Bitcoin Forum

Other => Off-topic => Topic started by: Ampix0 on June 07, 2011, 09:02:20 PM



Title: [tutorial]How to use Truecrypt on a flash drive
Post by: Ampix0 on June 07, 2011, 09:02:20 PM
This will help many of you to keep bitcoin related items safe

http://www.youtube.com/watch?v=LIZFMwKe8yE


Title: Re: [tutorial]How to use Truecrypt on a flash drive
Post by: gigabytecoin on June 13, 2011, 04:47:18 AM
First thing this guy says is that truecrypt is crackable. Is that true???


Title: Re: [tutorial]How to use Truecrypt on a flash drive
Post by: Jaime Frontero on June 13, 2011, 08:02:35 AM
First thing this guy says is that truecrypt is crackable. Is that true???

no.  the encryption is unbreakable, used per the manual.


Title: Re: [tutorial]How to use Truecrypt on a flash drive
Post by: Alex Beckenham on June 13, 2011, 08:03:24 AM
It's not unbreakable. It just hasn't been broken yet.


Title: Re: [tutorial]How to use Truecrypt on a flash drive
Post by: Jaime Frontero on June 13, 2011, 08:06:01 AM
It's not unbreakable. It just hasn't been broken yet.


well, ok.

it is unbreakable within a timeframe roughly analogous to that of the heat death of the universe, by any known method which can currently be brought to bear.

the FBI can't break it.  good enough for me.


Title: Re: [tutorial]How to use Truecrypt on a flash drive
Post by: Ampix0 on June 13, 2011, 10:55:14 AM
Wrong. it has indeed been broken

the key for truecrypt. (the encrypted key) is dumped into your ram the moment the usb is added.
A new method for cracking this involves powering down the PC, freezing the ram (hold keyboard cleaner upside down and spray) and then booting the computer from a USB device that captures all the data on the ram

from there you have the encryption key unprotected and ready for cracking.

http://www.youtube.com/watch?v=JDaicPIgn9U&feature=player_embedded

From wikipedia: http://en.wikipedia.org/wiki/TrueCrypt

Quote
Passwords stored in memory

TrueCrypt stores its keys in RAM; on an ordinary personal computer the DRAM will maintain its contents for several seconds after power is cut (or longer if the temperature is lowered). Even if there is some degradation in the memory contents, various algorithms can intelligently recover the keys. This method, known as a cold boot attack (which would apply in particular to a notebook computer obtained while in power-on, suspended, or screen-locked mode), has been successfully used to attack a file system protected by TrueCrypt.[20]


Title: Re: [tutorial]How to use Truecrypt on a flash drive
Post by: Jaime Frontero on June 13, 2011, 05:25:09 PM
Wrong. it has indeed been broken

the key for truecrypt. (the encrypted key) is dumped into your ram the moment the usb is added.
A new method for cracking this involves powering down the PC, freezing the ram (hold keyboard cleaner upside down and spray) and then booting the computer from a USB device that captures all the data on the ram

from there you have the encryption key unprotected and ready for cracking.

http://www.youtube.com/watch?v=JDaicPIgn9U&feature=player_embedded

From wikipedia: http://en.wikipedia.org/wiki/TrueCrypt

Quote
Passwords stored in memory

TrueCrypt stores its keys in RAM; on an ordinary personal computer the DRAM will maintain its contents for several seconds after power is cut (or longer if the temperature is lowered). Even if there is some degradation in the memory contents, various algorithms can intelligently recover the keys. This method, known as a cold boot attack (which would apply in particular to a notebook computer obtained while in power-on, suspended, or screen-locked mode), has been successfully used to attack a file system protected by TrueCrypt.[20]

oh stop it.

the cold boot attack is not 'breaking' - it is taking advantage of user error, bad luck, and/or sloppiness.

it is just as correct (which is; not at all) to say that beating someone with a rubber hose is breaking the encryption.

it isn't.  and we both know it.  semantic games.

i stand:  it is unbreakable.


Title: Re: [tutorial]How to use Truecrypt on a flash drive
Post by: Alex Beckenham on June 13, 2011, 09:01:25 PM
semantic games.

i stand:  it is unbreakable.

Semantics perhaps, but to say it's unbreakable is to say you can predict the future.