looks a little too russian in the last entry to pass as true [1]http://pgp.mit.edu/pks/lookup?op=vindex&search=0xE3BA73CAF0D6B1E0 On Thu, May 29, 2014 at 1:33 AM, Juan <[2]juan.g71@gmail.com> wrote: On Wed, 28 May 2014 19:45:06 -0400 Griffin Boyce <[3]griffin@cryptolab.net> wrote: > My suspicion is that either they were hacked (and had their key > stolen), or that they were ordered to shutdown and recommend > Microsoft's (presumably backdoored) BitLocker as a replacement. [4]truecrypt.org redirects to this [5]http://truecrypt.sourceforge.net/ Pretty crazy. Whoever the developers may be, after spending a good deal of effort on their project, now are licking MS' boots? It doesn't make sense. > BitLocker's enterprise documentation makes me *incredibly* suspicious > that it is susceptible to monitoring by third-parties. > > Even being embarrassed by whatever bugs the second phase audit > uncovered wouldn't explain the sudden recommendation. And why not > ecryptfs or ~literally anything else~ ? > > Pardon my tinfoil hat. > > ~Griffin -- Cari Machet NYC 646-436-7795 [6]carimachet@gmail.com AIM carismachet Syria +963-099 277 3243 Amman +962 077 636 9407 Berlin +49 152 11779219 Reykjavik +354 894 8650 Twitter: @carimachet <[7]https://twitter.com/carimachet> 7035 690E 5E47 41D4 B0E5 B3D1 AF90 49D6 BE09 2187 Ruh-roh, this is now necessary: This email is intended only for the addressee(s) and may contain confidential information. If you are not the intended recipient, you are hereby notified that any use of this information, dissemination, distribution, or copying of this email without permission is strictly prohibited. References 1. http://pgp.mit.edu/pks/lookup?op=vindex&search=0xE3BA73CAF0D6B1E0 2. mailto:juan.g71@gmail.com 3. mailto:griffin@cryptolab.net 4. http://truecrypt.org/ 5. http://truecrypt.sourceforge.net/ 6. mailto:carimachet@gmail.com 7. https://twitter.com/carimachet