Bitcoin Forum
December 12, 2024, 08:12:23 PM *
News: Latest Bitcoin Core release: 28.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: [tutorial]How to use Truecrypt on a flash drive  (Read 1698 times)
Ampix0 (OP)
Full Member
***
Offline Offline

Activity: 168
Merit: 100



View Profile WWW
June 07, 2011, 09:02:20 PM
 #1

This will help many of you to keep bitcoin related items safe

http://www.youtube.com/watch?v=LIZFMwKe8yE

gigabytecoin
Sr. Member
****
Offline Offline

Activity: 280
Merit: 252


View Profile
June 13, 2011, 04:47:18 AM
 #2

First thing this guy says is that truecrypt is crackable. Is that true???
Jaime Frontero
Full Member
***
Offline Offline

Activity: 126
Merit: 100


View Profile
June 13, 2011, 08:02:35 AM
 #3

First thing this guy says is that truecrypt is crackable. Is that true???

no.  the encryption is unbreakable, used per the manual.
Alex Beckenham
Full Member
***
Offline Offline

Activity: 154
Merit: 100


View Profile
June 13, 2011, 08:03:24 AM
 #4

It's not unbreakable. It just hasn't been broken yet.

Jaime Frontero
Full Member
***
Offline Offline

Activity: 126
Merit: 100


View Profile
June 13, 2011, 08:06:01 AM
 #5

It's not unbreakable. It just hasn't been broken yet.


well, ok.

it is unbreakable within a timeframe roughly analogous to that of the heat death of the universe, by any known method which can currently be brought to bear.

the FBI can't break it.  good enough for me.
Ampix0 (OP)
Full Member
***
Offline Offline

Activity: 168
Merit: 100



View Profile WWW
June 13, 2011, 10:55:14 AM
 #6

Wrong. it has indeed been broken

the key for truecrypt. (the encrypted key) is dumped into your ram the moment the usb is added.
A new method for cracking this involves powering down the PC, freezing the ram (hold keyboard cleaner upside down and spray) and then booting the computer from a USB device that captures all the data on the ram

from there you have the encryption key unprotected and ready for cracking.

http://www.youtube.com/watch?v=JDaicPIgn9U&feature=player_embedded

From wikipedia: http://en.wikipedia.org/wiki/TrueCrypt

Quote
Passwords stored in memory

TrueCrypt stores its keys in RAM; on an ordinary personal computer the DRAM will maintain its contents for several seconds after power is cut (or longer if the temperature is lowered). Even if there is some degradation in the memory contents, various algorithms can intelligently recover the keys. This method, known as a cold boot attack (which would apply in particular to a notebook computer obtained while in power-on, suspended, or screen-locked mode), has been successfully used to attack a file system protected by TrueCrypt.[20]

Jaime Frontero
Full Member
***
Offline Offline

Activity: 126
Merit: 100


View Profile
June 13, 2011, 05:25:09 PM
 #7

Wrong. it has indeed been broken

the key for truecrypt. (the encrypted key) is dumped into your ram the moment the usb is added.
A new method for cracking this involves powering down the PC, freezing the ram (hold keyboard cleaner upside down and spray) and then booting the computer from a USB device that captures all the data on the ram

from there you have the encryption key unprotected and ready for cracking.

http://www.youtube.com/watch?v=JDaicPIgn9U&feature=player_embedded

From wikipedia: http://en.wikipedia.org/wiki/TrueCrypt

Quote
Passwords stored in memory

TrueCrypt stores its keys in RAM; on an ordinary personal computer the DRAM will maintain its contents for several seconds after power is cut (or longer if the temperature is lowered). Even if there is some degradation in the memory contents, various algorithms can intelligently recover the keys. This method, known as a cold boot attack (which would apply in particular to a notebook computer obtained while in power-on, suspended, or screen-locked mode), has been successfully used to attack a file system protected by TrueCrypt.[20]

oh stop it.

the cold boot attack is not 'breaking' - it is taking advantage of user error, bad luck, and/or sloppiness.

it is just as correct (which is; not at all) to say that beating someone with a rubber hose is breaking the encryption.

it isn't.  and we both know it.  semantic games.

i stand:  it is unbreakable.
Alex Beckenham
Full Member
***
Offline Offline

Activity: 154
Merit: 100


View Profile
June 13, 2011, 09:01:25 PM
 #8

semantic games.

i stand:  it is unbreakable.

Semantics perhaps, but to say it's unbreakable is to say you can predict the future.

Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!