{"id":19980,"date":"2014-05-29T09:58:17","date_gmt":"2014-05-29T00:58:17","guid":{"rendered":"http:\/\/www.softantenna.com\/wp\/?p=19980"},"modified":"2014-05-29T09:58:17","modified_gmt":"2014-05-29T00:58:17","slug":"truecrypt-is-not-secure","status":"publish","type":"post","link":"https:\/\/softantenna.com\/blog\/truecrypt-is-not-secure\/","title":{"rendered":"\u3010\u901f\u5831\u3011\u300cTrueCrypt\u300d\u306f\u3082\u306f\u3084\u5b89\u5168\u3067\u306f\u306a\u3044\uff01\uff01"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/softantenna.com\/blog\/wp-content\/uploads\/2014\/05\/blogTrueCrypt.jpg\" alt=\"TrueCrypt\" title=\"TrueCrypt.jpg\" border=\"0\" width=\"546\" height=\"394\" \/><\/p>\n<p>\u30aa\u30fc\u30d7\u30f3\u30bd\u30fc\u30b9\u306e\u6697\u53f7\u5316\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u300c<a href=\"http:\/\/truecrypt.sourceforge.net\/\">TrueCrypt<\/a>\u300d\u306e\u516c\u5f0f\u30b5\u30a4\u30c8\u306b\u3001\u7a81\u7136<span class=\"myboldred\">TrueCrypt\u306f\u3082\u306f\u3084\u5b89\u5168\u3067\u306f\u306a\u3044<\/span>\u3068\u3044\u3046\u8b66\u544a\u6587\u304c\u8868\u793a\u3055\u308c\u3066\u9a12\u304e\u306b\u306a\u3063\u3066\u3044\u307e\u3059(<a href=\"http:\/\/arstechnica.com\/security\/2014\/05\/truecrypt-is-not-secure-official-sourceforge-page-abruptly-warns\/\">Ars Technica<\/a>\u3001<a href=\"http:\/\/beta.slashdot.org\/story\/202633\">slashdot<\/a>\u3001<a href=\"https:\/\/news.ycombinator.com\/item?id=7812133\">Hacker News<\/a><\/a>)\u3002<\/p>\n<p><!--more--><\/p>\n<p>\u30b5\u30a4\u30c8\u30c8\u30c3\u30d7\u306b\u8868\u793a\u3055\u308c\u3066\u3044\u308b\u6587\u7ae0\u306f\u300c\u8b66\u544a: \u4fee\u6b63\u3055\u308c\u306a\u3044\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u554f\u984c\u304c\u591a\u304f\u542b\u307e\u308c\u3066\u3044\u308b\u305f\u3081\u3001TrueCrypt\u306e\u4f7f\u7528\u306f\u30bb\u30ad\u30e5\u30a2\u3067\u306f\u306a\u3044\u300d\u3068\u3044\u3046\u3082\u306e\u3002TrueCrypt\u306e\u958b\u767a\u304c2014\u5e745\u6708\u306b\u7d42\u4e86\u3057\u305f\u305f\u3081\u3001Windows\u3067\u4f7f\u7528\u3067\u304d\u308b\u6697\u53f7\u30b7\u30b9\u30c6\u30e0\u300c<a href=\"http:\/\/ja.wikipedia.org\/wiki\/BitLocker\">BitLocker<\/a>\u300d\u3078\u306e\u79fb\u884c\u3092\u63a8\u5968\u3057\u3066\u3044\u307e\u3059\u3002<\/p>\n<p>\u516c\u5f0f\u30b5\u30a4\u30c8\u304b\u3089\u306f\u3001TrueCrypt\u306e\u6700\u65b0\u30d0\u30fc\u30b8\u30e7\u30f37.2\u304c\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9\u53ef\u80fd\u3067\u3001\u7f72\u540d\u306b\u4f7f\u308f\u308c\u305fGPG\u30ad\u30fc\u306f\u4ee5\u524d\u306e\u30d0\u30fc\u30b8\u30e7\u30f3\u3067\u4f7f\u308f\u308c\u3066\u3044\u305f\u3082\u306e\u3068\u540c\u3058\u3089\u3057\u3044\u306e\u3067\u3059\u304c\u3001<a href=\"http:\/\/beta.slashdot.org\/story\/202633\">diff<\/a>\u3092\u306b\u3088\u308b\u3068\u3001\u4ee5\u524d\u306e\u30d0\u30fc\u30b8\u30e7\u30f3\u304b\u3089\u3044\u304f\u3064\u304b\u306e\u6a5f\u80fd\u304c\u524a\u9664\u3055\u308c\u3066\u3044\u308b\u3068\u306e\u3053\u3068\u3002<\/p>\n<p>\u3042\u307e\u308a\u306b\u3082\u8aac\u660e\u4e0d\u8db3\u306a\u306e\u3067\u3001\u3055\u307e\u3056\u307e\u306a\u61b6\u6e2c\u3092\u547c\u3093\u3067\u3044\u307e\u3059\u3002\u300c\u30b5\u30a4\u30c8\u4e57\u3063\u53d6\u308a\u8aac\u300d\u3001\u300c\u30b5\u30a4\u30c8\u30e1\u30f3\u30c6\u30ca\u306e\u3044\u305f\u305a\u3089\u8aac(4\/1\u65e5\u3058\u3083\u306a\u3044\u3051\u3069\u306d)\u300d\u3001\u300c\u305d\u306e\u4ed6\u3088\u308a\u6df1\u523b\u306a\u7406\u7531\u300d\u306a\u3069\u2026\u3002\u73fe\u6bb5\u968e\u30677.2\u3092\u30a4\u30f3\u30b9\u30c8\u30fc\u30eb\u3057\u3066\u4f7f\u3046\u306e\u306f\u5371\u967a\u6027\u304c\u9ad8\u305d\u3046\u306a\u306e\u3067\u771f\u76f8\u304c\u5224\u660e\u3059\u308b\u307e\u3067\u5f85\u3063\u305f\u307b\u3046\u304c\u826f\u3044\u304b\u3082\u3057\u308c\u307e\u305b\u3093\u3002\u305d\u308c\u306b\u3057\u3066\u3082TrueCrypt\u306b\u3044\u3063\u305f\u3044\u306a\u306b\u304c\u304a\u3053\u3063\u305f\u306e\u304b\u3002\u8b0e\u304c\u6df1\u307e\u308a\u307e\u3059\u3002<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u30aa\u30fc\u30d7\u30f3\u30bd\u30fc\u30b9\u306e\u6697\u53f7\u5316\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u300cTrueCrypt\u300d\u306e\u516c\u5f0f\u30b5\u30a4\u30c8\u306b\u3001\u7a81\u7136TrueCrypt\u306f\u3082\u306f\u3084\u5b89\u5168\u3067\u306f\u306a\u3044\u3068\u3044\u3046\u8b66\u544a\u6587\u304c\u8868\u793a\u3055\u308c\u3066\u9a12\u304e\u306b\u306a\u3063\u3066\u3044\u307e\u3059(Ars Technica\u3001slashdot\u3001Hacker Ne [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":19979,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"swell_btn_cv_data":"","footnotes":""},"categories":[66,3,75],"tags":[2408],"class_list":["post-19980","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-webservice","category-windows","category-software","tag-truecrypt"],"_links":{"self":[{"href":"https:\/\/softantenna.com\/blog\/wp-json\/wp\/v2\/posts\/19980","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/softantenna.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/softantenna.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/softantenna.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/softantenna.com\/blog\/wp-json\/wp\/v2\/comments?post=19980"}],"version-history":[{"count":0,"href":"https:\/\/softantenna.com\/blog\/wp-json\/wp\/v2\/posts\/19980\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/softantenna.com\/blog\/wp-json\/wp\/v2\/media\/19979"}],"wp:attachment":[{"href":"https:\/\/softantenna.com\/blog\/wp-json\/wp\/v2\/media?parent=19980"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/softantenna.com\/blog\/wp-json\/wp\/v2\/categories?post=19980"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/softantenna.com\/blog\/wp-json\/wp\/v2\/tags?post=19980"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}