Veracrypt project update(sourceforge.net)
490 points by super256 5 hours ago | 31 comments
zx2c4 2 hours ago
This is the same problem I'm currently facing with WireGuard. No warning at all, no notification. One day I sign in to publish an update, and yikes, account suspended. Currently undergoing some sort of 60 days appeals process, but who knows. That's kind of crazy: what if there were some critical RCE in WireGuard, being exploited in the wild, and I needed to update users immediately? (That's just hypothetical; don't freak out!) In that case, Microsoft would have my hands entirely tied.

If anybody within Microsoft is able to do something, please contact me -- jason at zx2c4 dot com.

onehair 2 hours ago
Now this is even more alarming! Wireguard's creator has their Microsoft account suspended...

<Tin foil hat on> Microsoft doesn't want to allow software that would allow the user to shield themselves, either by totally encrypting a drive, or by encrypting their network traffic! </Tin foil hat on>

unicornporn 2 hours ago
> Microsoft doesn't want to allow software that would allow the user to shield themselves

I don't think Microsoft cares (about anything besides making mo' money), but there are plenty of (state) actors that can influence the decision-making at Microsoft when it comes to these issues.

No tinfoil needed.

vstm 2 hours ago
> No tinfoil needed.

That's what Big Tinfoil wants you to believe!

falcor84 2 hours ago
Wait, what?! I was sure that the agenda of Big Tinfoil was to generate FUD so that we buy more tinfoil for our hats. Are you implying their agenda goes even deeper?
shevy-java 1 hour ago
But making money at the expense of people is not a Tinfoil conspiracy - it's a factual statement.
lukan 18 minutes ago
It is also a factual statement, that tinfoil shields (somewhat) from electromagnetic radiation.
anonym29 1 hour ago
>I don't think Microsoft cares (about anything else than making money), but there are plenty of (state) actors that can influence the decision-making at Microsoft when it comes to these issues.

Microsoft the corporation may only care about making money, but a lot of very high ranking folks within MS Security aren't just friendly to intelligence agencies, they take genuine pride in helping intelligence agencies. They're the kinds of people who saw nothing wrong or objectionable with PRISM whatsoever, they were just mad they got caught, and that the end user (who they believe had no right to even know about it) found out anyway. The kind of people who openly defend the legitimacy of the FISA court.

This aren't baseless accusations, this comes from first-hand experience interacting with and talking to several of them. Charlie Bell literally kept a CIA mug on a shelf behind him, prominently visible during Teams calls, as if to brag.

Remember - Microsoft was the very first company on the NSA's own internal slide deck depicting a timeline of PRISM collection capabilities by platform, started all the way back in 2007. All companies on that slide may have been compelled to assist with national security letters. Some were just more eager than others to betray the privacy and trust of their own customers and end-users.

dboreham 21 minutes ago
It's quite possible TLAs plant employees inside important tech companies. So not only are they sympathetic, they directly work for them.
Macha 26 minutes ago
Alternatively they asked copilot to scan for crypto projects and ban them
ngetchell 2 hours ago
Or more likely, some automated security system flagged popular but suspicious apps for further review.
Gigachad 1 hour ago
Automated systems breaking things without any human contact to get them resolved seems to be the theme of the last 10 years.
raxxorraxor 1 hour ago
Where are the people that tried to sell us software signatures as security benefit? The reality is that they are a very specific security problem. In theory and in practice.
nelox 2 hours ago
Maybe they let Mythos loose and it suggested the safest approach was to remove access ;)
blitzar 26 minutes ago
"Never attribute to malice that which is adequately explained by stupidity"
teruakohatu 2 hours ago
I am astounded that the maintainer and inventor of Wireguard is in this position.

Microsoft even supports Wireguard in Azure Kubernetes Service.

windowliker 32 minutes ago
Is this another example of their old modus operandi:

https://en.wikipedia.org/wiki/Embrace,_extend,_and_extinguis...

?

miroljub 2 hours ago
Maybe time for a custom license that would require M$ to sign up for special T&Cs if they want to use this software?

Who cares if it's OSI-approved or not, a line saying "M$, Google, and the like need written permission for every use case" would help to make those leeches honest. Just learn from the JSLint example.

UqWBcuFx6NV4r 1 hour ago
We literally just did this. Now we have Valkey. Nobody won.
pocksuppet 46 minutes ago
Did anyone lose?

Valkey is better because all of the new development work happens on Valkey, not because of the license. If the actual developer changed the license, that would be a different situation.

nelox 2 hours ago
Agree. Single point of failure. One developer, one account. Crazy.
ptx 1 hour ago
Having multiple accounts wouldn't help, as Microsoft could easily suspend all the accounts of everyone associated with the project if any account looks suspicious. The single point of failure is Microsoft.
raxxorraxor 1 hour ago
No, that is not the issue here. The source of the problem is something different. This is a wrong root cause analysis.
pjc50 47 minutes ago
You're not actually allowed to avoid this by having multiple accounts, that falls under "ban evasion".

But yes, there's a lot of critical single maintainer projects.

jamesnorden 1 hour ago
How would more than one account help in this scenario, exactly?
tssva 26 minutes ago
Has your Apple account been suspended for the last few years?
pocksuppet 47 minutes ago
The other day I tried to create a Github account and was repeatedly told I am fraudulent. Nothing else. Try again later, it says.

This is the same thing that's happened every time I've tried to have a Microsoft account. I don't think Microsoft wants to have customers who aren't rich.

jchw 2 hours ago
I tried to set up a partner account for driver signing last year (as a business entity) and it already seemed basically impossible. I think they're getting ready to just simply not allow it at all.

This is stupid. If Microsoft wants people to stop writing kernel drivers, that's potentially doable (we just need sufficient user mode driver equivalents...) but not doing that and also shortening the list of who can sign kernel drivers down to some elite group of grandfathered companies and individuals is the worst possible outcome.

But at this point I almost wish they didn't fix it, just to drive home the point harder to users how little they really own their computer and OS anymore.

gib444 2 hours ago
Y'all need to form an alliance or something, get some press coverage (wireguard, veracrypt, libreoffice)
duskdozer 2 hours ago
True, but really even if it gets resolved for them it should basically be a huge warning sign to everybody. Projects like those might get reinstated but it would only be because of how big they are that it would matter. Any person or small or 'undesirable' project would not get the same resolution.
ransom1538 49 minutes ago
Just so people are clear here. IMHO Microsoft had a huge meeting on this with many people then decided to blacklist a person. You usually code a blacklist. Beyond weird. Government involvement for sure.
prosopts 23 minutes ago
What are you basing your remark here on?
tamimio 2 hours ago
I think it’s intentional, those encryption (at rest/transit) applications are outside of MS control and you can assume outside of potential backdoors by three letters agencies, bitlocker vs veracrypt? Of course bitlocker is favorable from their perspective.

I wouldn’t be surprised if NSA already had a list of these applications and the strategies on how to cripple them or worse, compromise them.

nelox 2 hours ago
Or found they’ve been compromised by someone else? ;)
satai 0 minutes ago
Microsoft can't be trusted.

Never was, isn't and I guess won't be.

pogue 4 hours ago
They need to get some tech site like Arstechnica to write about it, like they did when neocities couldn't get ahold of bing. The only way to contact these tech companies to speak to a real human being and not a chatbot is if you know somebody who works there or if the media writes about it.
perlgeek 1 hour ago
Isn't this Microsoft abusing their quasi-monopoly as a consumer PC OS vendor?

If it weren't for the current administration, I'd say it's time for regulatory action.

CR1337 3 hours ago
klabb3 2 hours ago
It's much worse than you think. Press coverage -> manual intervention is at best a bandaid covering up a major wound in a flaw that happens with independent software distribution.

The old model where the user decides which software or apps to run on their machine, is basically already replaced by a whitelist system that is managed by companies who have no interest or obligation to approve developers. Factors like ”being an individual”, an open source developer or god forbid reside outside the USA, you rely on a combination of L1 support doom loops, unjustifiable high recurring prices, kafkaesque and changing requirements, internal inconsistencies. Windows is the worst, but all platforms (except Linux) suffer from this and you can and will get hurt, delayed, and gaslit. If you haven’t, it’s just a matter of time.

I have been blocked for 6 months now with Digicert code cert renewal, for my app Payload, which will never get any media attention. The app doesn’t matter though, the approval process is per-entity (usually, a company). The point is that nobody gives a shit, because they have a monopoly/cartel and they start the validation process after they take your money.

If you are not an app publisher, the best way I can describe it is the ”pre-let’s encrypt” era of SSL certs, but more expensive, strict and ambiguous. In fact, I’ve never gone through any worse approval process in my life, and that includes applying for residency in two countries, business licenses, manual tax filings etc.

firen777 4 hours ago
SeanDav 2 hours ago
This is worrying on many levels. So Microsoft force you to create an account to use Windows and then they reserve the right to block you from your own account, thereby potentially making you lose access to all your OWN data. This is crazy and yet another reason to stop using Windows as soon as possible.
criddell 18 minutes ago
Or create the account but don't use Microsoft services.
xorcist 2 hours ago
It's not your own data anymore if you gave it away.
Topfi 2 hours ago
Honest question, did we ever get an answer what was the cause for the sudden change from the original Truecrypt developer?

Even if one doesn't want to maintain that project for purely private reasons, recommending Bitlocker as the drop-in-replacement always made it smell fishy to me.

no_time 1 hour ago
I would also like to know why is it excluded from Archive.org

https://web.archive.org/web/20260000000000*/https://www.true...

abcd_f 1 hour ago
It's more or less commonly accepted that its creator got jailed for being an arms dealer.

https://en.wikipedia.org/wiki/Paul_Le_Roux

Topfi 1 hour ago
I knew the speculation on him being involved in some capacity, but as the wiki page states, this was never confirmed in any substantial way.

More importantly, if development seized with no public comment, that would be one thing and may strengthen the "he got arrested" theory. However, there was some final communication, specific recommendations to rely on Bitlocker of all things, a new version of Truecrypt was released solely for decrypting existing disks and then the web page was removed, including a flag set on robots.txt to ensure it wouldn't appear on archive.org. All this concurrent to a crowd funded source code audit that, in the end, did not find any server issues or backdoors (I recall some speculation back in the day, that either known code quality issues or an intentional backdoor could have caused the exodus).

That all makes it hard to link this to an arrest of the main developer, though I dislike speculation without any hard evidence and if there is no new information, I'll keep this filed under "there is no answer".

b65e8bee43c2ed0 1 hour ago
likely chose to shut down rather than bend over, same as Lavabit a year prior. I find it more plausible than the other theory.
jug 44 minutes ago
I went on a Wikipedia dive and discovered this funny bit regarding the court process surrounding Lavabit and FBI's desire of the TLS private keys.

> The contempt of court was caused by Levison providing the keys printed in a tiny (4 point) font, which was deemed "largely illegible" by an FBI motion, which went on to complain that "To make use of these keys, the FBI would have to manually input all 2560 characters, and one incorrect keystroke in this laborious process would render the FBI collection system incapable of collecting decrypted data."

(And to be clear, that's all they ever saw of said keys)

pas 22 minutes ago
> The court ordered Levison to be fined $5,000 a day beginning 6 August until he handed over electronic copies of the keys. Two days later Levison handed over the keys hours after he shuttered Lavabit.
Topfi 48 minutes ago
Fair assumption, but unlike Lava, TC never had customer/user data. The NSL/forced shut down theories also make little sense to me however, the fork was up by the end of the week and was easy to foresee. Kinda why this fascinates me so much, no theory I ever read survives basic scrutiny. Perhaps some things, we’ll never know.
dizhn 4 hours ago
Microsoft disabled the developer's certificate so no windows releases can be made.
Gareth321 3 hours ago
We can still install, right? It just comes up with a scary warning. Still not great but at least we aren't locked out.
Strom 3 hours ago
You can, but it's more than a warning. VeraCrypt has a signed kernel driver, which has higher requirements. You'll need to boot into a special Windows mode and disable Driver Signature Enforcement.
HauntingPin 2 hours ago
Afaict, you can't disable driver signature enforcement permanently without disabling secure boot.
nslsm 2 hours ago
You also get a huge watermark that says "Test Mode" that takes up the entire screen (not kidding)
raxxorraxor 1 hour ago
Secure boot is an anti-feature in most of the landscape anyway. Sure, if you have a distribution under your control or influence it could theoretically be a benefit. But you need to not be stupid or naive here.

You can also roll you own encryption if you are not stupid and naive. Probably a question of self-reflection.

jonathanstrange 4 hours ago
As someone who is just planning to publish signed desktop software for Windows, this is deeply worrying. What reasons could there be for cancelling a certificate, especially when it has been used for years and the identity is already established?

Are there some ways to combat such decisions legally?

shelled 3 hours ago
Realistically speaking - anything could be a reason. A shakedown or blocking based on some "nudge" (this might come across as tin-foiled though). Some flag/trip-wires going wrong, more worryingly due to a bug/false alarm - and this is more worrying because in this case semi-incompetent large orgs like MSFT find it really hard to accept it, fix, and move on. Some change in OP's account that either they don't see or haven't realised - some edge case, you never know.

And of course, it doesn't affect their earnings and there are no consequence, or significant, so they won't care and won't respond or tell what went wrong.

Can one move legally? Sure. But then it effectively is a combo of who blinks first and who can hold their breath longer.

politelemon 3 hours ago
This is a concern and risk that has realised itself multiple times over the past decades. There have been multiple stories linked to multiple developers in the past.

If you publish to any closed platform including ios, mac, win, android, this is the risk you run and a condition of operating you will need to accept.

technion 3 hours ago
There's more to it. Signed desktop software can be signed by any CA.

Veracrypt has kernel drivers. Microsoft's ability to control what you can sign is specific to kernel drivers, and Microsoft's trigger finger around bans exists in the world where bad drivers BSOD machines.

In general this isn't your problem.

raxxorraxor 1 hour ago
Speculation as well and highly unlikely. Microsoft drivers can very well BSOD your machine as well, not a significant or convincing threat scenario and certainly not something that lead to certificate revocation of driver developers. There is zero quality control or review by Microsoft here. Not for their own products and not for third party ones.
actionfromafar 28 minutes ago
You just have to start living like they do in Russia and comply in advance. Don't do anything "interesting", no encryption, or if you do, make sure you leave breadcrumbs, scratch that, a bread trail for them to easily get access to customer data. An Oracle or Sharepoint integration maybe?
0xCE0 1 hour ago
Linux is the only hope at this point for the future of computing.

Windows and macOS are just too risky to do any business with. Waste of all resources.

cguess 12 minutes ago
and yet... still unusable by the mass majority of people.
tapoxi 2 minutes ago
This isn't really true anymore with the advent of Flatpak & Flathub. It's just an app store like any other platform. Even the majority of games work without tweaking.
teekert 10 minutes ago
My kids grew up on Gnome essentially, I can tell you Win11 is a lot more confusing to them, not just because because they grew up on Gnome, there is just so much more ... stuff. And notifications and flashy things and news and weather apps and they all want your attention. Gnome is much more iPadOS like (minus that horrible concoction called the App Store).

Sure, if you're all in on MS365 (like all schools here in the Netherlands), Windows may be somewhat more handy with its native apps and all your stuff there with a single log-in.

no_time 1 hour ago
prediction: they are testing the waters. If there is enough outcry they will go "oopsie whoopsie, hehe :3 your account is restored".

If there isn't enough outcry they will go forward and disable more signing keys related to things like torrent clients, VPN software, eject UBO from the edge store etc etc.

Atleast now I'm a bit more certain that VC is indeed safe.

shelled 3 hours ago
I am somewhat also concerned that this software was still being distributed on SourceForge.
reddalo 2 hours ago
Yes, I stopped using SourceForge after they started tampering with installers to put adware inside of them.

It's a bit worrying that a sensitive app such as VeraCrypt is still distributed there.

poizan42 1 hour ago
That was 11 years ago, under DHI Group though. I don't think Slashdot Media have been up to the same shady stuff.
1 hour ago
bartvk 2 hours ago
But think about it, if they were on Github now, which is owned by Microsoft, would there be even further consequences?
frizlab 2 hours ago
I don’t even understand how SourceForge still exists!
luke5441 2 hours ago
Depending on GitHub and Microsofts largesse there surely is much better. See OP.
Pay08 2 hours ago
Why?
qwertox 1 hour ago
~2015, "DevShare". They wrapped open-source software downloads with opt-out adware and PUPs (potentially unwanted programs), without the original developers' consent in some cases. They took over abandoned/unmaintained projects (like GIMP for Windows, VLC, etc.) and replaced the original download with their adware-wrapped version.
ninjagoo 3 hours ago
Looks like Linux and some of the BSDs are the only remaining truly open OSes.
krylon 3 hours ago
True, however, that has been the case for quite a while. This particular incident doesn't change that, except for the VeraCrypt developer, who is in a crappy situation now (not just regarding VeraCrypt, he mentions he was using the certificate for his main job as well, so this sucks a lot for him).
sph 3 hours ago
Well, of course. Have the other commercial offerings every been "truly open OSes"?
Aachen 2 hours ago
So far I haven't had much concrete reason for my family to switch away from Windows. The updates maybe, needing to pay for a new license and the UI changes are like pulling the chair out from under them, especially as they get older (Windows 7 was hard for my grandma, thankfully they left 10 mostly alone but 11 is quite different again so she's currently staying on 10 — not that her hardware supports 11 anyway but that's fixable), but it's either learning the new Windows UI, let's say ten storypoints of newness, or learning some Linux desktop environment, even if it's Mint which is similar to 7/XP it's not quite the same either and probably like 15 storypoints at minimum, even if then you're done for much longer

But if OSes are being locked down and software has trouble distributing security updates through official repositories for Windows... that's a good reason to finally make the switch. Same as why my family is on Android: I can install f-droid, disable the google store, and don't have to worry about them installing malware / spyware / adware

There's different degrees of openness. Android till 2026 was an acceptable compromise (let's see how it goed forwards). Windows is also on the decline with their account policy, not sure about this certificate revocation thing (thankfully haven't had to deal with it yet; I'm not a user myself) but it sounds like they're moving to a walled garden also

When the degree changes and gets even less open, yeah you can say "well of course, they were never truly open, they're commercial" but it's still a change and might lead people to alter their choices

sph 20 minutes ago
You'll find that people that are not computer experts will take to modern Linux with much more ease than those that have complex needs, which for 90% of the people these days means that access to the Web satisfies all their needs. Moving from Windows 7 to 11 will probably be as traumatic as moving from Windows 11 to KDE, so it's an investment worth doing in my opinion.
egorfine 1 hour ago
xorcist 2 hours ago
Until Microsoft decides to no longer sign the Linux boot loader shim (for IBM/Red Hat, no less).
SeanDav 2 hours ago
Except compulsory age verification in Linux is now becoming a real threat. Some Linux distros are actively against this but many are not seemingly interested in fighting it: CachyOS, Ubuntu, Fedora and others.

Age Verification is the thin end of a much bigger wedge in "open" OS's

Pay08 1 hour ago
I thought community projects (as opposed to the corporate Fedora and Ubuntu) are exempt from such laws.
akimbostrawman 2 hours ago
the current law requires no verification at all simple attestation, you could put in _any_ age. it also does not effect linux distros as a whole, only distros in jurisdictions with the laws.
SeanDav 2 hours ago
Sure, for now... I simply don't believe it will stop at "simple attestation", because we all know that simple attestation is practically useless, but once the various distros accept this "trivial" inconvenience, "Age verification 2" with harsher requirements will soon be on the way.

I would be ecstatic to be proved wrong on this, but experience tells me that is not likely to happen.

tomgag 2 hours ago
Sorry to hear about this turn of events, but it was pretty much to be expected given the way the world is turning, and Microsoft being Microsoft.

Switch to Linux if you can, and come give Shufflecake a try ;)

https://shufflecake.net/

_s_a_m_ 3 hours ago
Microsoft doing everything in their power to be assholes, as always
krylon 3 hours ago
As much as I like bashing Microsoft, never underestimate people's capacity for incompetence, especially where large organizations are involved. I don't see how they would gain anything from this move.
cm2187 2 hours ago
It doesn’t help that they do that sort of shits AND mandate a microsoft account for logging in to windows. Also how much trust can you have that if you move your business to azure they will not randomly kill it. Incompetence or malice, almost doesn’t matter to the average user.
krylon 1 hour ago
The outcome is the same, yes. With incompetence, there is at least a glimmer of hope things will get rectified. But you are correct, trust is destroyed this way, and it doesn't look like Microsoft cares much.
nixpulvis 3 hours ago
We need a better way to sign and verify software. Clearly companies like Microsoft and Apple have not been good for the open source communities and are inhibiting innovation.
iamniels 3 hours ago
We need better OSes such that signing of software is not required to keep your computer safe.
PunchyHamster 3 hours ago
Just add code cert generation to letsencrypt, it's not like MS validates the code that you sign used certs from them anyway
mr_mitm 3 hours ago
What would be the point? How would you prevent malware from being signed? Currently, code signatures are used as a signal for trustworthiness of the code.
sidewndr46 2 hours ago
Microsoft signed the Crowdstrike updates. I don't think a CA signing a piece of malware is a realistic thing to be concerned about.
duskdozer 2 hours ago
Is it some entirely different process than providing hashes and a GPG signature?
mr_mitm 2 hours ago
Well, yes. Just look at OP and Jason struggling to get their code signed.
Eldt 3 hours ago
Misplaced trustworthiness?
Pay08 2 hours ago
On the source code side, I quite like the way Guix does things, i.e. needing every commit to be gpg-signed. They even have a handy tool for verifying the repo[0] but I'm not sure how viable this is for non-OSS projects.

[0]: https://guix.gnu.org/manual/devel/en/html_node/Invoking-guix...

realusername 2 hours ago
I think this is fundamentally an unsolvable problem and I'm not even sure it's worth pursuing.

Any large scale signing platform will have large oversights and be rendered useless. See the appstore / play store/windows...

tamimio 2 hours ago
It should something like web certificates, you can bring your own.
baobabKoodaa 34 minutes ago
Anyone here who could reach out to specific persons inside Microsoft who could fix this?
folbec 51 minutes ago
I would not be surprised if it was some sort of AI driven mistake.

Some guy somewhere deciding to delegate threat assessment to Copilot or some other automated tool.

baobabKoodaa 34 minutes ago
Can someone please explain the implications for current Windows users of VeraCrypt?
trashface 55 minutes ago
Hope this is resolved. I guess I could run linux in a VM and mount volumes there, but this is getting a bit dicey. But Win 10 is my last windows anyway.
swordsith 34 minutes ago
if michalesoft wants to take away our ability to sign drivers, they will find there is more than enough vulnerable easily exploited drivers we can use that are pre-signed online. Thank you micosawft!
HumanOstrich 10 minutes ago
Are you having a stroke?
RandomGerm4n 3 hours ago
That's especially ridiculous because this whole security mechanism that Microsoft is forcing on Windows user doesn't even work. There are tons of leaked certificates and on forums dedicated to game hacking you can find guides on how to get your hands on one yourself. People there use them to write kernel drivers for cheating in games. Game developers often blacklist these in their anti-cheat software so that the game no longer launches on a computer using a driver with that certificate. Microsoft however does not do this and malware developers can then simply use the certificates for their own purposes. So all this nonsense is basically just a restriction on regular users and honest developers while the “bad guys” can get around it.
redox99 1 hour ago
That's kind of crazy. Why doesn't Microsoft revoke such certs such that you can't sign new software with it?
vaginaphobic 3 hours ago
[dead]
mapontosevenths 49 minutes ago
HumanOstrich 8 minutes ago
From TFA: "I have encountered some challenges but the most serious one is that Microsoft terminated the account I have used for years to sign Windows drivers and the bootloader."
8cvor6j844qw_d6 2 hours ago
Seeing this kind of friction makes me more confident in VeraCrypt. The tools that never seem to run into trouble with platform gatekeepers are the ones I'd worry about.
baobabKoodaa 35 minutes ago
The biggest risk in encryption software is that you lose access to your data. You seem to be ignoring that risk completely and focusing on something else entirely.
dboreham 15 minutes ago
I don't think you would loose access. You can always recover data on an open platform such as Linux.
Pay08 1 hour ago
That seems like a very nonsensical stance.
speedgoose 3 hours ago
It's perhaps naive, but could he create a new organisation, like a "TotallyNotVeraCrypt" French loi 1901 association, at a different address, and create a new microsoft account by making sure it passes all the requirements.
repelsteeltje 3 hours ago
Yeah but isn't the point of these certificates to express trust?

The point isn't (or: shouldn't be) to forcefully find your way through some back alley to make it look legit. It's to certify that the software is legit.

Trust goes both ways: we ought to trust Microsoft to act as a responsible CA. Obfuscating why they revoked trust (as is apparently the case) and leaving the phone ringing is hurting trust in MS as a CA and as an organization.

sidewndr46 2 hours ago
who on planet earth trusts a piece of software because Microsoft signed it?
repelsteeltje 9 minutes ago
For one: Most if not all virus scanners.

A signature is a signal, not an absolute. Although, to be fair, if Microsoft (or most other CAs) had done a better job, then that trust would have carried more weight than it does currently.

roelschroeven 1 hour ago
There are different types of trust, but at the very least with such a signature you can trust that the piece of software is really from Veracrypt and not from a malicious third party.
mr_mitm 2 hours ago
Trust isn't binary, it's a spectrum. A signature is a signal that should increase trustworthiness. Not the strongest signal, perhaps even a weak one, but it's not zero.
orbital-decay 3 hours ago
That's what VeraCrypt is, a fork of the original TrueCrypt after all drama, security doubts, and eventual discontinuation. It took a long time and two independent audits to establish trust in it.
subscribed 3 hours ago
Probably not French though, give how hostile it appears to be to encryption/security related projects (GrapheneOS had a good arguments re: that)
kijin 2 hours ago
The author is now based in Japan, and even owns a veracrypt.jp domain. Meanwhile, the old veracrypt.fr domain redirects to veracrypt.io.

Seems rather clear that he doesn't want French jurisdiction.

fg137 2 hours ago
And Microsoft will be happy to shut that one down because their incompetence.

So we'd better find a real solution now.

kwar13 2 hours ago
very much sounds like microsoft
shevy-java 1 hour ago
This is always a problem when big mega-corporations are involved, be it Google or Microsoft. They want to control the platform.

We really need viable solutions. I have been using Linux since +21 years or so, so it does not affect me personally, but I think Linux needs to become really a LOT more accessible to normal people. And it really has not (on the desktop); all the various "improvements" on GNOME3 or KDE are basically pointless, they have not solved the underlying problem. Ideally problems should be auto-resolvable. If someone wants to use the proprietary nvidia driver, that should be a single click - on ALL Linux distributions. Instead you see some distributions have their own ad-hoc solution and other distributions have no easy solution (for simple people).

avaer 2 hours ago
Forced software signing should be illegal.
Pay08 1 hour ago
It's not forced, especially for normal software, you just get a popup. It's a bit of a pain to disable the requirement for drivers, though.
baobabKoodaa 34 minutes ago
I don't think you can install VeraCrypt, at least for system encryption, unless the installer is signed
3 hours ago
teekert 1 hour ago
I'm sorry, is this some sort of Windows joke that I'm too Linux to understand?
bilekas 2 hours ago
And yet another example of companies turning actively hostile against their users.

The burden of usage/access is now solely on the customers and the feeling is that regular customers are just a nuisance to be ignored.

hernanhumana 1 hour ago
cool project
ErroneousBosh 4 hours ago
Jesus, sourceforge is still on the go?
tvbusy 2 hours ago
I understand that most people want to move to other more modern tools, it's up to you. However, what baffled me is why the author's choice not to move is a problem? Did we pay them to move and they did not move as promised? Was there some crowd funding to move that was not fulfilled?
IshKebab 30 minutes ago
> what baffled me is why the author's choice not to move is a problem?

Because Sourceforge is horrible to use and was at one point actively pushing malware? It's pretty obvious tbh.

SXX 4 hours ago
Might be it even not using all your code to train AI. Or at least not asking your explicit permission to do it.
JimDabell 3 hours ago
Not every conversation has to be a conversation about AI.
karel-3d 4 hours ago
sourceforge was always very scummy, I think they would definitely use the code for that if they could
mbreese 3 hours ago
It wasn’t always scummy… but there was a definite shift after they got bought. It’s kept getting worse since then.

Then again, this was something like 20 years ago. Back then, Sourceforge was something closer to GitHub today. It was the de facto public source repository. You could even get an on-premise version, IIRC.

Actually, this is sounding a lot like GitHub these days… not sure what that means.

egorfine 4 hours ago
And unfortunately some projects exclusively use sourceforge. Which breaks some of my CI pipelines.
kome 3 hours ago
yeah, it just works
saidnooneever 3 hours ago
maybe an old vulnerable signed driver can be used to load the new version :D. on a more seirous note, i think contact with a person at MS, likely via socials triggering that, might help here. It all depends on the reason for the ban/block/cancel.

if they had a reason other than 'oops mistake' its likely just going to remain in place. (sadly, that is how MS is. if you care for privacy maybe go to BSD)

a_paddy 2 hours ago
Who said vulnerable? Perhaps just a driver with less features.
no_time 1 hour ago
GP refers to the practice of getting kernel level code execution using other, old vulnerable drivers and using it to run the VC driver.