encryption softs

Discussion in 'Windows OS and Software' started by decetrebuie, Jun 19, 2008.

Thread Status:
Not open for further replies.
  1. PhoenixFx

    PhoenixFx Notebook Virtuoso

    Reputations:
    744
    Messages:
    3,083
    Likes Received:
    0
    Trophy Points:
    105
    The only reason why anyone would want a full disk encryption including the OS (as OP is insisting) is because of potential security threats posed by temporary files or other programs installed without the owner’s authorization etc. Therefore if he really wants it then the only alternative I can think of is using an encrypted VM.
    I assumed OP is using a single HDD notebook therefore if he does a full disk encryption, it will be always slow, even if he is not working with sensitive files. Of cause using a VM on an encrypted partition will be slower than having a full disk encryption, but at least he has normal performance (if he use normal unencrypted OS partition) whenever he is not using sensitive data (the VM), that’s why I said “if you are not regularly working with sensitive data, then use a VM”. Because if he only works with those data like 10% of the time, then he is sacrificing performance on the other 90% of the time.
     
  2. AKAJohnDoe

    AKAJohnDoe Mime with Tourette's

    Reputations:
    1,163
    Messages:
    3,017
    Likes Received:
    0
    Trophy Points:
    105
    Many corporations laptops are fully encrypted and use VPN. It seems to be a reasonable precaution.
     
  3. Icewalker

    Icewalker Notebook Consultant

    Reputations:
    63
    Messages:
    105
    Likes Received:
    0
    Trophy Points:
    30
    Two words: True Crypt:

    http://www.truecrypt.org/
     
  4. stewie

    stewie What the deuce?

    Reputations:
    3,666
    Messages:
    2,174
    Likes Received:
    0
    Trophy Points:
    55
    By the way, encryption is a bit overrated, it's not as safe as what most people think. [​IMG]

    <object width='425' height='344'><param name="movie" value="http://www.youtube.com/v/JDaicPIgn9U&hl=en"></param><embed src="http://www.youtube.com/v/JDaicPIgn9U&hl=en" type="application/x-shockwave-flash" width='425' height='344'></embed></object>

    Princeton study: Disk encryption not safe

    22.02.2008

    [​IMG]

    Researchers with Princeton University and the Electronic Frontier Foundation have found a flaw that renders disk encryption systems useless if an intruder has physical access to your computer &#8212; say in the case of a stolen laptop or when a computer is left unattended on a desktop in sleep mode or while displaying a password prompt screen. The attack takes only a few minutes to conduct and uses the disk encryption key that&#8217;s stored in the computer&#8217;s RAM. The attack works because content as well as encryption keys stored in RAM linger in the system, even after the machine is powered off, enabling an attacker to use the key to collect any content still in RAM after reapplying power to the machine.

    &#8220;We&#8217;ve broken disk encryption products in exactly the case when they seem to be most important these days: laptops that contain sensitive corporate data or personal information about business customers,&#8221; said J. Alex Halderman, one of the researchers, in a press release. &#8220;Unlike many security problems, this isn&#8217;t a minor flaw; it is a fundamental limitation in the way these systems were designed.&#8221; The researchers successfully performed the attack on several disk encryption systems &#8212; Apple&#8217;s FileVault, Microsoft&#8217;s BitLocker, as well as TrueCrypt and dm-crypt &#8212; but said they have no reason to believe it won&#8217;t work on other disk encryption systems as well, since they all share similar architectures. They released a paper about their work as well as a video demonstration (available at YouTube) of the attack.

    Source: Wired
     
    Last edited by a moderator: May 8, 2015
  5. orev

    orev Notebook Virtuoso

    Reputations:
    809
    Messages:
    2,836
    Likes Received:
    1
    Trophy Points:
    56
    That study performed the attack by having a tightly controlled environment where they were able to remove live RAM from a running system and then place it in another specialized system to read the data from it. This scenario is highly unlikely for anyone but the most highly skilled researchers, who are not the kind of people who steal data. Maybe if you were a highly targeted person then someone would be able to get you, but they'd get you somehow anyway.

    Disk encryption is mainly for people who are worried about a thief stealing the laptop with important data on it and preventing them from getting to it. These types of thieves are opportunistic, so they are not specifically targeting you. Once you become a specific target, there are numerous ways they can get what they want.
     
  6. stewie

    stewie What the deuce?

    Reputations:
    3,666
    Messages:
    2,174
    Likes Received:
    0
    Trophy Points:
    55
    Yes it was a controlled environment. But you're still missing something, they also showed how it could work without even removing the RAM at all. A lot of people keep their notebook on standby instead of turning off.

    Anyway, you're right, if you're targeted, they will get what they want one way or another. I posted this mostly for corporate users who seem to be worried the most. All I was trying is say is that encryption isn't as safe as people think.
     
Loading...
Thread Status:
Not open for further replies.

Share This Page