TrueCrypt

Does it affect performance?

good question. i tested by creating a 2 gig volume for individual files, and i noticed zero difference in performance there, but i'm curious myself insofar as a system level. magcshoom, jryan21, ccarter, igl00, others?
 


Having encrypted volumes on you're drive won't impact performance, and the TrueCrypt app itself is pretty light. I've used it for years without issue, and would definitely recommend it.

But don't pay any attention to me. I do have some experience with cryptography, but not nearly as much as our hacker-guru friend Leemoor does. You should ignore everyone but him, he clearly knows his stuff.
 
You might mean well, but the total sum of your posts is zero. You don't cite any credible sources and you are about as technical as my grand mother.

The source I cite is credible to me. I'm not going to ask him to make a post on his blog on how Truecrypt is vulnerable and then link it here, or dig up existing resources.

As for my technical knowledge, I've said it myself that I do not have a good enough understanding of cryptography. Do you?

Now, unless any of you guys have examined the source code of TrueCrypt yourself, none of your words are anymore credible than mine, and far less than his.

Seems legit.

Again, take it or leave it. What you think of me, TrueCrypt, or anything else, doesn't make a difference to me. I simply thought I could help keep a few people from making the wrong decision based on what I believe is right. Beyond that, I do not care about your opinion of my opinion. At the end of the day it's just an online forum where I hang out in free time.

If you are good at cryptography and want to know what he said, feel free to add me on Skype and I'll tell you. But I prefer not posting anything worthwhile on open forums. Skype: leemoorwf

And I've read enough of your posts to know not to get into a war or wits with you at 4AM. ;p
 
I did ask him what according to him was the most secure, and he said an algorithm you've made yourself was the most secure.

Problem is, I doubt anyone is going to create their own algo and them implement it across multiple platforms. It'll make more sense if you actually stated WHY we shouldn't use it, then just saying, not to use it cause you "talked to him".

Sounds like Fed/government talk/propaganda to me... The FBI tried to crack it for over a year and got hi-level intelligence operatives involved, yet were unable to for a case. Of course a person working as an undercover or Fed would state not to use it, cause it makes their job impossible. :anon.sml:

There hasn't been any cases of it being cracked, so please enlighten us on why we shouldn't use it, or just don't post next time you have nothing to say.​
 
Problem is, I doubt anyone is going to create their own algo and them implement it across multiple platforms.​

exactly. that's what i meant by my "posted on my own forum" comment. i was using fucking WinLocker (lol), was looking for a decent improvement & found what appears to be the mother of all freeware upgrades. i wasn't looking to go mcguyver based on the advice of a guy that knows a guy that knows a guy.
 
Again, take it or leave it. What you think of me, TrueCrypt, or anything else, doesn't make a difference to me. I simply thought I could help keep a few people from making the wrong decision based on what I believe is right. Beyond that, I do not care about your opinion of my opinion. At the end of the day it's just an online forum where I hang out in free time.

If you are good at cryptography and want to know what he said, feel free to add me on Skype and I'll tell you. But I prefer not posting anything worthwhile on open forums. Skype: leemoorwf

And I've read enough of your posts to know not to get into a war or wits with you at 4AM. ;p

I'm just sayin' - you didn't say anything. That's all I'm saying.
 


The FBI tried to crack it for over a year and got hi-level intelligence operatives involved, yet were unable to for a case. Of course a person working as an undercover or Fed would state not to use it, cause it makes their job impossible. :anon.sml:
.​

Source?
 
exactly. that's what i meant by my "posted on my own forum" comment. i was using fucking WinLocker (lol), was looking for a decent improvement & found what appears to be the mother of all freeware upgrades. i wasn't looking to go mcguyver based on the advice of a guy that knows a guy that knows a guy.

I'm just sayin' - you didn't say anything. That's all I'm saying.

We're getting to the bottom of it. There was a general lack of knowledge of how TrueCrypt works on his part, and he admits he never installed it or used it. Just that one dudes said not to use it. He was unaware of the nesting algo capabilities, and the fact that it's open source. He will ask the "professional" guy on exactly why it's crackable later on today.

I suspect he mis-heard the guy, since the statement he made to me went against EVERYTHING open source stands for. Hint, has to do with the algo, which is open source in itself. I explain that since it's open source ANY small security feature would be frontpage news AND patched within hours.

Since it's an open source ENCRYPTION program, that of all things would be scrutinized beyond believe, especially where the algo is concerned. He admits he is only passing on what was stated to him AND NEVER TESTED IT OR EVEN USED THE PROGRAM... EVER...

First K-Noop now this... It must be "make shit up" / "pass online random shit that has not been proven but you consider fact" day, in a celebratory troll of our Füher's Bday or something.

Carry on...​


 

that's a good question, i don't know the answer to it. however, if you've been thru keygen process where you scramble the digits by vigorously swirling your mouse, its tough to imagine that getting cracked. like you, i'd like to read the report tho.

EDIT: this post was made during ccarter's, which is better & posts the link we've been talking about. see that.
 
Don't use it.
I talked about this in another thread as well about it not being secure.
Update on it: I met the guy as well and asked him about it but couldn't really understand it - he's a professional cryptographer and I have zero experience with it, and I'm not going to post what he said on an open forum.

I did ask him what according to him was the most secure, and he said an algorithm you've made yourself was the most secure.

So your mate thinks his own crypto algorithm is better than AES?

Encryption algorithms aren't crackable if you have the source code if that's your line of thinking. Until quantum computers are invented that let people factorise prime numbers in polynomial time, AES is pretty good encryption with a decent password and certainly more secure than anything your friend comes up with.

But I can already guess what your mate told you, that the NSA have a backdoor for AES. Tin foil hat shit. It's an urban myth.
 
can't name another forum where a single request about an open source software gets 30-40 quality responses within a matter of hours. i hoped for one. thanks guys, i really appreciate it.
 
We're getting to the bottom of it. There was a general lack of knowledge of how TrueCrypt works on his part, and he admits he never installed it or used it. Just that one dudes said not to use it. He was unaware of the nesting algo capabilities, and the fact that it's open source. He will ask the "professional" guy on exactly why it's crackable later on today.

I suspect he mis-heard the guy, since the statement he made to me went against EVERYTHING open source stands for. Hint, has to do with the algo, which is open source in itself. I explain that since it's open source ANY small security feature would be frontpage news AND patched within hours.

Since it's an open source ENCRYPTION program, that of all things would be scrutinized beyond believe, especially where the algo is concerned. He admits he is only passing on what was stated to him AND NEVER TESTED IT OR EVEN USED THE PROGRAM... EVER...







Mostly right. I'm most probably going to meet him today and confirm what he said.
I originally did look into Truecrypt myself, and was impressed because it was open source.

First K-Noop now this... It must be "make shit up" / "pass online random shit that has not been proven but you consider fact" day, in a celebratory troll of our Füher's Bday or something.

I'm not quite sure how you can quote/prove an offline statement online.

Lets take an analogy so you guys can understand it better:
It's the same as me quoting a local doctor on something on his own research when online resources say differently, in this case my local doctor is this guy when he was infamous: Jack Andraka - Wikipedia, the free encyclopedia
And no, I'm not going to learn medicine just to explain it to a bunch of guys on a forum, I'm going to trust my doctor because he's a credible sources of the information to me.


Anyway, no point discussing it till I talk to him about it. Noted down a couple of points to talk to him about.
Some guys are interested in bashing a random guy online who is unaffected by it for their own amusement when they themselves have no more credible sources than hearsay from sources they haven't even seen(which in itself makes my source more credible than theirs), while some are genuinely interested. The first ones remind me of BHW and it's mob mentality.
 
Why wouldn't an algorithm you made yourself be more secure? Wouldn't it be harder to crack?
Genuine question.

Using your own algorithm is just security through obscurity.

Everyone knows exactly how AES works, yet the FBI can't crack it. If the FBI were to figure out what cute homemade algorithm you were using, you'd last maybe 5 minutes before everything got cracked.
 
Don't use it.
I talked about this in another thread as well about it not being secure.
Update on it: I met the guy as well and asked him about it but couldn't really understand it - he's a professional cryptographer and I have zero experience with it, and I'm not going to post what he said on an open forum.

I did ask him what according to him was the most secure, and he said an algorithm you've made yourself was the most secure.

HAHAHHAHAhahhaHAHahhahhahaHAHAHHAHAHahhah AHHA HAHAHAHHAHAhahHAhAHAHAH

where are these idiots coming from?

TrueCrypt has no NSA/FBI backdoor /thread
 
I remember the topic of Truecrypt popping up here a few years ago, which was quite the interesting read: http://www.wickedfire.com/shooting-shit/99433-do-you-use-truecrypt.html

Some gems and nice ideas from that thread:

I've been using it a while and I like it. Before you use it, make sure you go through the whole manual and know exactly what you want to do. So far, I've never had a problem losing a drive.

There are a number of different methods you can use; sometimes I'll take a junk file and put it in with some driver files and use that either as a hidden volume or keyfile. If you pay attention to the filesizes, it's pretty easy to make it blend in with the others.

There's also options to create encrypted partitions and/or OS partitions but if that's not enough, you can create another hidden partition inside the encrypted system partition to hold another OS, so that if you are forced to give up the password for the first one, they are only gonna have access to the decoy OS and if you know what you're doing, they will never know about the real one.

I'm gonna try that next, soon as I get around to clearing off enough space on these drives.

I should have read this entire thread over again before replying to so many posts separately, but oh well.

As stated, plausible deniability is the key to this.

Basically, as far as a file goes, here's how it works...

Say you have "Rachael_gets_ass_rammed_vol3.avi" as your source file.

In TC, you will make a new PD-based encrypted "partition". You can make it any size you want (within the means of your drive of course), but let's say you make it 10 GB.

Then, for the main encryption partition, you choose "Rachel_gets_ass_rammed_vol3.avi". TC will now over-write this file (or create it if it isn't there). The file will keep the same file name, but now be 10gb in size.

Now, within that file, is your hidden volume. Let's say this is 8GB.

Your password for the outer, main volume is: myeasypass
But, your password for the 8gb hidden volume is: mysuperfuckinghard2guesspasswordthatonlyIknow!

Now, when you use TC you go to mount your shit, you find "Rachel_gets_ass_rammed_vol3.avi" on the drive, and select it. It will ask you for your password.

You unlock it with "myeasypass" and it will mount a 10gb drive. You open it, and throw in some files that look sensitive, but really aren't. Bank account info, some cock pictures, a few legit porn videos, etc.

Then you dismount it, and never put anymore files on there.

Now, you go back to mount a volume again, and once again select "Rachel_gets_ass_rammed_vol3.avi".

This time, when it asks for the pass, you use "mysuperfuckinghard2guesspasswordthatonlyIknow" and viola! It mounts the hidden 8gb drive.

Now you store your REAL sensitive/private shit within that.

Now, when all is said and done, you have 1 encrypted file that is hard to find.

When found (by the Customs Agents in this case), they could beat you and threaten you until you open it. You give in. You open it with "myeasypass" and they see your cock pics and bank info and a little porn and let you go.

They won't know the hidden volume is there because it's invisible, it isn't a "file" and the outer volume shows that it has 8gb of free space.

See how it works now?

I know this is a shitty explanation, but fuck it, hopefully it makes sense.

Also, you can do the same thing with Windows.

You can create a "main" windows and a "hidden" windows. You would use the "main" copy when you boot, use it, store some files on it, make it look used.

Then, you would use your "hidden" copy for your daily activities.

If you are ever forced to boot your computer, you enter the pass that unlocks the "main" windows, and you are good to go.