Latest news that went viral is the crucial identification of the two recent flaws which are thought to be affecting the True Crypt which is a disk encryption software program in reality. It has actually being identified by the world’s one of the most efficient research team- Project Zero which falls under a Google team that do bugs research. However, as per the main computer security researcher Mr. James Forshaw, the flaws that are being actually identified are not falling under the category of the cryptographic. Yes! It means that the flaws cannot be used directly in order to decrypt a following disk or device as they are ought to provide certain user security problems.
Reporters were also informed about the development of the True Crypt which is a known to be a free cross-platform and a disk encrypted tool that has been actually recommended to the journalists so as to protect the important data which came to an end by the May last year. Yet the news of fixing the two flaws came into the market from the developers of a completely independent forked or spinoff project known as Vera Crypt spreads throughout.
The emerge of this certainly famous Vera Crypt is due to the maintenance of the so called True Crypt codebase and also in order to continue the updation of the software’s code and the fixation of the bugs.
However, it is also been reported officially that users having a rely on the cross platform of the True Crypt capabilities, that is to run in a virtual machine which is basically a software acting like a separate computer device may help in the prevention of the flaws exposure. Otherwise the Vera Crypt is an alternate option for the users.
But it isn’t of any amusement to identify the flaws in the True Crypt as it isn’t the 1st time for it. Although it is been used widely yet due to the lack of the security updates maintainers, it will turn to be the last.
In addition to it comes the Vera Crypt, where the CJP has not yet been able to evaluate the actually reliability or the security and thus no solution is without a less risk as to say. Still it will be better to say that certain possible things are riskier than not using the encryption at all.
However, it is a must recommendation from the CJP to use the encryption that comes along with the system device or operating system. And the most important thing is to remember the use of the PIN.