Is there any way to get the original files from TrueCrypt 7.1a?

Is there any way to get the original files from TrueCrypt 7.1a?
I have been downloading them from every possible place I have found and every time I check out the first time it was analyzed at sites like VirusTotal it says it was around 2014 or even 2015, which means they are fake ones, as the first analysis should be around 2012.
Any ideas of what's up Sup Forums? Did we lose our right to privacy? Is it all over?
This makes me feel very uneasy.
And no, I don't trust Veracrypt. Unlike TrueCrypt, from which there are a lot of stories regarding the governments being unable to decrypt it, I haven't heard a single similar story from Veracrypt. Something is very odd about this.

Other urls found in this thread:

sabby.space/files/cpcatuxtw.zip
defuse.ca/truecrypt-7.1a-hashes.htm
xup.in/dl,46442660/truecrypt-7.1a-linux-x64.tar.gz/
sabby.space/files/sxycekylc.zip
twitter.com/SFWRedditGifs

I have saved the original installer and generated its hash and saved that as well. If this thread is still up tomorrow morning I'll post it. (2am here, posting on my phone)

But I imagine you can search for the hash of the original installer, I'd assume many other people saved it as well.

But can you trust them?
If you go to VirusTotal you will see the installer was first analyzed in 2014, but the file dates back to 2012. It's very odd.

Are you retarded? If the hash is the same then there's no way it's modified. That's the whole point of file hashes.

I have a 7.1a installer
sabby.space/files/cpcatuxtw.zip
SHA1 for the file is :

98a43df0ed359a593

eeea6aa8cc5597532b86666
Get rid of the space in the middle. For some reason Sup Forums's spam filter considers hashes to be spam

>SHA1
>not SHA-256

Read again.
How can you trust them? How can you trust that's really the original hash?

>This file was last analysed by VirusTotal on 2017-05-19 23:41:47 UTC (22 minutes ago) it was first analysed by VirusTotal on 2006-09-18 07:26:15 UTC.
What?

SHA 256:

7f22e065e387e559b454595440f27c7

58eeaadd0c690dab252d1c10070b0c3dd

Dunno.
According to my properties I downloaded the installer in 2012

What did they mean by this?

thank you

Why are you using virustotal anyway?
If the hashes match you know it's good

Iirc in the robots.txt file you can also disable the way back machine

>How can you trust them? How can you trust that's really the original hash?
I dunno, maybe try emailing the fucking FSF with your conundrum instead of asking random dickheads on Sup Forums? They surely have the original hash on record.

Protip: No matter what you're relying on the web of trust. You are trusting that the team who audited TC told the truth. You're trusting that the NSA doesn't secretly have a backdoor they never told anyone about.

The (((((ADL))))) got hold of archive.org and have been wiping out (((problematic))) archives. I only noticed because they erased the William Pierce broadcasts archive.

>Why are you using virustotal anyway?
None of your business.

This is what I mean defuse.ca/truecrypt-7.1a-hashes.htm

The online hashes archive doesn't match with the one from this user And VirusTotal because it tells you the first time a file was analyzed.

Yes, but that's not the message archive gives you when you do that.

Tell me more about him. What did he do?

xup.in/dl,46442660/truecrypt-7.1a-linux-x64.tar.gz/

Funny how they announced they're moving to Canada because under Trump they'll have to delete everything non pro-trump. Instead they doing the opposite.

This one is real, thank you.
Any idea on where to find a windows one however? it has some functionalities the linux one doesn't.

It's because that website is missing a hash for the Linux installer script for Truecrypt
There are no entries at all for truecrypt-7.1a-setup-x64. There are entries for the tar file it was originally part of, but they never posted the hashes for the extracted file itself.
Unfortunately I no longer have the original tarball file.

If you're looking for the Windows .exe, I have that too

sabby.space/files/sxycekylc.zip

The sha1 hash is

7689d038c76bd1df695d

295c026961e50e4a62ea

Thank you.
Any ideas on why VirusTotal returns the following though?
>This file was last analysed by VirusTotal on 2017-05-19 23:41:47 UTC (36 minutes ago) it was first analysed by VirusTotal on 2006-09-18 07:26:15 UTC.
>first analysed by VirusTotal on 2006-09-18

>Tell me more about him. What did he do?

He named the jew HARD before it was cool, lol.

Since archive.org is managed by far-left jews with an agenda like ((((((BREWSTER KAHLE)))))))) ((((((((((NANCY WATZMAN)))))))))))), ((((((((JEFF KAPLAN))))))))))) etc. the whole kvetching about le evil DRUMPF shutting down archive.org while they themselves are erasing and censoring inconvenient parts of it is nothing but typical jew hypocrisy.

But the archive purge didn't matter, 8ch autists built their own parallel archive backups via torrent.

https:// www.grc.com/misc/truecrypt/truecrypt.htm

I have 7.1. Am I fucked?

What's the difference between VeraCrypt and TrueCrypt?

Veracrypt is an open source fork of Truecrypt. Truecrypt was abandoned by the devs and since that time security holes have been found in the old software.

So... What's the advantage of TrueCrypt over VeraCrypt?

There is none. TC is outdated and has known flaws. OP demonstrated in this thread that he's a fool.

Updated and patched version of the audited version of TC that's a little more secure

Who gives a fuck

>Who gives a fuck about security flaws in encryption software

A rare example of someone who wants to use free software but still has lingering retardation on jerking off to logos and names from decades of eating ads. Hilarious. Same shit sometimes happens for libre office and we still have idiots clinging to open office

>TC is outdated and has known flaws.
But I thought it passed an audit with no serious issues?

it did, veracrypt shills are nsa fags

>TC is outdated and has known flaws
It passed a fucking security audit. It is the only open-source (not free) encryption system to have had a professional security audit.

and they said I was crazy for archiving everything...

AHAHAHAHAHAA!!!
if you will excuse me, I have some 16-color porn I have to fap to.

Now

whats so special about truecrypt? support has already ended, why do people still want it?

It "just werks".

because it's fucking safe, passed security audit. People don't trust VerCrypt even if it's open sourced. (((they))) can already have a backdoor for VC, while it's less likely that (((they))) have a backdoor for TC. Vault7 -> ctrl+f TrueCrypt -> 0 results.

Checked for MDA?

>implying (((they))) don't have a backdoor in TC
>implying CIA's Vault 7 represents even a 1/1000th of what (((they))) have
Mossad will never give CIA any of the good stuff.