67 posts in this topic

Posted

I'd prefer an open-source solution, but a paid version would be fine as long as it's cheaper than the $100 Win 8.1 Pro upgrade (the only way to get BitLocker AFAIK).

 

I want to use it to encrypt my laptop and my external music drive.

 

Thanks!

1 person likes this

Share this post


Link to post
Share on other sites

Posted

...Windows 8.1, 8, and 7 pro all have Bitlocker. What OS are you using?

Share this post


Link to post
Share on other sites

Posted

Ok, apparently only 7 ultimate has Bitlocker. Still helpful to know what OS you're running.

Share this post


Link to post
Share on other sites

Posted

google for truecrypt alternatives. there are quite a few out there i would use over bitlocker. the fact that truecrypt website now recommands bitlocker and even has a guide how to migrate is scary itself. i dont wanna know how much money was involved. :s

Share this post


Link to post
Share on other sites

Posted

google for truecrypt alternatives. there are quite a few out there i would use over bitlocker. the fact that truecrypt website now recommands bitlocker and even has a guide how to migrate is scary itself. i dont wanna know how much money was involved. :s

What a conspiracy!  Or maybe the developers got tired of their thankless work and wanted to push people to something that worked well.

Share this post


Link to post
Share on other sites

Posted

Want to keep those Bieber albums top secret, huh? :laugh:

 

Seriously though, why would you want to encrypt a drive with only music on it? Just asking.

1 person likes this

Share this post


Link to post
Share on other sites

Posted

1 person likes this

Share this post


Link to post
Share on other sites

Posted

I'd prefer an open-source solution, but a paid version would be fine as long as it's cheaper than the $100 Win 8.1 Pro upgrade (the only way to get BitLocker AFAIK).

 

I want to use it to encrypt my laptop and my external music drive.

 

Thanks!

linux has built in HD encryption tool, give it a go

Share this post


Link to post
Share on other sites

Posted

personally gonna stick with 7.1a until a fork takes off (looking like this is goona be worth keeping an eye on http://truecrypt.ch/)

Share this post


Link to post
Share on other sites

Posted

Truecrypt isn't gone, 7.1 still works fine. It will be forked in the future, its pretty much guaranteed.

Share this post


Link to post
Share on other sites

Posted

Check http://prism-break.org

dm-crypt with LUKS for Linux

Anything else, encfs.

Share this post


Link to post
Share on other sites

Posted

I found this one very interesting as an alternative to Truecrypt and most likely the one I will use. DiskCryptor. I found the video that shows it working:

 

I will likely try this later because in some ways it seems better than even truecrypt ever was. Especially with the boot disk functionality.

Share this post


Link to post
Share on other sites

Posted

Dumb question, since I never had a TPM chip to just mess with... if you use a TPM chip to encrypt using Bit locker, and say the TPM chip is destroyed, it would in essence be impossible to ever recover the encrypted data?

Share this post


Link to post
Share on other sites

Posted

I have been using Data Protecto www.dataprotecto.com for a few months with no problems at all, very easy to use and lots of features, not just plain encryption.

1 person likes this

Share this post


Link to post
Share on other sites

Posted

Dumb question, since I never had a TPM chip to just mess with... if you use a TPM chip to encrypt using Bit locker, and say the TPM chip is destroyed, it would in essence be impossible to ever recover the encrypted data?

In principle, as long as you've created Bitlocker recovery keys (as per Bitlocker's instructions) you should be fine. I've never tried this myself though (certainly wouldn't want a destroyed TPM).

Share this post


Link to post
Share on other sites

Posted

Check http://prism-break.org

dm-crypt with LUKS for Linux

Anything else, encfs.

 

That's old, outdated, and it shouldn't be used (afaik). There's a new one called encryptfs, I think, or something similar.

Share this post


Link to post
Share on other sites

Posted

That's old, outdated, and it shouldn't be used (afaik). There's a new one called encryptfs, I think, or something similar.

It was audited recently in January 2014, but I guess lack of updates is a problem.

DiskCryptor would be my second recommendation.

And possibly do you mean eCryptfs?

Share this post


Link to post
Share on other sites

Posted

I'd prefer an open-source solution, but a paid version would be fine as long as it's cheaper than the $100 Win 8.1 Pro upgrade (the only way to get BitLocker AFAIK).

 

I want to use it to encrypt my laptop and my external music drive.

 

Thanks!

 

 

...Windows 8.1, 8, and 7 pro all have Bitlocker. What OS are you using?

Linux has all sorts of free open source tools available if that's what you're using.  Ubuntu and Debian both offer you the option to encrypt an entire hard drive/partition or just your home folder on install, plus you can set up seahorse to generate a PGP key to use with Thunderbird or Evolution when sending e-mail.  The "Disks" utility in Ubuntu/Debian allows you to format external drives as an encrypted EXT4 filesystem.

 

From my understanding, Windows has Bitlocker.

 

All of the tools available for Linux probably have OSX ports/versions since it's just a super modified Unix port.

Share this post


Link to post
Share on other sites

Posted

And possibly do you mean eCryptfs?

 

I'm not 100%, it may have been eCryptfs. I read that either on Ars Technica or Stack Overflow, and IIRC it was highly upvoted so I guess it must be true (because we know everything said on the Internet is true!). It was also mentioned that Fedora are in the process of removing or deprecating encfs, or something along those lines.

1 person likes this

Share this post


Link to post
Share on other sites

Posted

TrueCrypt hasn't suddenly disappeared or become insecure. Its developers have abandoned it. This means that

 

 - if vulnerabilities are discovered,

AND

 - the project was not forked, is not maintained and the vulnerabilities will not be fixed

 

then TrueCrypt will be insecure. But both of these conditions have yet to materialize. So far there is still plenty of interest around TrueCrypt, with an audit presently in progress, and it seems unlikely to remain unmaintained for long. If anything, it's likely to see more activity and fixes now that its original developers, who hadn't released a new version since 2012, have officially given up on it.

 

And NO I'm not going to use Bitlocker. With everything Snowden has released about wiretapping and backdoors I wouldn't rely on closed-source technology.

4 people like this

Share this post


Link to post
Share on other sites

Posted

I have been using Data Protecto www.dataprotecto.com for a few months with no problems at all, very easy to use and lots of features, not just plain encryption.

Looks interesting

Share this post


Link to post
Share on other sites

Posted

Dumb question, since I never had a TPM chip to just mess with... if you use a TPM chip to encrypt using Bit locker, and say the TPM chip is destroyed, it would in essence be impossible to ever recover the encrypted data?

 

BitLocker cannot be enabled on a bootable device unless a recovery method is generated and saved to a USB device or Active Directory.

 

For my personal devices I always disable Recovery Passwords.  They are limited to 48 numeric characters, and thus the easiest to brute force.  Recovery Keys are significantly stronger.  Depends on your tastes, or if it's being deployed to end users who may need to receive a recovery password to a laptop on the road over the phone.

 

You can always remove or add protectors after the disk is encrypted, so you can purge all recovery options if you really wanted to.  There may be a limit to how many total protectors can be assigned to a partition, but I've never hit it.

 

I have another post about BitLocker and TPM chips here:

http://www.neowin.net/forum/topic/1215495-truecrypt-shuts-down-due-to-alleged-security-issues/page-6#entry596428145

1 person likes this

Share this post


Link to post
Share on other sites

Posted

As of right now you can't claim any of that, we don't know if TC is safe, or if anyone with the right tool can bust open any TC volume in seconds and the devs found out and simply closed shop.

As for BitLocker. Again there's no magic key that can open all volumes it's pretty much impossible and any back doors would be detectable with the amount of scrutiny the code of such apps go through, you don't need the source to find such obvious exploits like back doors.

1 person likes this

Share this post


Link to post
Share on other sites

Posted

Some more TrueCrypt stuff, for those interested:

The audit will continue to Phase II and will look at how good the entropy is and will check for back doors in the random number generator

Also, the audit found that there were vulnerabilities, but no government back doors or anything deliberately put in https://opencryptoaudit.org/reports/iSec_Final_Open_Crypto_Audit_Project_TrueCrypt_Security_Assessment.pdf

Maybe that's why they closed the project.

The 7.1a source code is available here:

https://github.com/FreeApophis/TrueCrypt

A fork has been made (from the same people who made the source available):

http://truecrypt.ch/

And they have every single TrueCrypt version you would ever want:

http://truecrypt.ch/download/

Share this post


Link to post
Share on other sites

Posted

Some more TrueCrypt stuff, for those interested:

The audit will continue to Phase II and will look at how good the entropy is and will check for back doors in the random number generator

Also, the audit found that there were vulnerabilities, but no government back doors or anything deliberately put in https://opencryptoaudit.org/reports/iSec_Final_Open_Crypto_Audit_Project_TrueCrypt_Security_Assessment.pdf

Maybe that's why they closed the project.

The 7.1a source code is available here:

https://github.com/FreeApophis/TrueCrypt

A fork has been made (from the same people who made the source available):

http://truecrypt.ch/

And they have every single TrueCrypt version you would ever want:

http://truecrypt.ch/download/

What does the fork mean with regards to the project? Is it possible that we might see a continuing trusted release?

Share this post


Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!


Register a new account

Sign in

Already have an account? Sign in here.


Sign In Now
Sign in to follow this  
Followers 0

  • Recently Browsing   0 members

    No registered users viewing this page.