Advertisement
If you have a new account but are having problems posting or verifying your account, please email us on hello@boards.ie for help. Thanks :)
Hello all! Please ensure that you are posting a new thread or question in the appropriate forum. The Feedback forum is overwhelmed with questions that are having to be moved elsewhere. If you need help to verify your account contact hello@boards.ie

Yes another encryption thread!!!!

  • 17-03-2014 7:00pm
    #1
    Registered Users, Registered Users 2 Posts: 104 ✭✭


    NSA and all that aside I have been encrypting all my devices for years now and like most on here I use TrueCrypt for laptops and PCs.

    I have just been asked to do a bit of security focused IT maintenance for a family member. Unfortunately their laptop has a UEFI-based Windows system partitions / drivers which is not supported by TrueCrypt.

    I would appreciate some advice on alternatives for full drive encryption. Unfortunately Bitlocker is out of the question as the machine is running Windows 7 Professional.

    Thanks in advance.


Comments

  • Registered Users, Registered Users 2 Posts: 104 ✭✭notmymark


    Think I may have answered my own question....
    Anyone any experence with DiskCryptor?


  • Closed Accounts Posts: 8,015 ✭✭✭CreepingDeath


    notmymark wrote: »
    Unfortunately their laptop has a UEFI-based Windows system partitions / drivers which is not supported by TrueCrypt.

    Maybe Truecrypt doesn't support full drive encrypt under UEFI, but can you not create a Truecrypt file container for any sensitive files ?

    Just means you have to open/mount it after you boot.


  • Registered Users, Registered Users 2 Posts: 2,809 ✭✭✭edanto


    I also think that's the best option - at least it's using a technology that's familiar to you and known to be robust.

    EDIT - wrote this before Bedlam contributed that nugget of 'watch-out'.

    I'll sit back and learn from this one.


  • Closed Accounts Posts: 8,015 ✭✭✭CreepingDeath


    bedlam wrote: »
    Opening most documents, even if they are stored in an encrypted container, will leave unencrypted temp files in various other locations on the hard drive defeating the purpose entirely.

    Hmm... never thought of that, but there's still things you can do to limit that.

    1. Most programs that create temp files do so in the directory of the original file, which in this case would be the truecrypt container. Eg. the Ms Office programs use the same directory.

    2. Set the TEMP environment variable to a folder in your TrueCrypt container.

    3. Disable windows swap file or set a flag to clear the Windows swap file on shutdown.


  • Banned (with Prison Access) Posts: 30 Mr Reese


    edanto wrote: »
    I also think that's the best option - at least it's using a technology that's familiar to you and known to be robust.

    EDIT - wrote this before Bedlam contributed that nugget of 'watch-out'.

    I'll sit back and learn from this one.
    http://istruecryptauditedyet.com/


    The NSA wrote Truecrypt.


























    ^May not be true.


  • Advertisement
  • Registered Users, Registered Users 2 Posts: 2,809 ✭✭✭edanto


    While interesting, I don't think worries about the NSA would put your typical user off truecrypt. I would presume the NSA have the resources to penetrate almost any system, and also that the OP isn't too concerned about them in this case.


  • Banned (with Prison Access) Posts: 30 Mr Reese


    Mr Reese wrote: »
    Phase I of the audit is complete, and report is available.


  • Moderators, Technology & Internet Moderators Posts: 4,621 Mod ✭✭✭✭Mr. G


    edanto wrote: »
    While interesting, I don't think worries about the NSA would put your typical user off truecrypt. I would presume the NSA have the resources to penetrate almost any system, and also that the OP isn't too concerned about them in this case.

    I suppose they do. It's the fact that the NSA have supposedly a backdoor to software to worries me. Another hole to leaves something exposed to attack.

    The heartbleed bug was there for 2 years. I wonder..


  • Registered Users Posts: 367 ✭✭900913


    Mr. G wrote: »
    I suppose they do. It's the fact that the NSA have supposedly a backdoor to software to worries me. Another hole to leaves something exposed to attack.

    I'd be more worried about the HDD firmware being backdoored.

    http://www.legitreviews.com/nsa-replacing-hard-drive-firmware-wd-denies-working-us-government_131762


  • Registered Users Posts: 1,977 ✭✭✭euser1984


    bedlam wrote: »
    Opening most documents, even if they are stored in an encrypted container, will leave unencrypted temp files in various other locations on the hard drive defeating the purpose entirely.

    Does it not just load it into ram?


  • Advertisement
  • Registered Users, Registered Users 2 Posts: 6,374 ✭✭✭Gone West


    OP, great question.
    Truecrypt hasn't been updated in over 2 years.
    The developers don't seem to be active on their forums, and are not responding to emails.
    I do understand why, truecrypt is a unique tool.


  • Registered Users Posts: 367 ✭✭900913


    https://www.crypto-stick.com/


    Encrypt...

    ...e-mails, files, hard disks and data stored in "the cloud". The secret keys used for this are securely stored in the Crypto Stick. Supported are Outlook, TrueCrypt, Thunderbird, Evolution, GnuPG and many more.


Advertisement