Or you can start trusting forks of Truecrypt that base their code on the post-audit code for Truecrypt.
Or you can start trusting forks of Truecrypt that base their code on the post-audit code for Truecrypt.