 09:37:11 PM
I think it will only be a matter of time before a functionally equivalent, fully audited, and genuinely open replacement appears. There's far too much interest and demand for it to remain unmet. And FOSS abhors such a vacuum. Cool
313  Main Area and Open Discussion / Living Room / The Secret History of Hypertext? on: May 30, 2014, 09:22:31 PM
Interesting article over at The Atlantic website about a relatively unknown visionary by the name of Paul Otlet.

From the article:

In the years leading up to World War II, a number of European thinkers were exploring markedly similar ideas about information storage and retrieval, and even imagining the possibility of a global network—a feature notably absent from the Memex. Yet their contributions have remained largely overlooked in the conventional, Anglo-American history of computing.

Chief among them was Paul Otlet, a Belgian bibliographer and entrepreneur who, in 1934, laid out a plan for a global network of “electric telescopes” that would allow anyone in the world to access to a vast library of books, articles, photographs, audio recordings, and films.

Like Bush, Otlet explored the possibilities of storing data on microfilm and making it searchable, with a web of documents connected via a sophisticated linking system. Otlet also wrote about wireless networks, speech recognition, and social network-like features that would allow individuals to “participate, applaud, give ovations, sing in the chorus.” He even described a mechanism for transmitting taste and smell.

That vision evolved over the course of nearly half a century of experimentation. In 1895, Otlet and his partner Henri La Fontaine—a Belgian senator and future Nobel Peace Prize Winner—launched a project called the Universal Bibliography, or Répertoire Bibliographique Universel, an ambitious plan to catalog of all the world’s published information.

Although I wouldn't go so far as to conclude* Otlet's work was an direct forerunner of hypertext or the web, it's interesting to see the convergence of thinking and concepts that seem to point (with benefit of 20-20 hindsight) to the info-ecosystem we enjoy (or suffer under) today.

Fun read. Check it out here.


*Note: One problem with playing James Burke's Connections game is that it invites erroneous attributions of causality and influence. Not a serious problem (this is an intellectual parlour game after all) - but one to be aware of. Because on a certain level, anything can be made to look it's leading up to virtually anything else, provided you're clever and imaginative enough forge the links between.
314  Main Area and Open Discussion / General Software Discussion / Re: Anyone using CherryTree for Windows, or Linux for that matter? on: May 30, 2014, 01:54:42 PM
Circles and arrows and a paragraph linked to each one explainin' what each one wuz may help.  smiley

Would something like Scapple work for you? OSX and Windows only. No Nix version - although I tried installing it under Wine and it appears to work ok. Still, I'd never trust running it that way if I were doing something important. So let's keep it as Mac/PC only.

You can get a 30 (non-consecutive!!!) day trial if you want one just by downloading it. Inexpensive to buy too ($15).
315  Main Area and Open Discussion / Living Room / Re: TrueCrypt is Now Abandonware?! on: May 30, 2014, 01:43:04 PM
At this point I'd put my money on CU's earlier suggestion:

The developer just wants to move on, and is taking an opportunity to make a political statement by stepping out in this way (like the Reichstag fire – cause the damage yourself, but make it look like your enemy caused it)


They were told to stop (i.e. threatened).


They decided to roll up their mat - and bug out. Which is also plausible considering the abrupt nature of the cessation. Perhaps it was reaching the point where their identities risked being exposed. And being identified would have resulted in serious consequences for them. (It'd be a riot if these guys were NSA contractors who put TC together just to put a fly in the ointment.)

Whatever. I doubt we'll ever really know for sure. huh
316  Main Area and Open Discussion / Living Room / Re: What books are you reading? on: May 30, 2014, 01:19:55 PM
Lately anything and everything by Charles Stross. Especially good is his short story collection Wireless.

Stross does an occasional alternate history riff using themes from H.P. Lovecraft wedded to Cold War politics. The results are unique and chilling.

Here's some excerpts from the short story A Colder War which is included in the Wireless collection. A CIA analyst is preparing a brief for the Executive Branch that attempts to summarize a Soviet military program that threatens a form of spiritual destruction and suffering far worse than death itself. (If you like it or want to see more, a complete copy of this story can be read online here.)

The file he is reading frightens him.

Once, when Roger was a young boy, his father took him to an open day at Nellis AFB, out in the California desert. Sunlight glared brilliantly from the polished silverplate flanks of the big bombers, sitting in their concrete-lined dispersal bays behind barriers and blinking radiation monitors. The brightly coloured streamers flying from their pitot tubes lent them a strange, almost festive appearance. But they were sleeping nightmares: once awakened, nobody -- except the flight crew -- could come within a mile of the nuclear-powered bombers and live.

Looking at the gleaming, bulging pods slung under their wingtip pylons, Roger had a premature inkling of the fires that waited within, a frigid terror that echoed the siren wail of the air raid warnings. He'd sucked nervously on his ice cream and gripped his father's hand tightly while the band ripped through a cheerful Sousa march, and only forgot his fear when a flock of Thunderchiefs sliced by overhead and rattled the car windows for miles around.

He has the same feeling now, as an adult reading this intelligence assessment, that he had as a child, watching the nuclear powered bombers sleeping in their concrete beds.

There's a blurry photograph of a concrete box inside the file, snapped from above by a high-flying U-2 during the autumn of '61. Three coffin-shaped lakes, bulking dark and gloomy beneath the arctic sun; a canal heading west, deep in the Soviet heartland, surrounded by warning trefoils and armed guards. Deep waters saturated with calcium salts, concrete coffer-dams lined with gold and lead. A sleeping giant pointed at NATO, more terrifying than any nuclear weapon.

Project Koschei.

Puzzle Palace

Roger isn't a soldier. He's not much of a patriot, either: he signed up with the CIA after college, in the aftermath of the Church Commission hearings in the early seventies. The Company was out of the assassination business, just a bureaucratic engine rolling out National Security assessments: that's fine by Roger. Only now, five years later, he's no longer able to roll along, casually disengaged, like a car in neutral bowling down a shallow incline towards his retirement, pension and a gold watch. He puts the file down on his desk and, with a shaking hand, pulls an illicit cigarette from the pack he keeps in his drawer. He lights it and leans back for a moment to draw breath, force relaxation, staring at smoke rolling in the air beneath the merciless light until his hand stops shaking.

Most people think spies are afraid of guns, or KGB guards, or barbed wire, but in point of fact the most dangerous thing they face is paper. Papers carry secrets. Papers can carry death warrants. Papers like this one, this folio with its blurry eighteen year old faked missile photographs and estimates of time/survivor curves and pervasive psychosis ratios, can give you nightmares, dragging you awake screaming in the middle of the night. It's one of a series of highly classified pieces of paper that he is summarizing for the eyes of the National Security Council and the President Elect -- if his head of department and the DDCIA approve it -- and here he is, having to calm his nerves with a cigarette before he turns the next page.

After a few minutes, Roger's hand is still. He leaves his cigarette in the eagle-headed ash tray and picks up the intelligence report again. It's a summary, itself the distillation of thousands of pages and hundreds of photographs. It's barely twenty pages long: as of 1963, its date of preparation, the CIA knew very little about Project Koschei. Just the bare skeleton, and rumours from a highly-placed spy. And their own equivalent project, of course. Lacking the Soviet lead in that particular field, the USAF fielded the silver-plated white elephants of the NB-39 project: twelve atomic-powered bombers armed with XK-PLUTO, ready to tackle Project Koschei should the Soviets show signs of unsealing the bunker. Three hundred megatons of H-bombs pointed at a single target, and nobody was certain it would be enough to do the job.

And then there was the hard-to-conceal fiasco in Antarctica. Egg on face: a subterranean nuclear test program in international territory! If nothing else, it had been enough to stop JFK running for a second term. The test program was a bad excuse: but it was far better than confessing what had really happened to the 501st Airborne Division on the cold plateau beyond Mount Erebus. The plateau that the public didn't know about, that didn't show up on the maps issued by the geological survey departments of those governments party to the Dresden Agreement of 1931 -- an arrangement that even Hitler had stuck to. The plateau that had swallowed more U-2 spy planes than the Soviet Union, more surface expeditions than darkest Africa.

Stross! The man. Thmbsup
317  Main Area and Open Discussion / Living Room / Re: TrueCrypt is Now Abandonware?! on: May 30, 2014, 11:37:34 AM
And that license has since been changed. The new license makes no provision for using any part of TC's code (which is available) in (or for) something else.

The 7.1a release is licensed under the TrueCrypt License Version 3.0, which seems to permit forks (even if it's not truly an open source license due to attribution and renaming clauses or other restrictions).  As far as I know, the license that TrueCrypt 7.2 was released under wouldn't apply to the 7.1a release.

All of the TC licenses have been questioned by various Linux/FOSS groups. Several attorneys characterized the licenses as "a legal minefield" and "misleading."

I really can't see anybody (in a position to do so) wanting to have anything to do with TC going forward. The encryption methods are well known, and there are a lot of good programmers out there. What TC brought to the party was a simple GUI and easily installable binaries. It primarily made some complex technology accessible to the masses. Praiseworthy - but nothing that couldn't be done by others.

TrueCrypt's codebase is not essential for anything. There are already existing projects (e.g. tc-play and others) that have been released under genuine FOSS licensing. These could just as easily be used to provide the same functionalities TrueCrypt formerly offered - or to create entirely new encryption products.

I personally think TrueCrypt got used as much as it did for three very simple reasons: (1) It worked. (2) It was easy to install. (3) It was easy to use. None of that is something that couldn't be accomplished by other coders. Especially with the talent pool that's out there.

And it will.

So vaya con Dios, TrueCrypt...

So long, and thanks for all the fish. Thmbsup Wink


Note: the thing that really makes this story interesting is wondering what actually went down.

Especially if it was another "Lavabit situation." Because if it was, it's something we all need to be concerned about.
318  Main Area and Open Discussion / Living Room / Re: TrueCrypt is Now Abandonware?! on: May 30, 2014, 10:22:45 AM
Not with OSS smiley  Which is why I lean towards that for free software that I'm really going to integrate into my workflow.

You're probably a better coder than I'll ever be. There are several OSS products I depend on that I'd be forced to abandon unless somebody else continues to maintain them. Because I certainly couldn't. And also why I send them a check.

Having source available is all well and good. In theory. But unless you have the chops to maintain and develop it yourself - or the money to single-handedly fund ongoing work on it - once the project's dev team quits the field you’re up the proverbial creek. Or at least I'd mostly be. Grin YMMV Wink
319  Main Area and Open Discussion / Living Room / Re: TrueCrypt is Now Abandonware?! on: May 30, 2014, 10:15:44 AM
How long before this is forked?  I mean, the source *was* available, right?

As previously mentioned, TC was never released under a standard FOSS license. And that license has since been changed. The new license makes no provision for using any part of TC's code (which is available) in (or for) something else. Most lawyers think TC cannot be legally forked given the license it's under.

Such is the danger of taking the label "free open-source software" as read without looking into the actual license that applies. Anybody can call anything a FOSS project without incurring any legal obligation or liability. And many individuals and companies (including Microsoft and Oracle) routinely use the word "open" to mislead and muddy up the waters.

Caveat emptor! And beware of geeks bearing gifts. tellme
320  Main Area and Open Discussion / Living Room / Re: TrueCrypt is Now Abandonware?! on: May 30, 2014, 10:05:01 AM
I lost the race to 40hz  tongue

I probably only had the jump because I've had clients all in a tizzy start e-mailing me about this beginning at 5:00 this morning -  so I've had time to go look.  Grin

I can't sympathize too much with their moaning. Much as I like TrueCrypt, I've warned them repeatedly to be cautious about deploying or depending on it since (a) AFAIK nobody really knows who's behind it; and (b) it's a 'free' product - and sometimes free products just disappear without warning leaving you high and dry.

Guess I was right on both points. huh

I hate it when that happens. Wink
321  Main Area and Open Discussion / Living Room / Re: TrueCrypt is Now Abandonware?! on: May 30, 2014, 09:49:20 AM
So... anyone have a spare copy of an earlier version lying around?  Redoing my computer, and realized that I didn't keep a copy...


Filehippo.com still shows older pre-7.2 versions available from them for download although I don't know if these versions have already been 'new' disabled or how long they'll remain up. Better jump on it and check. All the other major download sites I looked at are showing version 7.2 only.
322  Main Area and Open Discussion / Non-Windows Software / Re: *NIX: Unexpected Behavior of HDD (internal VS enclosure?) on: May 30, 2014, 08:10:47 AM
Is it possible that the different brands commandeer small amounts of disk space for scratchpad use, log files, caching or writing a few small data files for the controller's reference when running internal checks or diagnostics? That might account for the small discrepancies between different units.  

Different brands may also introduce small patches to the drive to optimize USB performance with the enclosure.

Or maybe it's all just more NSA spookware.  Grin tongue
323  Main Area and Open Discussion / Living Room / Re: TrueCrypt is Now Abandonware?! on: May 30, 2014, 07:49:26 AM
I'm guessing somebody hired them. Hence the abrupt cessation with no advance warning or details given.  

Forking in the usual sense isn't possible. Truecrypt has its own somewhat ambiguous license which is most assuredly not written in the spirit of the GPL. The FSF has disputed TC's characterization of itself as a "free open source" project for some time now. And with the recent news it's been noted that the license has also been changed so that all "attribution" language has been removed. Since that language also spoke of derivative works, the right to do derivatives or incorporate TC into another product (in exchange for attribution to TC) also appears to no longer apply - hence: no fork. Legal opinion seems to concur that TC's code cannot be forked or incorporated in something else under the current licensing language.  

Expect a commercial product release in the near future.
324  Main Area and Open Discussion / Living Room / Re: silly humor - post 'em here! [warning some NSFW and adult content] on: May 29, 2014, 08:45:40 PM
I'm really starting to like Mark Twain ^

If you like him, check out Ambrose Bierce and his Devil's Dictionary.

A few examples:

, n. Exemption from the stress of authority in a beggarly half dozen of restraint's infinite multitude of methods. A political condition that every nation supposes itself to enjoy in virtual monopoly. Liberty. The distinction between freedom and liberty is not accurately known; naturalists have never been able to find a living specimen of either.

FRIENDLESS, adj. Having no favors to bestow. Destitute of fortune. Addicted to utterance of truth and common sense.

GENEROUS, adj. Originally this word meant noble by birth and was rightly applied to a great multitude of persons. It now means noble by nature and is taking a bit of a rest.

HAPPINESS, n. An agreeable sensation arising from contemplating the misery of another.

HASH, x. There is no definition for this word—nobody knows what hash is.

HIPPOGRIFF, n. An animal (now extinct) which was half horse and half griffin. The griffin was itself a compound creature, half lion and half eagle. The hippogriff was actually, therefore, a one-quarter eagle, which is two dollars and fifty cents in gold. The study of zoology is full of surprises.

HYPOCRITE, n. One who, professing virtues that he does not respect secures the advantage of seeming to be what he despises.

IGNORAMUS, n. A person unacquainted with certain kinds of knowledge familiar to yourself, and having certain other kinds that you know nothing about.

IMPUNITY, n. Wealth.

JUSTICE, n. A commodity which is a more or less adulterated condition the State sells to the citizen as a reward for his allegiance, taxes and personal service.

IMPARTIAL, adj. Unable to perceive any promise of personal advantage from espousing either side of a controversy or adopting either of two conflicting opinions.

LIBERTY, n. One of Imagination's most precious possessions.

ALLIANCE, n. In international politics, the union of two thieves who have their hands so deeply inserted in each other's pockets that they cannot separately plunder a third.

Awesome stuff. First appearing in bits and pieces around 1887, and in complete book form in 1906,  it's amazing how spot-on so much of it remains.


Bierce is also numbered among the finest of early horror and macabre fiction writers, taking his place with the likes of Arthur Machen and H.P. Lovecraft. A good deal of Ambrose Bierce can be found on Project Gutenberg. Author page is here.
325  Main Area and Open Discussion / Living Room / Re: TrueCrypt is Now Abandonware?! on: May 29, 2014, 05:23:26 PM
Looks like whatever happened, TrueCrypt really is gone - as in 'game over.'

From the folks at LinuxBSDos.com comes this. (Emphasis added.)

Is TrueCrypt dead?
in news & announcements / on May 29, 2014 at 5:29 am /

Based on the wording of its license, there was always a question mark surrounding the open source-ness of Truecrypt. But that’s not the topic of this brief article. What prompted me to write this is an article that appeared in the Washington Post suggesting that TrueCrypt may have seen its last days as an (“open source”) software project.

TrueCrypt was a cross-platform (Linux, Mac OS X, and Windows) disk encryption software. The last article I wrote about it on this website was Should Truecrypt be audited?.

A quick trip to the project’s website, or what used to be the project’s website, confirmed the gist of the Washington Post article. If you try to visit http://truecrypt, you’ll actually be redirected to http://truecrypt.sourceforge.net. And the only conclusion that I can draw by looking at the contents of the website is that TrueCrypt is dead. Microsoft Windows users are encouraged to migrate to BitLocker, that operating system’s disk encryption utility, while Linux users are encouraged to “use any integrated support for encryption.” The latest download links are only for users “migrating data encrypted by TrueCrypt.” That really seals it. You cannot encrypt a disk using the latest version of TrueCrypt, only decrypt.

"Curiouser and curiouser," said Alice.

Pages: Prev 1 ... 8 9 10 11 12 [13] 14 15 16 17 18 ... 413 Next
DonationCoder.com | About Us
DonationCoder.com Forum | Powered by SMF
[ Page time: 0.061s | Server load: 0.16 ]