Anyone else use TrueCrypt or similar data encryption software for their notebook / netbook and if no

Soldato
Joined
4 Apr 2003
Posts
8,079
I have only recently started using TrueCrypt for my laptop and upon reflection I think I have been somewhat slack for not using it sooner. Especially as this is my main computer and a portable device which, unsurprisingly, I carry about most of the time or leave in the boot of my car.

Although I have always kept sensitive personal or client / work details on a separate FIPS AES Memory Stick, I now keep these encrypted on the laptop.

So I would be interested to know if you encrypt your notebooks/netbooks or don’t bother and if not why not? This thread here shows how easy it is to bypass the win passwords http://forums.overclockers.co.uk/showthread.php?t=18308189 as an example.
 
There's little point these days. Most sensitive data should be kept in the cloud anyway. TrueCrypt can be broken in under 3 minutes with the right tools, and, as such, you end up needing multiple encryption tools, all of which need some user entry, in order to keep any laptop safe. TrueCrypt is fairly easy to pass when the drive is removed from the laptop. Almost instantly infact if mounted to another system, it can be viewed and written to. I've even see recovery programs pull data from TrueCrypt drives without any issue.

One of the best is using BitLocker where the harddrive is tied to the machine. Sure, if the whole laptop is stolen you can bypass the passwords fairly easily, but that leads me back to my point about having multiple protection. Invariably however, people will use the same password for protection making it almost redundant in the first place.

The othe bone of contention with these "one file virtual disks" is physical disk life can be significantly reduced, although that is true of bitlocker too

PreyProject would be my choice assuming they don't wipe the drive immediately, although hardware encryption (bitlocker) is always better than software encryption (TrueCrypt, PreyProject)
 
Last edited:
I haven't found anything on the net to suggest it is easy to access the files in a truecrypt volume, although there is indication it is possible for a system drive encryption. Are you talking about a brute force on the password? that is the same for any encryption programme and down to the strength of your password? or are you referring to a drive which has had the whole system volume encrypted?

As for recovering data, you would still need the encryption keys, then you may be able to recover once mounted, you can't just pull files from the TrueCrypt volume unless you are referring to a trucrypt encryption of the whole system volume and not just a container.
 
Either volume, disk or folder. Mouting and using a recovery programme will pull the data from it with no password or encryption keys needed. It might not be complete but it will be fragmented enough to piece together. It's software based, it's fallible. The fact it's open sourced means any one of it's numerous contributors will be aware of a backdoor for such events as forgotten keys / passwords etc. The recovery method is one such backdoor.

Financial institutions won't use it (or any software based encryption), and, knowing what you do, I can't see any reason why a simple folder password wouldn't suffice for your private data :)

You mention you sometimes leave your laptop in the boot of your car. For arguments sake, if it was in sleep or in hibernate, it would be possible to access your laptop without me evening opening the boot of your car. I know I can tell you how when I see you rather than posting on here, but it will make you think twice about ever leaving your laptop unattended in any shape or form. Keeping it near you at all times is simply the best form of protection you can have.
 
There's little point these days. Most sensitive data should be kept in the cloud anyway. TrueCrypt can be broken in under 3 minutes with the right tools, and, as such, you end up needing multiple encryption tools, all of which need some user entry, in order to keep any laptop safe. TrueCrypt is fairly easy to pass when the drive is removed from the laptop. Almost instantly infact if mounted to another system, it can be viewed and written to. I've even see recovery programs pull data from TrueCrypt drives without any issue.

Lol - im afraid this is complete rubbish. Truecrypt, when used correctly, is one of the best in the business and I would much prefer it over the alternatives.
 
Lol - im afraid this is complete rubbish. Truecrypt, when used correctly, is one of the best in the business and I would much prefer it over the alternatives.

Really, It's just funny you mention it's rubbish when I worked for 4 months using Hunter machines to walk straight past Truecrypt encryption for the FCO during their evaluation cycle. I guess you should contact them and tell them my report is rubbish ;)
 
I don't use it because of the overhead on the system. If I do have any sensitive data I'll usually encrypt it via other means.
 
Really, It's just funny you mention it's rubbish when I worked for 4 months using Hunter machines to walk straight past Truecrypt encryption for the FCO during their evaluation cycle. I guess you should contact them and tell them my report is rubbish ;)
So come on, you can't just make such an extraordinary claim without providing specifics.
 
So come on, you can't just make such an extraordinary claim without providing specifics.

Knowing his client (s), he won't be able to say, he probably shouldn't have hinted at it in the first place, but given the systems and software he is talking about then yes TrueCrypt along with any encryption software could be vulnerable.

I was really referring to home / small business use for this though as I can’t imagine many on here would be targeted by people capable of, or with the motivation to crack the encryption. More just that if someone steals or finds the laptop if they even know what to do with an encrypted container / drive will be flogging on or just wiping if there is nothing obvious to see.

I still can’t find any evidence of TrueCrypt containers being vulnerable unless they are brute forced.
 
Exactly, so it makes TrueCrypt pointless unless your laptop is stolen and recovered and hasn't been tampered with. The drive can be zeroed dead easily, so either way you've lost all your data. Unless you have data that the theif specifically wants, there is no need to hammer your system with TrueCrypt. You've answered the scenario yourself in that no one will have the need or want to do that to your laptop, you're not in a position for them to want to. The laptop is of greater value. Zero the disc > install Windows > sell. Meanwhile, you've lost all your data because you didn't back it up to a proper secure removable device or the cloud.
 
Back
Top Bottom