<div dir="ltr"><div class="gmail_default" style="font-family:tahoma,sans-serif">VeraCrypt is fork which continue the TrueCrypt legacy, <br>TrueCrypt had some audit (crowd source founded) on the encryption part (algorithm and stuff), the boot loader, and the windows kernel driver (IIRC). <br><br></div><div class="gmail_default" style="font-family:tahoma,sans-serif">they found few vulnerabilities at first (3 I think), but nothing critical, and they were patched in VeraCrypt.<br><br></div><div class="gmail_default" style="font-family:tahoma,sans-serif">next was a bug in the windows driver which allowed a user/process to gain SYSTEM privileges.<br></div><div class="gmail_default" style="font-family:tahoma,sans-serif">which also was patched.<br></div><div class="gmail_default" style="font-family:tahoma,sans-serif"><br></div><div class="gmail_default" style="font-family:tahoma,sans-serif"><br><br></div><div class="gmail_default" style="font-family:tahoma,sans-serif"><br></div><div class="gmail_extra"><br clear="all"><div><div class="gmail_signature"><div dir="ltr"><span style="font-family:tahoma,sans-serif">--<br>Rabin</span></div></div></div>
<br><div class="gmail_quote">On 17 November 2015 at 12:51, Erez D <span dir="ltr"><<a href="mailto:erez0001@gmail.com" target="_blank">erez0001@gmail.com</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div dir="ltr"><br><div class="gmail_extra"><br><div class="gmail_quote">On Tue, Nov 17, 2015 at 12:35 PM, Rabin Yasharzadehe <span dir="ltr"><<a href="mailto:rabin@rabin.io" target="_blank">rabin@rabin.io</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex"><div dir="ltr"><div style="font-family:tahoma,sans-serif">TrueCrypt ? <br></div></div></blockquote><div>just reading about it ;-)<br></div><div>however it is unmaintained (should i use veracrypt ? no audit done on it,)<br></div><div>and i do not need all this functionality<br><br></div><div>what i liked about ecryptfs is that it is the default ubuntu encryption (which raise my trust in it), and that it encrypts file by file rather than volume (which better fits to running it over dropbox or gdrive) </div><span class=""><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex"><div dir="ltr"><div style="font-family:tahoma,sans-serif"></div></div><div class="gmail_extra"><br clear="all"><div><div><div dir="ltr"><span style="font-family:tahoma,sans-serif">--<br>Rabin</span></div></div></div>
<br><div class="gmail_quote"><div><div>On 17 November 2015 at 11:27, Erez D <span dir="ltr"><<a href="mailto:erez0001@gmail.com" target="_blank">erez0001@gmail.com</a>></span> wrote:<br></div></div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex"><div><div><div dir="ltr"><div><div><div><div><div><div><div><div>Hello<br><br></div>It is very nice to hold some data on the cloud accessible from everywhere<br></div>however if i do not want the cloud to have access to it, it requires encryption<br><br></div>i could mount gdrive, dropbox or other cloud fs localy<br></div>and mount ecryptfs on it so i have transparent encryption<br><br></div>my only problem is that it works on linux only<br><br></div>does anyone knows a way of having a portable transparent encryption <br></div>which will support linux, and windows ? <br></div>(would be nice if it will also support android (even if i can not insmod) and ios)<br><br></div>
<br></div></div>_______________________________________________<br>
Linux-il mailing list<br>
<a href="mailto:Linux-il@cs.huji.ac.il" target="_blank">Linux-il@cs.huji.ac.il</a><br>
<a href="http://mailman.cs.huji.ac.il/mailman/listinfo/linux-il" rel="noreferrer" target="_blank">http://mailman.cs.huji.ac.il/mailman/listinfo/linux-il</a><br>
<br></blockquote></div><br></div>
</blockquote></span></div><br></div></div>
</blockquote></div><br></div></div>