Bitcoin Forum
December 09, 2016, 01:38:19 PM *
News: Latest stable version of Bitcoin Core: 0.13.1  [Torrent].
 
   Home   Help Search Donate Login Register  
Pages: [1]
  Print  
Author Topic: [tutorial]How to use Truecrypt on a flash drive  (Read 1464 times)
Ampix0
Full Member
***
Offline Offline

Activity: 168



View Profile WWW
June 07, 2011, 09:02:20 PM
 #1

This will help many of you to keep bitcoin related items safe

http://www.youtube.com/watch?v=LIZFMwKe8yE

1481290699
Hero Member
*
Offline Offline

Posts: 1481290699

View Profile Personal Message (Offline)

Ignore
1481290699
Reply with quote  #2

1481290699
Report to moderator
Bitcoin mining is now a specialized and very risky industry, just like gold mining. Amateur miners are unlikely to make much money, and may even lose money. Bitcoin is much more than just mining, though!
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction. Advertise here.
1481290699
Hero Member
*
Offline Offline

Posts: 1481290699

View Profile Personal Message (Offline)

Ignore
1481290699
Reply with quote  #2

1481290699
Report to moderator
1481290699
Hero Member
*
Offline Offline

Posts: 1481290699

View Profile Personal Message (Offline)

Ignore
1481290699
Reply with quote  #2

1481290699
Report to moderator
1481290699
Hero Member
*
Offline Offline

Posts: 1481290699

View Profile Personal Message (Offline)

Ignore
1481290699
Reply with quote  #2

1481290699
Report to moderator
gigabytecoin
Sr. Member
****
Offline Offline

Activity: 280


View Profile
June 13, 2011, 04:47:18 AM
 #2

First thing this guy says is that truecrypt is crackable. Is that true???
Jaime Frontero
Full Member
***
Offline Offline

Activity: 126


View Profile
June 13, 2011, 08:02:35 AM
 #3

First thing this guy says is that truecrypt is crackable. Is that true???

no.  the encryption is unbreakable, used per the manual.
Alex Beckenham
Full Member
***
Offline Offline

Activity: 154


View Profile
June 13, 2011, 08:03:24 AM
 #4

It's not unbreakable. It just hasn't been broken yet.

Jaime Frontero
Full Member
***
Offline Offline

Activity: 126


View Profile
June 13, 2011, 08:06:01 AM
 #5

It's not unbreakable. It just hasn't been broken yet.


well, ok.

it is unbreakable within a timeframe roughly analogous to that of the heat death of the universe, by any known method which can currently be brought to bear.

the FBI can't break it.  good enough for me.
Ampix0
Full Member
***
Offline Offline

Activity: 168



View Profile WWW
June 13, 2011, 10:55:14 AM
 #6

Wrong. it has indeed been broken

the key for truecrypt. (the encrypted key) is dumped into your ram the moment the usb is added.
A new method for cracking this involves powering down the PC, freezing the ram (hold keyboard cleaner upside down and spray) and then booting the computer from a USB device that captures all the data on the ram

from there you have the encryption key unprotected and ready for cracking.

http://www.youtube.com/watch?v=JDaicPIgn9U&feature=player_embedded

From wikipedia: http://en.wikipedia.org/wiki/TrueCrypt

Quote
Passwords stored in memory

TrueCrypt stores its keys in RAM; on an ordinary personal computer the DRAM will maintain its contents for several seconds after power is cut (or longer if the temperature is lowered). Even if there is some degradation in the memory contents, various algorithms can intelligently recover the keys. This method, known as a cold boot attack (which would apply in particular to a notebook computer obtained while in power-on, suspended, or screen-locked mode), has been successfully used to attack a file system protected by TrueCrypt.[20]

Jaime Frontero
Full Member
***
Offline Offline

Activity: 126


View Profile
June 13, 2011, 05:25:09 PM
 #7

Wrong. it has indeed been broken

the key for truecrypt. (the encrypted key) is dumped into your ram the moment the usb is added.
A new method for cracking this involves powering down the PC, freezing the ram (hold keyboard cleaner upside down and spray) and then booting the computer from a USB device that captures all the data on the ram

from there you have the encryption key unprotected and ready for cracking.

http://www.youtube.com/watch?v=JDaicPIgn9U&feature=player_embedded

From wikipedia: http://en.wikipedia.org/wiki/TrueCrypt

Quote
Passwords stored in memory

TrueCrypt stores its keys in RAM; on an ordinary personal computer the DRAM will maintain its contents for several seconds after power is cut (or longer if the temperature is lowered). Even if there is some degradation in the memory contents, various algorithms can intelligently recover the keys. This method, known as a cold boot attack (which would apply in particular to a notebook computer obtained while in power-on, suspended, or screen-locked mode), has been successfully used to attack a file system protected by TrueCrypt.[20]

oh stop it.

the cold boot attack is not 'breaking' - it is taking advantage of user error, bad luck, and/or sloppiness.

it is just as correct (which is; not at all) to say that beating someone with a rubber hose is breaking the encryption.

it isn't.  and we both know it.  semantic games.

i stand:  it is unbreakable.
Alex Beckenham
Full Member
***
Offline Offline

Activity: 154


View Profile
June 13, 2011, 09:01:25 PM
 #8

semantic games.

i stand:  it is unbreakable.

Semantics perhaps, but to say it's unbreakable is to say you can predict the future.

Pages: [1]
  Print  
 
Jump to:  

Sponsored by , a Bitcoin-accepting VPN.
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!