Scorbing Posted February 2, 2013 Share Posted February 2, 2013 This is scary. I guess encryption with those applications is no longer useful.Check this link out:http://www.lostpassw...-decryption.htm Link to comment https://www.neowin.net/forum/topic/1134378-bitlocker-and-truecrypt-useless-against-passware-forensic/ Share on other sites More sharing options...
ZakO Posted February 2, 2013 Share Posted February 2, 2013 What? It has been known forever that you can retrieve encryption keys if you dump the contents of memory (raw or hiberfil.sys while hibernated) but that relies on the computer being on and the encrypted filesystem being mounted. No, this absolutely doesn't make truecrypt/bitlocker "useless" / "no longer useful". Link to comment https://www.neowin.net/forum/topic/1134378-bitlocker-and-truecrypt-useless-against-passware-forensic/#findComment-595497632 Share on other sites More sharing options...
Scorbing Posted February 2, 2013 Author Share Posted February 2, 2013 What? It has been known forever that you can retrieve encryption keys if you dump the contents of memory (raw or hiberfil.sys while hibernated) but that relies on the computer being on and the encrypted filesystem being mounted. No, this absolutely doesn't make truecrypt/bitlocker "useless" / "no longer useful". So they will not be able to break into an external hard drive that is encrypted then? A backup hard drive I mean. Link to comment https://www.neowin.net/forum/topic/1134378-bitlocker-and-truecrypt-useless-against-passware-forensic/#findComment-595497650 Share on other sites More sharing options...
syobon999 Posted February 2, 2013 Share Posted February 2, 2013 Nope, the latest truecrypt version fixed this strong truecrypt key = virtually impossible breaking. Link to comment https://www.neowin.net/forum/topic/1134378-bitlocker-and-truecrypt-useless-against-passware-forensic/#findComment-595497654 Share on other sites More sharing options...
ZakO Posted February 2, 2013 Share Posted February 2, 2013 So they will not be able to break into an external hard drive that is encrypted then? A backup hard drive I mean. If for example you have an external HDD encrypted and lose the HDD they can't break in to it (without brute forcing, which would take millions of years if you have a decent encryption key). The scenario in the video you posted would rely on the encrypted external HDD being connected to your computer, the encrypted volume being mounted, and a person having access to your computer so they can dump the memory to retrieve the keys. An encrypted HDD on its own would be useless to them. Link to comment https://www.neowin.net/forum/topic/1134378-bitlocker-and-truecrypt-useless-against-passware-forensic/#findComment-595497662 Share on other sites More sharing options...
Scorbing Posted February 2, 2013 Author Share Posted February 2, 2013 If for example you have an external HDD encrypted and lose the HDD they can't break in to it (without brute forcing, which would take millions of years if you have a decent encryption key). The scenario in the video you posted would rely on the encrypted external HDD being connected to your computer, the encrypted volume being mounted, and a person having access to your computer so they can dump the memory to retrieve the keys. An encrypted HDD on its own would be useless to them. Ah, I see...Interesting. I am new to this encryption stuff so I am curious about it. I find it very interesting how companies and groups like the folks that make TrueCrypt can make programs that not even the government with their sophisticated technology can break into. Amazing. Link to comment https://www.neowin.net/forum/topic/1134378-bitlocker-and-truecrypt-useless-against-passware-forensic/#findComment-595497664 Share on other sites More sharing options...
Breach Posted February 3, 2013 Share Posted February 3, 2013 Jesus, that's security 101. There are good practices to follow, read more here: http://www.truecrypt.org/docs/?s=physical-security In summary: 1. Hibernation is your enemy. You don't want a copy of your RAM anywhere. 2. Keys ARE purged when TrueCrypt can DISMOUNT the volume and that's what you should always do. Link to comment https://www.neowin.net/forum/topic/1134378-bitlocker-and-truecrypt-useless-against-passware-forensic/#findComment-595497680 Share on other sites More sharing options...
primexx Posted February 3, 2013 Share Posted February 3, 2013 does this guy work for the government? "they'll get you!!! not fearmongering but THEY'LL GET YOUUU!!! If you're a bad guy don't even bother!" Link to comment https://www.neowin.net/forum/topic/1134378-bitlocker-and-truecrypt-useless-against-passware-forensic/#findComment-595497954 Share on other sites More sharing options...
Scorbing Posted February 3, 2013 Author Share Posted February 3, 2013 does this guy work for the government? "they'll get you!!! not fearmongering but THEY'LL GET YOUUU!!! If you're a bad guy don't even bother!" LOL...LOL...LOL Maybe he speaks from personal experience. Maybe they got him at one point for being stupid! Link to comment https://www.neowin.net/forum/topic/1134378-bitlocker-and-truecrypt-useless-against-passware-forensic/#findComment-595497956 Share on other sites More sharing options...
Recommended Posts