Maybe, Truecrypt was too good? I would be suspicious of the notice posted on
Truecrypt.org:
The development of TrueCrypt was ended in 5/2014 after Microsoft terminated support of Windows XP. Windows 8/7/Vista and later offer integrated support for encrypted disks and virtual disk images. Such integrated support is also available on other platforms (click here for more information). You should migrate any data encrypted by TrueCrypt to encrypted disks or virtual disk images supported on your platform.
What does the end of Windows XP support have to do with the end of Truecrypt development? Nothing really?
In fact, an independent audit of Truecrypt is currently ongoing, with the initial phase complete, indicating "no backdoors discovered" by
IsTrueCryptAuditedYet?. Some weaknesses have been noted, including the recommendation of using a strong password to avoid brute force password attacks. But "nothing" posted on their site indicating critical vulnerabilities that would warrant such a warning on Truecrypt website?
The real question is who posted that warning? Could the website have been hacked, the domain seized or developers under a legal gag order?
What's even more confusing is the recommendation to migrate to a commercial encryption package such as Bitlocker? Though noted as an effective solution for Windows, questions remain about its code integrity? Specifically, reports of law enforcement requesting developers engineer backdoor access? Even some suggesting MS was compensated to do so, and legally required not to disclosure such?
I would not download any newly posted files on Truecrypt.org until more info surfaces. Especially, since its been reported that these new binaries only decrypt existing Truecrypt volumes, and do not offer encryption capabilities?
However, you can still get the previous versions from a repository such as
truecrypt-archive. At least for now?
UPDATE: A Forbes article
Open Source Crypto TrueCrypt Disappears With Suspicious Cloud Of Mystery speculates as to why it suddenly disappeared?