Discussion:
Newbie question: How secure is TrueCrypt 6.3a?
(too old to reply)
Richard Malchik
2010-07-12 14:28:54 UTC
Permalink
It obviously protects against neighborhood break-ins, but is it really
secure against all others that may want access to financial records
and writings and the like? Are there any "back-doors?"

Richard
Non scrivetemi
2010-07-12 18:10:33 UTC
Permalink
I don't know of any exploits, given proper choice of ciphers and a good
passphrase, except for the swap file. If you are talking about Winbloze and
you have enough RAM (1G or more) consider permanently disabling your swap
file for better overall security.

"Crypto is only as good as the weakest bone in your body"
Richard Malchik
2010-07-12 18:33:16 UTC
Permalink
On Mon, 12 Jul 2010 20:10:33 +0200 (CEST), "Non scrivetemi"
Post by Non scrivetemi
I don't know of any exploits, given proper choice of ciphers and a good
passphrase, except for the swap file. If you are talking about Winbloze and
you have enough RAM (1G or more) consider permanently disabling your swap
file for better overall security.
"Crypto is only as good as the weakest bone in your body"
Thanks for the reply,

I encrypt the my entire PC, all drives are completely encrypted,
including my boot drive. Note the swap file is in the c:\ root area,
and is rebuilt everytime I re-start Win7. I'm sure it's encrypted,
too.

I'm concerned about the readyboost flash drive being vulnerable since
it's not encrypted. Any ideas?
Kulin Remailer
2010-07-12 22:03:20 UTC
Permalink
Post by Richard Malchik
I'm concerned about the readyboost flash drive being vulnerable since
it's not encrypted. Any ideas?
I don't know what readyboost is but you can use truecrypt to encrypt a
regular flash drive just like any other disk or partition.
Frank Merlott
2010-07-23 09:30:46 UTC
Permalink
Post by Richard Malchik
I encrypt the my entire PC, all drives are completely encrypted,
including my boot drive. Note the swap file is in the c:\ root area,
and is rebuilt everytime I re-start Win7. I'm sure it's encrypted,
too.
I'm concerned about the readyboost flash drive being vulnerable since
it's not encrypted. Any ideas?
Yes that is vulnerable, ReadyBoost is not encrypted by Truecrypt and there
are all kind of data that could be stored there, even passwords and
usernames.

Just disable it, ReadyBoost performance gains aren't so huge, if you have a
decent amount of RAM you don't even need it, you can disable ReadyBoost
from
within Windows.
Ryan McGinnis
2010-07-27 04:38:39 UTC
Permalink
Post by Frank Merlott
Yes that is vulnerable, ReadyBoost is not encrypted by Truecrypt and there
are all kind of data that could be stored there, even passwords and
usernames.
Just disable it, ReadyBoost performance gains aren't so huge, if you have a
decent amount of RAM you don't even need it, you can disable ReadyBoost
from
within Windows.
Readyboost employs AES-128; while I wouldn't be surprised if there is a
backdoor of some kind built into it by Microsoft, it's unlikely to be
something that is going to be a problem for 99.999% of people trying to
secure their data. It could pose a vulnerability to Truecrypt, though,
but you have to a bit on the paranoid side to worry about that. If
you're worried about the kinds of people who could break Readyboost's
AES-128 getting access to your data, you probably shouldn't be posting
here.

- --
- -Ryan McGinnis
The BIG Storm Picture -- http://bigstormpicture.com
Vortex-2 image licensing at http://vortex-2.com
Getty: http://www.gettyimages.com/search/search.aspx?artist=Ryan+McGinnis
Nomen Nescio
2010-07-27 11:29:28 UTC
Permalink
Post by Ryan McGinnis
Readyboost employs AES-128; while I wouldn't be surprised if there is a
backdoor of some kind built into it by Microsoft, it's unlikely to be
something that is going to be a problem for 99.999% of people trying to
secure their data. It could pose a vulnerability to Truecrypt, though,
but you have to a bit on the paranoid side to worry about that. If
you're worried about the kinds of people who could break Readyboost's
AES-128 getting access to your data, you probably shouldn't be posting
here.
Why not? Where should he be posting?
Ryan McGinnis
2010-07-27 14:48:14 UTC
Permalink
Post by Nomen Nescio
Post by Ryan McGinnis
Readyboost employs AES-128; while I wouldn't be surprised if there is a
backdoor of some kind built into it by Microsoft, it's unlikely to be
something that is going to be a problem for 99.999% of people trying to
secure their data. It could pose a vulnerability to Truecrypt, though,
but you have to a bit on the paranoid side to worry about that. If
you're worried about the kinds of people who could break Readyboost's
AES-128 getting access to your data, you probably shouldn't be posting
here.
Why not? Where should he be posting?
He shouldn't be. Whoever trained him to hide whatever it is that he's
trying to hide should have answered those questions already. Of course,
it doesn't sound like that's really the case with him -- but my point is
that for the overwhelming majority of people, Readyboost is secure
enough to not worry about.

- --
- -Ryan McGinnis
The BIG Storm Picture -- http://bigstormpicture.com
Vortex-2 image licensing at http://vortex-2.com
Getty: http://www.gettyimages.com/search/search.aspx?artist=Ryan+McGinnis
George Orwell
2010-07-27 21:56:29 UTC
Permalink
Post by Ryan McGinnis
He shouldn't be. Whoever trained him to hide whatever it is that he's
trying to hide should have answered those questions already. Of course,
it doesn't sound like that's really the case with him -- but my point is
that for the overwhelming majority of people, Readyboost is secure
enough to not worry about.
Anything from Microslop is worth worrying about. I don't think anyone
trained him I think he is a just a guy asking reasonable questions given
he doesn't have any background in crypto....most people don't. Readyboost
sounds like the weak link in the chain. I would dump it and just use TC.

Il mittente di questo messaggio|The sender address of this
non corrisponde ad un utente |message is not related to a real
reale ma all'indirizzo fittizio|person but to a fake address of an
di un sistema anonimizzatore |anonymous system
Per maggiori informazioni |For more info
https://www.mixmaster.it

Anne Onime
2010-07-13 09:03:02 UTC
Permalink
Richard Malchik wrote in alt.security.pgp on Monday 12 July 2010 10:28 in
Post by Richard Malchik
It obviously protects against neighborhood break-ins, but is it really
secure against all others that may want access to financial records
and writings and the like? Are there any "back-doors?"
Richard
Perhaps these articles will answer your question.

===========================================================================

Brazilian banker's crypto baffles FBI
18 months of failure

By John Leyden -

Posted in Enterprise Security, 28th June 2010 11:49 GMT

http://www.theregister.co.uk/2010/06/28/brazil_banker_crypto_lock_out/

Cryptographic locks guarding the secret files of a Brazilian banker
suspected of financial crimes have defeated law enforcement officials.

Brazilian police seized five hard drives when they raided the Rio apartment
of banker Daniel Dantas as part of Operation Satyagraha in July 2008. But
subsequent efforts to decrypt files held on the hardware using a variety of
dictionary-based attacks failed even after the South Americans called in
the assistance of the FBI.

The files were encrypted using Truecrypt and an unnamed algorithm,
reportedly based on the 256-bit AES standard. In the UK, Dantas would be
compelled to reveal his passphrase under threat of imprisonment, but no
such law exists in Brazil.

The Brazilian National Institute of Criminology (INC) tried for five months
to obtain access to the encrypted data without success before turning over
the job to code-breakers at the FBI in early 2009. US computer specialists
also drew a blank even after 12 months of efforts to crack the code,
Brazil's Globo newspaper reports.

http://g1.globo.com/English/noticia/2010/06/not-even-fbi-can-de-crypt-files-daniel-dantas.html

The case is an illustration of how care in choosing secure (hard-to-guess)
passwords and applying encryption techniques to avoid leaving file fragments
that could aid code breakers are more important in maintaining security than
the algorithm a code maker chooses. In other cases, law enforcement officials
have defeated suspects' use of encryption because of weak cryptographic
trade craft or poor passwords, rather than inherent flaws in encryption
packages.

===========================================================================

FBI hackers fail to crack TrueCrypt

Open source encryption on Brazilian banker's hard drive
baffles police dictionary attack

By John E Dunn - Computerworld UK
Published: 10:55 GMT, 30 June 10

http://news.techworld.com/security/3228701/fbi-hackers-fail-to-crack-truecrypt/

The FBI has admitted defeat in attempts to break the open source encryption
used to secure hard drives seized by Brazilian police during a 2008
investigation.

The Bureau had been called in by the Brazilian authorities after the
country's own National Institute of Criminology (INC) had been unable to
crack the passphrases used to secure the drives by suspect banker, Daniel
Dantas.

Brazilian reports state that two programs were used to encrypt the drives,
one of which was the popular and widely-used free open source program
TrueCrypt. Experts in both countries apparently spent months trying to
discover the passphrases using a dictionary attack, a technique that
involves trying out large numbers of possible character combinations until
the correct sequence is found.

Brazilian reports mention that the authorities had no means of compelling
the makers of TrueCrypt to help them though it is hard to see how its
creators could have helped.

If a complex passphrase has been used -- a random mixture of upper and lower
case letters with numbers and special ASCII characters throw in -- and the
bit length is long, formidable computing power and time would be required
to chance upon the correct passphrase.

TrueCrypt also uses what is termed a 'deniable file system' approach to
encrypting whole hard drives. Under this design, the existence of the
encrypted partition will not be obvious to anyone examining the drive
allowing the individual using such encryption to plausibly deny its
existence.

The logic is persuasive. If an encrypted partition or files is detected by
investigators is puts the person using the encryption in the difficult
position of having to refuse to disclose the passphrase, a potentially
incriminating stance.

By interesting coincidence, around the time of the arrest of Daniel Dantas
in 2008, a team including encryption celebrity Bruce Schneier found
weaknesses in Truecrypt 5.1's implementaion of the technology that could
compromise the plausible deniability design.

Although 'data leakage' of the sort noted by the team examining TrueCrypt
would not allow investigators access to the encrypted files it is possible
that this flaw betrayed the fact that encryption had been used by the
defendant.

===========================================================================
Loading...