1. You are viewing our forum as a guest. For full access please Register. WindowsBBS.com is completely free, paid for by advertisers and donations.

TrueCrypt Whole System Encryption

Discussion in 'Other PC Software' started by Coleman Smith, 2009/12/24.

  1. 2009/12/24
    Coleman Smith

    Coleman Smith Inactive Thread Starter

    Joined:
    2006/08/14
    Messages:
    58
    Likes Received:
    0
    I am considering encryption my whole system using TrueCrypt.

    Any one used this for whole system encryption have any problems with it.

    I am using XP Pro.
     
  2. 2009/12/27
    Jilly

    Jilly Inactive

    Joined:
    2009/12/12
    Messages:
    555
    Likes Received:
    1
    Hi,

    I am entirely unfamiliar with this. But re the useful if an "adversary" forces you to give up your PW, etc...I did not even PW protect this system. Tho I did on my other two.

    If I may ask....and, if you are CIA just make sumthin up,;)what generated your interest in this? Do you feel it will afford you more protection online?

    Maybe there are hacker-cryptolgists who could get past this?

    I am not dissing you for wanting to feel safer, we all do!
     

  3. to hide this advert.

  4. 2009/12/27
    TonyT

    TonyT SuperGeek Staff

    Joined:
    2002/01/18
    Messages:
    9,072
    Likes Received:
    400
    It's unnecessary to encrypt the entire system, just protect your sensitive data.
     
  5. 2009/12/27
    Coleman Smith

    Coleman Smith Inactive Thread Starter

    Joined:
    2006/08/14
    Messages:
    58
    Likes Received:
    0
    All HD Eventually Go Away

    If an attacker forces you to give up your pass word then you will give it to him. That's the reason that computers in highly secure areas have multiple log in's and other safe procedures. In those circumstances you may log on only after your supervisor has logged on or supplied a key file. Think of a key file as a password 10 pages long.

    Encryption offers almost zero protection while the system if running. A file that is available to the system is available to spyware.

    Encryption is useful in the event that the computer is stolen and a crook tries to find information that might get him into your bank account or be useful in identity theft.

    All encryption systems can be hacked.

    Bit Locker(TM) was hacked by obtaining a copy of the memory while the system was running. The encryption keys and pass words are held in memory while the system is ruining. Otherwise you would have to supply a password each and every time a file is opened.

    Dishonest employees and/or family members who have authorized access are a logical threat.

    I do not rely on encryption when I retire hard drives.

    I just destroy the HD.

    My primary interest in encryption is that I am retired and computers are my hobby.

    I also have a frank distrust of the government and hold the belief that an out of control police state is a greater danger to our civil liberties than Osama Ben Laden and Al Quetta ever will be.

    BTW: There is a Federal Court ruling that the 5th amendment and the right to remain silent applies to pass words.

    And no, there is nothing on my computer that would be of interest to either a state or federal prosecutor. My data is just none of their business or any one else’s.

    The right to privacy is fundamental to democracy.
     
  6. 2009/12/27
    Coleman Smith

    Coleman Smith Inactive Thread Starter

    Joined:
    2006/08/14
    Messages:
    58
    Likes Received:
    0
    I Bet You Don't Know Where All Your Private Data Is


    Word, Excel and other programs create all kinds of temporary files. You would have to keep track of all of them if you stick with simple file encryption.

    Encrypting the entire system solves that issue.

    If you encrypt the entire system then an attacker does not know whether you are ruining Windows or Linux.

    Why make it easy for an attacker?
     
    Last edited: 2009/12/27
  7. 2009/12/27
    Jilly

    Jilly Inactive

    Joined:
    2009/12/12
    Messages:
    555
    Likes Received:
    1
    All of the above fascinating and I thank you for all of it.

    I did learn that the Pentagon has special machines to destroy HDDs. I also once saw a video online of a guy doing this manually. Not an easy endeavor.....but if you bend the platters sufficiently, that helps a lot.

    Someone should start a chain of businesses where you can bring yr defunct drives and stand there and watch them get squashed like old vehicles. Then you could take the cubes and solder them together and make art!

    I just realized, I do not anticipate attackers.....beyond fearing the intrusions-infectionswhich lead us to research the best firewalls, and anti this and that apps.

    I am now hoping I am not being naive.
     
  8. 2009/12/27
    Coleman Smith

    Coleman Smith Inactive Thread Starter

    Joined:
    2006/08/14
    Messages:
    58
    Likes Received:
    0
    There Are Businesses That Shred Hard Drives

    There already are businesses that shred HD's.

    I just lay them on a concrete floor in the garage and beat on them with a sledge hammer. Cheaper.
     
  9. 2009/12/27
    Jilly

    Jilly Inactive

    Joined:
    2009/12/12
    Messages:
    555
    Likes Received:
    1
    i had no clue!

    Now that.....sounds so GRATIFYING!!!!!:D
     
  10. 2009/12/28
    TonyT

    TonyT SuperGeek Staff

    Joined:
    2002/01/18
    Messages:
    9,072
    Likes Received:
    400
    Not quite completely valid.
    Any Windows systems, even with encryption, can be booted from a Linux Live CD and have the passwords reset and the registry edited (encryption removed). I use such CDs to repair my clients' computers. I have a bootable linux cd that loads Windows registry hives into a graphical registry editor. Once there, certain encryption can be removed, startup programs eliminated, etc.

    MS Office apps create those temp files in 2 locations: the dir where the original file has been saved and the userprofile temp dir. These can be cleaned regularly.

    I too consider that we are heading toward a police state. However, I also believe that if a govt agency or other agency really wants the data on my disks then they have the capability to get at anytime they want, regardless of my precautions and regardless of my rights.

    A better solution to encrypting the entire disk is to use an app like Eraser, which can clean the disk's free space of traces of deleted files. AFAIK, encryption systems don't encrypt the deleted data.
     
  11. 2009/12/28
    Jilly

    Jilly Inactive

    Joined:
    2009/12/12
    Messages:
    555
    Likes Received:
    1
    Above: Amazing. It has just been confirmed, that in this arena, I am essentially in Pre school.:eek:
     
  12. 2009/12/28
    Coleman Smith

    Coleman Smith Inactive Thread Starter

    Joined:
    2006/08/14
    Messages:
    58
    Likes Received:
    0
    I have used Eraser.

    I now use FileShredder.
    Same functionality
     
  13. 2009/12/28
    Jilly

    Jilly Inactive

    Joined:
    2009/12/12
    Messages:
    555
    Likes Received:
    1
    There is a "Wash' tab-module in the former JK Defrag GUI which I believe functions similarly..
     

Share This Page

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.