One can assume there are no major backdoors because companies want professional protection. I would assume that basic algorithms of BitLocker are safe because its source code has been reviewed under Non-Disclosure Agreement (NDA) by large companies that use it.
#VERACRYPT VS BITLOCKER WINDOWS 10#
However, Windows 10 improves security by allowing the use of AES-XTS (though not turned on by default). See XTS vs AES-CBC with ESSIV for file-based filesystem encryptionīitLocker security has been lowered by removing Elephant Diffuser from Windows 7 to Windows 8 (including 8.1). For example, an attacker having physical access can switch a specific bit of data and returns it to you this can open a backdoor loophole via Windows registry, etc. Test it on Windows 10 before you commit because TrueCrypt is no longer supported by the original authors.īitLocker uses AES in CBC mode, TrueCrypt and others use AES/Twofish/Serpent/cascades in XTS mode ( Wikipedia: Block cipher mode of operation).ĬBC mode is less secure in that it allows single bit manipulation. So, speaking only in terms of back doors, TrueCrypt (the version before last) is "safer" because it can be and has been examined by experts. No back doors or purposeful weaknesses were found. TrueCrypt's source code is available and has (as of today) been audited. (And even if you could, a purposeful weakness might be very difficult to spot, even for an experienced cryptographer.) You cannot examine the source code to find out, either. It is unknown (except probably to Microsoft and the NSA) whether BitLocker has a back door.
#VERACRYPT VS BITLOCKER DRIVER#
It also isn't clear whether that driver is installed only for full-disk encryption or at any time a TrueCrypt volume is in use. It isn't clear from the article whether those flaws compromise the crypto or the underlying Windows OS, or both. Edit: OctoAn article in IT World for Septemreveals the existence of, but doesn't describe fully, two serious flaws in the Windows driver that TrueCrypt installed.