Path: news.nzbot.com!spool1.sonic-news.com!news-out.sonic-news.com!iad.highwinds-media.com!feeder.news-service.com!news.alt.net!fictitious-path
From: The Lookout <the_lookout@nym.mixmin.net>
Subject: Re: Interesting reading regarding TrueCrypt
Newsgroups: alt.fan.prettyboy
References: <4bb91527$0$15439$c3e8da3@news.astraweb.com>
Organization: Anonymous, Inc.
X-No-Archive: yes
Message-ID: <20100406010806.E785581461@fleegle.mixmin.net>
Date: Tue, 6 Apr 2010 02:08:06 +0100 (BST)
Mail-To-News-Contact: abuse@dizum.com
Lines: 85
Xref: news.nzbot.com alt.fan.prettyboy:9104
Travis The Dragon AKA insane for boys wrote:
>On 2010-04-04 05:58:10 -0500, The Lookout <the_lookout@nym.mixmin.net>
>said:
>
>> "_C'0-SM-oS," <oezse@sats.com> wrote:
>>> Hi lookout
>>>
>>> Interesting reading and thanks for the heads up note,
>>>
>>> I am not sure but this seems to relate to a computer that is up and
>>> running but locked by the user
>>>
>>> Not sure if it works with ones that have been off or/and the drives
>>> dismounted
>>>
>>> What is your understanding of the claims of the Software Company?
>>>
>>> Cosmos
>>>
>>>
>>> One more example for not leaving a computer running and UN attended
>even
>>> if its screen locked
>>
>> Hi Cosmos,
>>
>> It does require that the encrypted volume be mounted. I was thinking
>about
>> how many of us rely on a passworded screensaver or 'Windows-L' when
>leaving
>> our computer unattended for only a couple of minutes.
>>
>> We should make it a habit of dismounting and clearing cached passwords
>each
>> and every time we step away.
>>
>> Take care,
>> The Lookout
>
>Here's a thought: Truecrypt allows you to use files as keyhashes
>instead of an actual password. So what if you, for example, use 10
>mp3's as keyhashes and have say, 5 mp3's burned on one disc and 5 on
>another? When you want to mount, you just copy the mp3's onto your
>harddrive and after you dismount, delete the mp3's.
Hi Insane,
I'm afraid that the result would be the same if the keyhash/passphrase
is cached. It really isn't the mathematics behind the encryption that
they are defeating, it's the decryption key/passphrase stored in memory
that is being copied. That attack requires that your encrypted volume
be mounted, even though your computer is screen locked (Windows key+L).
It's best to just dismount and clear cached passwords to be safe when
stepping away.
Take care,
The Lookout
|
| Follow-ups: | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 |
|