{"id":3321,"date":"2014-06-10T22:00:38","date_gmt":"2014-06-10T22:00:38","guid":{"rendered":"http:\/\/www.backupassist.com\/blog\/?p=3321"},"modified":"2019-11-19T02:44:04","modified_gmt":"2019-11-19T02:44:04","slug":"truecrypt-encryption-and-backupassist-recommendations","status":"publish","type":"post","link":"https:\/\/www.backupassist.com\/blog\/truecrypt-encryption-and-backupassist-recommendations","title":{"rendered":"TrueCrypt Encryption &amp; BackupAssist &#8211; Recommendations"},"content":{"rendered":"<p>TrueCrypt recently announced that <em>\u201cUsing TrueCrypt is not secure as it may contain unfixed security issues\u201d<\/em>.&nbsp; We have been carefully researching the situation to provide appropriate information to our customers concerning this piece of news.<\/p>\n<p><!--more--><\/p>\n<p>An independent audit published by iSEC has not identified any security flaws in TrueCrypt.&nbsp; <em>&#8220;iSEC found no evidence of backdoors or intentional flaws.&#8221;<\/em>&nbsp;&nbsp;You can follow this link to learn more about the&nbsp;<a href=\"https:\/\/isecpartners.github.io\/news\/2014\/04\/14\/iSEC-Completes-Truecrypt-Audit.html\" target=\"_blank\" rel=\"noopener noreferrer\">iSEC partner\u2019s TrueCrypt audit<\/a>.<\/p>\n<p>The most important fact to understand is that the TrueCrypt developers are no longer developing the software. Without active development, vulnerabilities may creep into the software. What this means is that you may want to consider alternative means of encryption for your backups. &nbsp;While TrueCrypt may be secure now (as all available information we&#8217;ve seen has indicated), it may not remain secure in the future.<\/p>\n<p>BackupAssist includes TrueCrypt as the encryption option for its File Protection backups. If you require encryption and do not want to use TrueCrypt, two alternative encryption solutions are described below:<\/p>\n<ul>\n<li style=\"margin-bottom: 10px\">&nbsp;Firstly you could change from File Protection to BackupAssist File Archiving, which uses industry strength encryption without relying on TrueCrypt. You can read our <a href=\"http:\/\/www.backupassist.com\/downloads\/whitepapers\/file_archiving_whitepaper.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">File Archiving documentation<\/a> for more information.<\/li>\n<li>&nbsp;Alternatively you could disable encryption in your File Protection job, and instead utilize the built-in encryption capabilities of BitLocker on Windows systems.For more information about using BitLocker with BackupAssist, please review our <a href=\"http:\/\/www.backupassist.com\/blog\/support\/encryption-part-3-bitlocker-and-backupassist\" target=\"_blank\" rel=\"noopener noreferrer\">BitLocker blog article.<\/a><\/li>\n<\/ul>\n<p>Be assured, we are also looking at other alternative encryption methods and these&nbsp;will be introduced within BackupAssist in the near future.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>TrueCrypt recently announced that \u201cUsing TrueCrypt is not secure as it may contain unfixed security issues\u201d.&nbsp; We have been carefully researching the situation to provide appropriate information to our customers concerning this piece of news.<\/p>\n","protected":false},"author":13,"featured_media":13831,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[23,3,760],"tags":[33,60],"class_list":["post-3321","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","category-support","category-legacy","tag-encryption","tag-truecrypt"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TrueCrypt Encryption and BackupAssist | Recommendations<\/title>\n<meta name=\"description\" content=\"TrueCrypt recently announced that they are no longer developing their encryption software: what this news means and the options available for BackupAssist.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.backupassist.com\/blog\/truecrypt-encryption-and-backupassist-recommendations\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"TrueCrypt Encryption and BackupAssist | Recommendations\" \/>\n<meta property=\"og:description\" content=\"TrueCrypt recently announced that they are no longer developing their encryption software: what this news means and the options available for BackupAssist.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.backupassist.com\/blog\/truecrypt-encryption-and-backupassist-recommendations\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Resilience Blog\" \/>\n<meta property=\"article:published_time\" content=\"2014-06-10T22:00:38+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-11-19T02:44:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2008\/05\/tile-placeholder1-01.png\" \/>\n\t<meta property=\"og:image:width\" content=\"842\" \/>\n\t<meta property=\"og:image:height\" content=\"596\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Rick Dwyer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Rick Dwyer\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/truecrypt-encryption-and-backupassist-recommendations#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/truecrypt-encryption-and-backupassist-recommendations\"},\"author\":{\"name\":\"Rick Dwyer\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/84edd561512d93c57e38a6d3d922cf61\"},\"headline\":\"TrueCrypt Encryption &amp; BackupAssist &#8211; Recommendations\",\"datePublished\":\"2014-06-10T22:00:38+00:00\",\"dateModified\":\"2019-11-19T02:44:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/truecrypt-encryption-and-backupassist-recommendations\"},\"wordCount\":271,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/truecrypt-encryption-and-backupassist-recommendations#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2008\/05\/tile-placeholder1-01.png\",\"keywords\":[\"encryption\",\"TrueCrypt\"],\"articleSection\":[\"News\",\"Support\",\"Z-Legacy\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.backupassist.com\/blog\/truecrypt-encryption-and-backupassist-recommendations#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/truecrypt-encryption-and-backupassist-recommendations\",\"url\":\"https:\/\/www.backupassist.com\/blog\/truecrypt-encryption-and-backupassist-recommendations\",\"name\":\"TrueCrypt Encryption and BackupAssist | Recommendations\",\"isPartOf\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/truecrypt-encryption-and-backupassist-recommendations#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/truecrypt-encryption-and-backupassist-recommendations#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2008\/05\/tile-placeholder1-01.png\",\"datePublished\":\"2014-06-10T22:00:38+00:00\",\"dateModified\":\"2019-11-19T02:44:04+00:00\",\"description\":\"TrueCrypt recently announced that they are no longer developing their encryption software: what this news means and the options available for BackupAssist.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/truecrypt-encryption-and-backupassist-recommendations#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.backupassist.com\/blog\/truecrypt-encryption-and-backupassist-recommendations\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/truecrypt-encryption-and-backupassist-recommendations#primaryimage\",\"url\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2008\/05\/tile-placeholder1-01.png\",\"contentUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2008\/05\/tile-placeholder1-01.png\",\"width\":842,\"height\":596},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/truecrypt-encryption-and-backupassist-recommendations#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.backupassist.com\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"TrueCrypt Encryption &amp; BackupAssist &#8211; Recommendations\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#website\",\"url\":\"https:\/\/www.backupassist.com\/blog\/\",\"name\":\"Cyber Resilience Blog\",\"description\":\"Protect Your Cloud Data with BackupAssist\",\"publisher\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.backupassist.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\",\"name\":\"Cyber Resilience Blog\",\"url\":\"https:\/\/www.backupassist.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg\",\"contentUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg\",\"caption\":\"Cyber Resilience Blog\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/84edd561512d93c57e38a6d3d922cf61\",\"name\":\"Rick Dwyer\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/47a03fa1c7e7a827dcafbdeac92810855877677d38b47fb3f3039f28b463663a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/47a03fa1c7e7a827dcafbdeac92810855877677d38b47fb3f3039f28b463663a?s=96&d=mm&r=g\",\"caption\":\"Rick Dwyer\"},\"url\":\"https:\/\/www.backupassist.com\/blog\/author\/rick-dwyer\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TrueCrypt Encryption and BackupAssist | Recommendations","description":"TrueCrypt recently announced that they are no longer developing their encryption software: what this news means and the options available for BackupAssist.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.backupassist.com\/blog\/truecrypt-encryption-and-backupassist-recommendations","og_locale":"en_US","og_type":"article","og_title":"TrueCrypt Encryption and BackupAssist | Recommendations","og_description":"TrueCrypt recently announced that they are no longer developing their encryption software: what this news means and the options available for BackupAssist.","og_url":"https:\/\/www.backupassist.com\/blog\/truecrypt-encryption-and-backupassist-recommendations","og_site_name":"Cyber Resilience Blog","article_published_time":"2014-06-10T22:00:38+00:00","article_modified_time":"2019-11-19T02:44:04+00:00","og_image":[{"width":842,"height":596,"url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2008\/05\/tile-placeholder1-01.png","type":"image\/png"}],"author":"Rick Dwyer","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Rick Dwyer","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.backupassist.com\/blog\/truecrypt-encryption-and-backupassist-recommendations#article","isPartOf":{"@id":"https:\/\/www.backupassist.com\/blog\/truecrypt-encryption-and-backupassist-recommendations"},"author":{"name":"Rick Dwyer","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/84edd561512d93c57e38a6d3d922cf61"},"headline":"TrueCrypt Encryption &amp; BackupAssist &#8211; Recommendations","datePublished":"2014-06-10T22:00:38+00:00","dateModified":"2019-11-19T02:44:04+00:00","mainEntityOfPage":{"@id":"https:\/\/www.backupassist.com\/blog\/truecrypt-encryption-and-backupassist-recommendations"},"wordCount":271,"commentCount":0,"publisher":{"@id":"https:\/\/www.backupassist.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/truecrypt-encryption-and-backupassist-recommendations#primaryimage"},"thumbnailUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2008\/05\/tile-placeholder1-01.png","keywords":["encryption","TrueCrypt"],"articleSection":["News","Support","Z-Legacy"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.backupassist.com\/blog\/truecrypt-encryption-and-backupassist-recommendations#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.backupassist.com\/blog\/truecrypt-encryption-and-backupassist-recommendations","url":"https:\/\/www.backupassist.com\/blog\/truecrypt-encryption-and-backupassist-recommendations","name":"TrueCrypt Encryption and BackupAssist | Recommendations","isPartOf":{"@id":"https:\/\/www.backupassist.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.backupassist.com\/blog\/truecrypt-encryption-and-backupassist-recommendations#primaryimage"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/truecrypt-encryption-and-backupassist-recommendations#primaryimage"},"thumbnailUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2008\/05\/tile-placeholder1-01.png","datePublished":"2014-06-10T22:00:38+00:00","dateModified":"2019-11-19T02:44:04+00:00","description":"TrueCrypt recently announced that they are no longer developing their encryption software: what this news means and the options available for BackupAssist.","breadcrumb":{"@id":"https:\/\/www.backupassist.com\/blog\/truecrypt-encryption-and-backupassist-recommendations#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.backupassist.com\/blog\/truecrypt-encryption-and-backupassist-recommendations"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/truecrypt-encryption-and-backupassist-recommendations#primaryimage","url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2008\/05\/tile-placeholder1-01.png","contentUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2008\/05\/tile-placeholder1-01.png","width":842,"height":596},{"@type":"BreadcrumbList","@id":"https:\/\/www.backupassist.com\/blog\/truecrypt-encryption-and-backupassist-recommendations#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.backupassist.com\/blog"},{"@type":"ListItem","position":2,"name":"TrueCrypt Encryption &amp; BackupAssist &#8211; Recommendations"}]},{"@type":"WebSite","@id":"https:\/\/www.backupassist.com\/blog\/#website","url":"https:\/\/www.backupassist.com\/blog\/","name":"Cyber Resilience Blog","description":"Protect Your Cloud Data with BackupAssist","publisher":{"@id":"https:\/\/www.backupassist.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.backupassist.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.backupassist.com\/blog\/#organization","name":"Cyber Resilience Blog","url":"https:\/\/www.backupassist.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg","contentUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg","caption":"Cyber Resilience Blog"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/84edd561512d93c57e38a6d3d922cf61","name":"Rick Dwyer","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/47a03fa1c7e7a827dcafbdeac92810855877677d38b47fb3f3039f28b463663a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/47a03fa1c7e7a827dcafbdeac92810855877677d38b47fb3f3039f28b463663a?s=96&d=mm&r=g","caption":"Rick Dwyer"},"url":"https:\/\/www.backupassist.com\/blog\/author\/rick-dwyer"}]}},"_links":{"self":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/3321","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/comments?post=3321"}],"version-history":[{"count":2,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/3321\/revisions"}],"predecessor-version":[{"id":14206,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/3321\/revisions\/14206"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/media\/13831"}],"wp:attachment":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/media?parent=3321"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/categories?post=3321"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/tags?post=3321"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}