On 18 October 2016 22:38:43 GMT+01:00, grarpamp <grarp...@gmail.com> wrote:
>https://ostif.org/the-veracrypt-audit-results/
>https://ostif.org/wp-content/uploads/2016/10/VeraCrypt-Audit-Final-for-Public-Release.pdf
>https://ostif.org/ostif-quarklab-and-veracrypt-e-mails-are-being-intercepted/
>
>VeraCrypt 1.18 and its bootloaders were evaluated. This release
>included a number of new features including non-western developed
>encryption options, a boot loader that supports UEFI (modern BIOSes),
>and more.
>
>QuarksLab found:
>8 Critical Vulnerabilities
>3 Medium Vulnerabilities
>15 Low or Informational Vulnerabilities / Concerns
>
>This public disclosure of these vulnerabilities coincides with the
>release of VeraCrypt 1.19 which fixes the vast majority of these high
>priority concerns. Some of these issues have not been fixed due to
>high complexity for the proposed fixes, but workarounds have been
>presented in the documentation for VeraCrypt.

Are ostif.org a big target for DDoS?
They hide behind Cloudflare and so become another useful site for gathering 
intel on ppl who would like to encrypt their files.

Reply via email to