| Re: Interesting reading regarding TrueCrypt |
Anonymous, Inc. |
| The Lookout (the_lookout@nym.mixmin.net) |
2010/04/06 16:22 |
"-C\"0,SM'0S." <Ow@Zats.com> wrote:
>The Lookout <the_lookout@nym.mixmin.net> wrote in
>news:20100406005749.AB8FB8144E@fleegle.mixmin.net:
>
>> http://www.stoned-vienna.com/
>>
>
>Hi Lookout
>
>I had seen the RSA notes before and read abut the threat to AES and the
>1028 bit key files
>
>The http://www.stoned-vienna.com/ boot kit was new and more
>problematical
>
>
>And some what disconcerting to say the least!
Hi Cosmos,
Here is another link that goes into a little more detail.
http://www.h-online.com/security/news/item/Bootkit-bypasses-hard-disk-encryp
tion-742721.html
I guess this would be another reason for not logging in as administrator.
The bad thing is that you could only log in as administrator once and
still possibly get infected.
>I have run drive crypt plus pack for a few years and up-rated to the 256
>bit hash key
>
>But still continue to use BC containers within the volumes using a
>different pass phrase
>
>Make things a little slower.
>
>I find backup can be made of the OS and volumes using Acronis disk image
>software
>
>Which I find works very well for the volume encrypted OS
>
>I am not sure if the hidden os option with Drive crypt plus pack is
>vulnerable to the stoned boot kit
>
>Regards Cosmos
The stoned boot kit loads in before the TrueCrypt loader, so anything on
the disk is vulnerable.
Take care,
The Lookout
|
| Follow-ups: | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 |
|
|