Darksat IT Security Forums
October 18, 2019, 10:53:16 pm
Welcome, Guest. Please login or register.

Login with username, password and session length
News: Darksat IT Security Forum
From Firewall Support, AntiVirus Questions, Spyware problems, Linux and Windows Security, Black Hat SEO right down to Website Design and Multimedia
 
  Home Help Search Gallery Links Staff List Login Register  

Truecrypt


Pages: [1]
  Print  
Author Topic: Truecrypt  (Read 1860 times)
Darksat
Administrator
Master
*******
Posts: 3303



View Profile WWW
« on: September 14, 2007, 12:40:39 pm »

The Best in Encryption and File protection

TrueCrypt is a free open source on-the-fly encryption (OTFE) program for Microsoft Windows 2000/XP/2003/Vista and Linux. It can create a "file-hosted container" which consists of an encrypted volume with its own file system, contained within a regular file, which can then be mounted as if it were a real disk. TrueCrypt also supports device-hosted volumes, which can be created on either an individual partition or an entire disk.

Plausible deniability
One of the notable features of TrueCrypt is that it provides two levels of plausible deniability, which might be useful in case a user is required to reveal the password of an encrypted volume.

Hidden volumes
Hidden volumes are a steganographic feature that allows a second, "hidden" TrueCrypt volume to be created within the free space of another TrueCrypt volume.[3] The hidden volume can have its own separate file system and uses a different password, encryption algorithm and encryption key from that of the host volume, referred to as the "outer" volume. Which volume is actually mounted depends on the password provided; if the password to the outer volume is provided, the outer volume is mounted, and likewise for the inner volume.

Once a hidden volume has been created inside another TrueCrypt volume, the user will store important-looking information (but which the user does not actually want to hide) on the outer volume, whereas sensitive information is stored within the hidden volume.

In the event the hidden volume user is forced to reveal their TrueCrypt password, they can divulge the password to the outer volume (not disclosing the fact that they actually have a hidden volume within), and sensitive data within the hidden volume is not compromised.

No identifying features
TrueCrypt volumes, be they stored in a file or a device/partition, intentionally do not contain any discernible "signatures" or unencrypted headers. As cipher algorithms are designed to be indistinguishable from a pseudorandom permutation without knowing the key, the presence of encrypted data is also undetectable unless the cipher has weaknesses. This means that it is impossible to prove that any file or partition is a TrueCrypt volume (rather than random data) without having the password to mount it.

This characteristic also makes it impossible to determine if a volume contains another hidden volume.

Also the Truecrypt instalation itself can be installed in any location, even on a removable disc.
Get it.

http://www.truecrypt.org


.
« Last Edit: September 14, 2007, 12:42:46 pm by Darksat » Report Spam   Logged

Defcon 5
Master
*****
Posts: 2410



View Profile WWW
« Reply #1 on: September 14, 2007, 04:06:01 pm »

I use truecrypt to encrypt my usb flash drive with the actual truecrypt installation on my flash drive which i can then move around anywhere while still being able to unencrypt my important files.

the bad part of it is even if the police think their is something in their illegal and you don't give up the password they can put you away for what they believe is in their still, which is why the hidden volumes are important.
Report Spam   Logged
Darksat
Administrator
Master
*******
Posts: 3303



View Profile WWW
« Reply #2 on: September 14, 2007, 09:43:56 pm »


Well you will actually find that the police cant convict you with the phrase "we think he has naughty stuff somewhwere but we cant find it"
You can create a truecrypt voulume out of anything, a fake linux ISO file, a "corrupted Movie Download", an entire haddrive you have decided to encrypt for "security reasons".
They may be evil bastards, but they still need to operate, or be seen to operate within the relams of justice.

You can always give up the password for the volume that contains private pictures of your girlfriend, and then sue the bastards for breach of privacy.
No one ever said you can only have only one protected file.
Report Spam   Logged
solidghost
Master
*****
Posts: 737



View Profile
« Reply #3 on: September 17, 2007, 06:30:04 am »

In my country, they have a legal group of IT professionals called "ethical hackers" which are specialized in getting information from these encrypted stuff. Not sure whether how "ethical" they are i they have to go around snooping at everything. I guess the name is for show. How do they know what the encrypted data contains in the first place?
Report Spam   Logged
Darksat
Administrator
Master
*******
Posts: 3303



View Profile WWW
« Reply #4 on: September 20, 2007, 06:21:13 am »

They dont unless they crack the encryption, which is Very Hard if you have a long password/passphrase.
or unless they monitor what you are downloading, which again is very hard if you are using proxies or systems like TOR and a decent antivirus solution to stop trojans.

Report Spam   Logged
trace
Master
*****
Posts: 409



View Profile WWW
« Reply #5 on: September 20, 2007, 12:08:10 pm »

I use steganos 7 for my business.

I like it's GUI, very point and clicky. Not exactly subtle though.
Report Spam   Logged
Darksat
Administrator
Master
*******
Posts: 3303



View Profile WWW
« Reply #6 on: September 21, 2007, 08:38:31 am »

Yeah thats supposed to be a nice all round package for business use.
Hasn't got the ability to hide encrypted files within encrypted files like truecrypt, is supposed to be slightly slower, and slightly less heavily encrypted, but its meant to be very easy and integrates well with the other packages like AV, Anti virus, etc.
Report Spam   Logged

Pages: [1]
  Print  
 
Jump to:  

Powered by EzPortal
eXTReMe Tracker
Security Forum
Bookmark this site! | Upgrade This Forum
SMF For Free - Create your own Forum


Powered by SMF | SMF © 2016, Simple Machines
Privacy Policy
Page created in 0.047 seconds with 14 queries.