
Switch to 256-bit BEFORE encrypting your hard drive. Once you upload your recovery key once, it is already archived according to Snowden documents.ĭisable using recovery PIN, and use USB recovery key only (as the the former is 128 bit only). "Microsoft Account", Dropbox, Google Drive, etc.), as it is by default shared with NSA which can access it based on who knows what creative national business safety reasons. This is difficult, as you should:ĭisable uploading recovery keys to the Internet (e.g. For example, with cloud services such as Dropbox which track change history.īitLocker is safe if properly configured. TrueCrypt XTS mode is worse when an attacker can observe small file changes several thousands of times. This may have been improved or fixed in VeraCrypt (TrueCrypt's successor). Then again, if you look at TrueCrypt, it has pitfalls like keyfile management, which is prone to grabbing precomputed CRC32 from your files in order to speed up hashing (keyfile management in TrueCrypt is very badly implemented). One can assume there are no major backdoors because companies want professional protection.
Veracrypt vs bitlocker code#
I would assume that basic algorithms of BitLocker are safe because its source code has been reviewed under Non-Disclosure Agreement (NDA) by large companies that use it.

Veracrypt vs bitlocker windows 10#
However, Windows 10 improves security by allowing the use of AES-XTS (though not turned on by default). See XTS vs AES-CBC with ESSIV for file-based filesystem encryptionīitLocker security has been lowered by removing Elephant Diffuser from Windows 7 to Windows 8 (including 8.1). For example, an attacker having physical access can switch a specific bit of data and returns it to you this can open a backdoor loophole via Windows registry, etc.

Test it on Windows 10 before you commit because TrueCrypt is no longer supported by the original authors.īitLocker uses AES in CBC mode, TrueCrypt and others use AES/Twofish/Serpent/cascades in XTS mode (Wikipedia: Block cipher mode of operation).ĬBC mode is less secure in that it allows single bit manipulation. So, speaking only in terms of back doors, TrueCrypt (the version before last) is "safer" because it can be and has been examined by experts.

No back doors or purposeful weaknesses were found. TrueCrypt's source code is available and has (as of today) been audited. (And even if you could, a purposeful weakness might be very difficult to spot, even for an experienced cryptographer.) You cannot examine the source code to find out, either. It is unknown (except probably to Microsoft and the NSA) whether BitLocker has a back door.
Veracrypt vs bitlocker driver#
It also isn't clear whether that driver is installed only for full-disk encryption or at any time a TrueCrypt volume is in use. It isn't clear from the article whether those flaws compromise the crypto or the underlying Windows OS, or both. Edit: OctoAn article in IT World for Septemreveals the existence of, but doesn't describe fully, two serious flaws in the Windows driver that TrueCrypt installed.
