This project has moved. For the latest updates, please go here.

I did VeraCrypt AUDIT. Stay away from it!! Not recomended to use this

Topics: Technical Issues, Users Discussion
Aug 17, 2016 at 5:39 AM
I analyzed if I can use VERACRYPT full system encryption. It turns out to be shit, DO NOT USE IT !!!
Here is list of issues:
  1. It is unable to encrypt entire computer, because it doesn't support extended partitions. So there is no way to do full disk encryption.
  2. Additionaly, it can't encrypt non-system partitions in place (even non-extended, but primary ones).
  3. They are shills (or dumb ignorants) that enabled AES hardware acceleration by default. What's the point of million iterations and 100 character passwords when your jewish backdoored INTEL cpu is storing your key in special cpu area, and then allows NSA to just read it from there? Maybe it's even possible to read it through internet, by using Intel Active Management Technology.
  4. It's forum is hosted on Microsoft's site (codeplex).
  5. Insanely slow boot time & password check. Truecrypt used only 1000 iterations yet was secure (that might be too low in future). Why increasing to fucking half millions iterations?
  6. They are totalitarian, not allowing you to choose iterations count. Instead forcing you to stupid 5 minute boot time. And dumb idiots already trying to make fork of fork... https://sourceforge.net/p/veracrypt/discussion/technical/thread/77d58591/?page=1
  7. They lie about OS they support. Some of OS they claim to support, they don't in fact.
  8. They are against freedom of speech, as all open sourcers. They don't allow this post to be posted on their forums.
  9. They are unstable open source idiots (like all open sourcers are). I'm scared of trusting them. They don't care about user needs since they are open source and you don't pay them. But because of that, it's also easy to bribe them to put backdoors.
  10. No ability to encrypt files or folders (like EncFS). You either choose full partition encryption or stupid fixed-size containers (mounted as hard drive).
  11. No option to auto-dismount devices or files (TrueCrypt has it). What's the point of encryption if they can just get your PC while it's running and have all your keys in RAM?
  12. It is also extremely slow at system encryption: https://www.reddit.com/r/VeraCrypt/comments/4s2za9/is_it_normal_for_it_to_take_11_hours_to_generate/
Aug 17, 2016 at 7:12 AM
This is not an "audit".
You're just posting silly, paranoid rants of a 14 year old, sprinkled with anti-semitism.
Please never post here again and use different software.
Aug 17, 2016 at 8:39 AM
@microsof_shill It's seems that you can't read the Wiki nor FAQ of Veracrypt.
Many features you listed, exist (Like Auto-Dismount).
Also, Veracrypt is also hosted on SourceForge and GitHub.

And stop claiming something you can't/don't want to prove.
And as you see, your post exists. But with lies it won't exist long.

As @severeship said, you don't seem to know what an 'audit' is.
When you don't like open source projects, then use closed source where you can't check the source code and will probably be affected from backdoors and security issues.
Developer
Aug 17, 2016 at 12:38 PM
Thank you for the replay.

If you do not trust Intel AES it is possible to use Russian GOST89 or Japan Camellia.

If you have possibility to perform audit of sources welcome to check it at SourceForge and GitHub
Aug 17, 2016 at 1:11 PM
How long you been smoking that stuff, OP?