WTH?
"The flaws are not the fabled backdoors feared lurking in the TrueCrypt code, but can be exploited to compromise the machine, install spyware, record password keystrokes, and so on."
So if this isn't a backdoor, what the heck is it defined as? Enlighten me.