(and if it doesn't involve salting.) Probably not the best example for comparison since mobile forensics is a different beast than a simple encrypted container. 6 digit passcodes with only numbers on a simple container would likely only take a few minutes, depending on the processing power at hand. ![]() Irrelvant submissions will be pruned in an effort towards tidiness. Vote based on the quality of the content. Topics include digital forensics, incident response, malware analysis, and more. This subreddit is not limited to just the computers and encompasses all media that may also fall under digital forensics (e.g., cellphones, video, etc.). The field is the application of several information security principles and aims to provide for attribution and event reconstruction following forth from audit processes. It's not without vulnerabilities, either: the recovery passphrase can be stolen (though it doesn't have to be used all the time, so the risk is lower), the TPM can be cracked (unlikely), or the user's Windows login could be compromised.įor more information on full disk encryption software, check out this wiki article.A community dedicated towards the branch of forensic science encompassing the recovery and investigation of material found in digital devices, often in relation to computer crime. To be sure, there are restrictions in using BitLocker: you have to be running Windows 7 Ultimate or similar and have a TPM-capable computer. The cryptography algorithms used by both TrueCrypt and BitLocker are fairly strong, and would require a lot of resources, both physical (access to the hard drive) and computational to crack, but I prefer BitLocker because it is built according to the philosophy of "your Windows login should be the only security you need, and your hard drive should transparently boot windows if it is in its original computer." Yeah, you can log in with your username and password, but first you have to enter this one at the black screen with the white text-that password is 'password'") or by writing it down on a post-it somewhere easily readable. Either by sharing it with others ("Hey, Bob, I'm not there right now, but just get those files off of my computer. This leaves users' hard drive encryption vulnerable to the most common attack in the world: password compromise. This brings me to the biggest (IMO) weakness with TrueCrypt: it requires users to memorize and repeatedly enter another password. A recovery password is also provided, but it is typically not needed and can be stored in a secure location. BitLocker can be configured to authenticate against the TPM in your computer, such that a unique key is stored and provided at boot time without you having to know the password. One of the main alternatives to TrueCrypt (if you're using Windows) is BitLocker. In addition to comments, there are a couple of other things to consider when evaluating TrueCrypt. This is also true of any encryption or security product. You really should read all the TrueCrypt documentation to ensure you are using it properly, as, for example, the full disk encryption is useless if someone walks up to your machine while you are away and you did not lock your computer. ![]() Also pick a really long and strong passphrase. This is why TrueCrypt offers cascaded algorithms where you can use multiple algorithms at once, at the cost of speed. It's not insurmountable that someone could find weakness in AES256 or the other algorithms availble to Truecrypt in the future. I will say that the algorithms TrueCrypt uses to encipher data are industry standard, not crackable without an impractical amount of computation power (unless you select a poor password) and well used and respected by many who are security conscious. If you are paranoid, compile it yourself on a trusted system. The fact that the source code is available in the first place usually says a lot. Only in that way will you know exactly what the software is doing and whether or not it meets your needs and threat model. To really answer the question for yourself you need to look at the source code, or pay someone to do that for you and accept liability for issuing guarantees to you. In evaluating any encryption software, there's a lot to consider.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |