Wrong. it has indeed been broken
the key for truecrypt. (the encrypted key) is dumped into your ram the moment the usb is added.
A new method for cracking this involves powering down the PC, freezing the ram (hold keyboard cleaner upside down and spray) and then booting the computer from a USB device that captures all the data on the ram
from there you have the encryption key unprotected and ready for cracking.http://www.youtube.com/watch?v=JDaicPIgn9U&feature=player_embedded
From wikipedia: http://en.wikipedia.org/wiki/TrueCrypt
Passwords stored in memory
TrueCrypt stores its keys in RAM; on an ordinary personal computer the DRAM will maintain its contents for several seconds after power is cut (or longer if the temperature is lowered). Even if there is some degradation in the memory contents, various algorithms can intelligently recover the keys. This method, known as a cold boot attack (which would apply in particular to a notebook computer obtained while in power-on, suspended, or screen-locked mode), has been successfully used to attack a file system protected by TrueCrypt.
oh stop it.
the cold boot attack is not 'breaking' - it is taking advantage of user error, bad luck, and/or sloppiness.
it is just as correct (which is; not at all) to say that beating someone with a rubber hose is breaking the encryption.
it isn't. and we both know it. semantic games.
i stand: it is unbreakable.