I just installed veracrypt and started to encrypt in place my 5400 rpm 4tb partition loaded with data. It said "6 days" and I said "oh hell no". (task manager/resource monitor says that the drive is being hit for 11 MB/s read + 11 MB/s write for a total of 22 MB/s. I'm using only AES). I hit defer, try to permanently decrypt, entered password, and got this error. If I try to resume encrypting, it works fine. Help would be greatly appreciated (I don't got days to wait).
Update:
I installed the latest beta, rebooted, and the decryption process started. Sorry for hijacking the thread, but maybe I provided a clue. I'm disappointed that veracrypt didn't work out for me. I dislike the thought of upgrading to pro just to use bitlocker (backdoorlocker?). I'll probably backup my data and encrypt an empty drive (which i will oddly be faster than encryption in place?), but right now I'm recovering from quite a scare (setting up new laptop while traveling put me in awkward place).
The encryption of my hdd was interrupted at the beginning because the hdd's power connector was a bit loose for a second but it continued normally after I connected the power source correctly. Could it be that this is why I can not mount it anymore?
(sorry for overtaking this thread here)
This post comments on security vulnerabilities in 7-Zip, to illustrate the difference between myth and reality pertaining to open source code. As indicated in updates involving 7-Zip and VeraCrypt (below), the specific problem may be more worrisome at some times and less worrisome at others. But the general problem lives on.
There have been other vulnerabilities since then. For example, the Center for Internet Security, 2018) identified a high risk that 7-Zip could allow for arbitrary code execution, and Born (2018) complained that Pavlov had refused, for years, to take badly needed measures to make his code more secure. A StackExchange Information Security discussion (2019) likewise provided links discussing other security bugs in 7-Zip. In one of those links, Stanek (2019) was brutal:
That may be why one comment, in response to my posted question, recommended using VeraCrypt: it had been subjected to relatively stringent third-party audits. To my knowledge, VeraCrypt was useful only for encrypting containers and partitions, not individual files. But the belief in the importance of auditing did say something about simply trusting the wisdom of the open source crowd.
Here, again, we have a problem with the belief that thousands of coders are scrutinizing the code, even for a tool as important as VeraCrypt. Aside from primary developer Mounir Idrassi, no white-hat coders are engaged with VeraCrypt on the detailed and persistent level required for comprehensive awareness and improvement of the code. Idrassi himself is plainly buried, as indicated in his January 2022 comments in a VeraCrypt forum, responding to the German audit:
There are many skilled developers out there who can help on various topics but doing open source work is not always something they are willing to do and for those who are into open source they are often committed to other projects. As for trust, of course one must always be careful when receiving code from unknown parties but the risks are mitigated through careful reviews and a lot of testing and validation.
One may ask: in this day and age, why would advanced coders present the world with 30MB of unexplained code? Was this their ordinary style, or was this rather a deliberate attempt to obscure certain functionality within that impenetrable mess?
You should be aware that this repo is not related to the software developer and because of it you can't be 100% sure what you install or update in future. However Unit 193 is Xubuntu developer and he is well known in open source community. This is enough for me to sleep well.
To remedy this situation, I created a Dockerfile called docker-build-veracrypt which generates a reproducible build of the VeraCrypt executable, directly from the publicly available source code of VeraCrypt and wxWidgets on GitHub. You have the following options:
TrueCrypt's code was audited and VeraCrypt fixed the security issues found by researchers during the audit. The developers of VeraCrypt implemented additional safeguards and improvements in the program, for instance by increasing the number of iterations significantly to make brute force attacks more difficult.
Yes. Also, ironically enough, pretty much all current version of MacFUSE are forked from a GitHub project that I created many years ago. I didn't write MacFUSE. I was just a heavy user of it circa 2009 or so. I though it was a really cool idea, but it had been abandoned. So I made a fork with plans to re-develop it. But I took one look at the source code and decided that would be a bad idea. Later I tried to write some other apps using a home-grown alternative based on Apple's WebDAV. But it turned out that Apple's WebDAV was also junk. Here is a little history article about MacFUSE: _macos_closed_source/
Ah! Trying to roll your own steganography system, eh? While routing all of the data through a now closed-source data transfer layer? My statements above are based entirely on technical issues relating to lack of support, lack of documentation, code quality, and the changing landscape of security and economics in the Mac software marketplace. It's really not a good idea to use MacFUSE for this. But even a cursory glance at the history of VeraCrypt is scary. If you think any forensics people would be fooled by that JPEG file, then you're in deep trouble.
VeraCrypt is developed by French company IDRIX, though its code is heavily based on the abandoned project TrueCrypt. For technical support, your first port of call is the VeraCrypt forums on SourceForge, which has thousands of topics of discussion and a ticketing system.
BitLocker is slightly easier to use than VeraCrypt because it's seamlessly built into the operating system. But VeraCrypt offers many more features than BitLocker, such as file-based virtual encrypted disks and a selection of strong encryption protocols. VeraCrypt is also cross-platform and the source code is available so you can be sure there are no hidden backdoors.
Open-source code is the only guarantee we have against this kind of nefarious behavior. Only if a program can be freely examined to ensure it does what it is supposed to (and only what it is supposed to) can we place a reasonable amount of confidence in it.
Of course, we can place even more confidence in a program that's been audited by a reputable third-party. This isn't a foolproof tactic, however, as code can always be changed the moment the auditors leave the building. So, simply being able to audit the code is the surest guarantee possible that any encryption program is secure.
As such, VeraCrypt is widely regarded in the security world as the go-to open-source full-disk encryption program. It allows you to create a virtual encrypted disk (volume) which you can mount and use just like a real disk. Or it can even be used to encrypt an entire disk partition or storage device (e.g. a hard drive or USB stick), including the drive your Operating System boots from.
AES Crypt is a free open source (FOSS) cross-platform per-file encryption app which secures files using the AES-256 cipher. As a per-file encryption app, it allows you to manually encrypt individual files. Batch file encryption is not supported, although this limitation can be overcome somewhat by creating zip files out of folders, and then encrypting the zip file with AES Crypt.
Like AES-Crypt, AxCrypt is an open-source cross-platform per-file encryption app which secures files using AES. It is, however, a quite different beast. It comes in a free version aimed mainly at Windows users and a premium version, which costs $35 USD per year (30-day free trial).
VeraCrypt is a beacon in the digital security landscape, offering robust encryption solutions for those keen to protect their data. Understanding its capabilities and features is crucial for those aiming to install VeraCrypt on Ubuntu 22.04 Jammy Jellyfish or its older stable release Ubuntu 20.04 Focal Fossa. This software, an evolution of TrueCrypt 7.1a, is an open-source disk encryption tool designed to create encrypted virtual disks, partitions, or even encrypt an entire storage device.
Given these compelling attributes, VeraCrypt is an indispensable tool for Ubuntu users prioritizing data security. Whether safeguarding business data, journalistic sources, or personal information, VeraCrypt delivers unparalleled encryption strength.
This command tells APT to fetch the VeraCrypt package from its sources (which now includes the VeraCrypt PPA) and install it on your system. The -y flag automatically confirms any prompts that may appear during the installation process.
VeraCrypt is free and open source, and it always will be. The code is routinely audited by independent researchers. Because it is, at its core, very similar to TrueCrypt, audits of the original software still apply to VeraCrypt.
TrueCrypt's dramatic shutdown in May, 2014 left everyone shocked. TrueCrypt was the go-to recommendation for full-disk encryption software, and the developers suddenly said the code was "not secure" and halted development.
Yes, TrueCrypt development was officially halted and its official downloads page was taken down. The developers have made statements saying they're not longer interested in the code, and that third-party developers can't be trusted to maintain and patch it properly.
However, the Gibson Research Corporation argues TrueCrypt is still safe to use. TrueCrypt 7.1a is the last real version, released in February, 2012 and used by millions of people since then. TrueCrypt's open-source code is currently undergoing an independent audit -- work that started before the abrupt shutdown -- and Phase 1 of the audit has been completed without any big problems being found. TrueCrypt is the only software package to ever undergo an independent audit like this one. When it's finished, any problems found can be patched by the community in a new fork of the TrueCrypt code and TrueCrypt can continue. TrueCrypt's code is open-source, which means even the original developers don't have the ability to stop it from continuing. That's the Gibson Research Corporation's argument, anyway. Others, such as the non-profit Committee To Protect Journalists, also advise that the TrueCrypt code is still safe to use.
35fe9a5643