Does it affect performance?
good question. i tested by creating a 2 gig volume for individual files, and i noticed zero difference in performance there, but i'm curious myself insofar as a system level. magcshoom, jryan21, ccarter, igl00, others?
Does it affect performance?
You might mean well, but the total sum of your posts is zero. You don't cite any credible sources and you are about as technical as my grand mother.
Seems legit.
I did ask him what according to him was the most secure, and he said an algorithm you've made yourself was the most secure.
Problem is, I doubt anyone is going to create their own algo and them implement it across multiple platforms.
Again, take it or leave it. What you think of me, TrueCrypt, or anything else, doesn't make a difference to me. I simply thought I could help keep a few people from making the wrong decision based on what I believe is right. Beyond that, I do not care about your opinion of my opinion. At the end of the day it's just an online forum where I hang out in free time.
If you are good at cryptography and want to know what he said, feel free to add me on Skype and I'll tell you. But I prefer not posting anything worthwhile on open forums. Skype: leemoorwf
And I've read enough of your posts to know not to get into a war or wits with you at 4AM. ;p
The FBI tried to crack it for over a year and got hi-level intelligence operatives involved, yet were unable to for a case. Of course a person working as an undercover or Fed would state not to use it, cause it makes their job impossible. :anon.sml:
.
I prefer not posting anything worthwhile on open forums.
exactly. that's what i meant by my "posted on my own forum" comment. i was using fucking WinLocker (lol), was looking for a decent improvement & found what appears to be the mother of all freeware upgrades. i wasn't looking to go mcguyver based on the advice of a guy that knows a guy that knows a guy.
I'm just sayin' - you didn't say anything. That's all I'm saying.
Source?
Source?
Don't use it.
I talked about this in another thread as well about it not being secure.
Update on it: I met the guy as well and asked him about it but couldn't really understand it - he's a professional cryptographer and I have zero experience with it, and I'm not going to post what he said on an open forum.
I did ask him what according to him was the most secure, and he said an algorithm you've made yourself was the most secure.
I did ask him what according to him was the most secure, and he said an algorithm you've made yourself was the most secure.
We're getting to the bottom of it. There was a general lack of knowledge of how TrueCrypt works on his part, and he admits he never installed it or used it. Just that one dudes said not to use it. He was unaware of the nesting algo capabilities, and the fact that it's open source. He will ask the "professional" guy on exactly why it's crackable later on today.
I suspect he mis-heard the guy, since the statement he made to me went against EVERYTHING open source stands for. Hint, has to do with the algo, which is open source in itself. I explain that since it's open source ANY small security feature would be frontpage news AND patched within hours.
Since it's an open source ENCRYPTION program, that of all things would be scrutinized beyond believe, especially where the algo is concerned. He admits he is only passing on what was stated to him AND NEVER TESTED IT OR EVEN USED THE PROGRAM... EVER...
First K-Noop now this... It must be "make shit up" / "pass online random shit that has not been proven but you consider fact" day, in a celebratory troll of our Füher's Bday or something.
He's either pulling your leg or he's full of shit.
Why wouldn't an algorithm you made yourself be more secure? Wouldn't it be harder to crack?
Genuine question.
Don't use it.
I talked about this in another thread as well about it not being secure.
Update on it: I met the guy as well and asked him about it but couldn't really understand it - he's a professional cryptographer and I have zero experience with it, and I'm not going to post what he said on an open forum.
I did ask him what according to him was the most secure, and he said an algorithm you've made yourself was the most secure.
where are these idiots coming from?
TrueCrypt has no NSA/FBI backdoor /thread
I've been using it a while and I like it. Before you use it, make sure you go through the whole manual and know exactly what you want to do. So far, I've never had a problem losing a drive.
There are a number of different methods you can use; sometimes I'll take a junk file and put it in with some driver files and use that either as a hidden volume or keyfile. If you pay attention to the filesizes, it's pretty easy to make it blend in with the others.
There's also options to create encrypted partitions and/or OS partitions but if that's not enough, you can create another hidden partition inside the encrypted system partition to hold another OS, so that if you are forced to give up the password for the first one, they are only gonna have access to the decoy OS and if you know what you're doing, they will never know about the real one.
I'm gonna try that next, soon as I get around to clearing off enough space on these drives.
I should have read this entire thread over again before replying to so many posts separately, but oh well.
As stated, plausible deniability is the key to this.
Basically, as far as a file goes, here's how it works...
Say you have "Rachael_gets_ass_rammed_vol3.avi" as your source file.
In TC, you will make a new PD-based encrypted "partition". You can make it any size you want (within the means of your drive of course), but let's say you make it 10 GB.
Then, for the main encryption partition, you choose "Rachel_gets_ass_rammed_vol3.avi". TC will now over-write this file (or create it if it isn't there). The file will keep the same file name, but now be 10gb in size.
Now, within that file, is your hidden volume. Let's say this is 8GB.
Your password for the outer, main volume is: myeasypass
But, your password for the 8gb hidden volume is: mysuperfuckinghard2guesspasswordthatonlyIknow!
Now, when you use TC you go to mount your shit, you find "Rachel_gets_ass_rammed_vol3.avi" on the drive, and select it. It will ask you for your password.
You unlock it with "myeasypass" and it will mount a 10gb drive. You open it, and throw in some files that look sensitive, but really aren't. Bank account info, some cock pictures, a few legit porn videos, etc.
Then you dismount it, and never put anymore files on there.
Now, you go back to mount a volume again, and once again select "Rachel_gets_ass_rammed_vol3.avi".
This time, when it asks for the pass, you use "mysuperfuckinghard2guesspasswordthatonlyIknow" and viola! It mounts the hidden 8gb drive.
Now you store your REAL sensitive/private shit within that.
Now, when all is said and done, you have 1 encrypted file that is hard to find.
When found (by the Customs Agents in this case), they could beat you and threaten you until you open it. You give in. You open it with "myeasypass" and they see your cock pics and bank info and a little porn and let you go.
They won't know the hidden volume is there because it's invisible, it isn't a "file" and the outer volume shows that it has 8gb of free space.
See how it works now?
I know this is a shitty explanation, but fuck it, hopefully it makes sense.
Also, you can do the same thing with Windows.
You can create a "main" windows and a "hidden" windows. You would use the "main" copy when you boot, use it, store some files on it, make it look used.
Then, you would use your "hidden" copy for your daily activities.
If you are ever forced to boot your computer, you enter the pass that unlocks the "main" windows, and you are good to go.