I do think it's reasonable that TrueCrypt should be developed anonymously. Suppose a government intelligence agency needs to access a TrueCrypt-encrypted file or operating system as a matter of national security - they might go to the creators of the software to see if there is any kind of back door in TrueCrypt (there isn't). Similarly, an attacker might be able to get compromising information from the developers if their identities were known.

Reply via email to