[Boards: 3 / a / aco / adv / an / asp / b / biz / c / cgl / ck / cm / co / d / diy / e / fa / fit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mu / n / news / o / out / p / po / pol / qa / r / r9k / s / s4s / sci / soc / sp / t / tg / toy / trash / trv / tv / u / v / vg / vp / vr / w / wg / wsg / wsr / x / y ] [Home]
4chanarchives logo
Veracrypt thread. Does anyone us it? Experiences? I was encrypting
Images are sometimes not shown due to bandwidth/network limitations. Refreshing the page usually helps.

You are currently reading a thread in /g/ - Technology

Thread replies: 63
Thread images: 6
File: VmgvHT6P.png (42 KB, 512x512) Image search: [Google]
VmgvHT6P.png
42 KB, 512x512
Veracrypt thread.

Does anyone us it? Experiences?

I was encrypting my external hard drive today and selected the 1-Wipe mode thinking it would be a security feature for WHEN you want to wipe your drive, and even in the 1-Wipe mode it says it will take 33 more hours to finish. Which is a pain in the ass, but my main concern is, is it actually wiping my fucking drive? It didn't give any warning saying that. My drive isn't being wiped right now is it? Holy fuck..
>>
>>55048615
bump.
Where my Veracrypt experts at?
>>
>>55048615
just get truecrypt 7.1a
>>
>>55049049
Wow thanks a lot that really answers my question.
I have drive that is in the middle of being encrypted -- like I can just jump over to a different program. Truecrypt has been dead for over a year anyway, what the fuck are you talking about?
>>
>>55049081
>the moment devs stop working on a program, it immediately ceases to function
>>
>>55049110
>warrant canary left
>devs tell the community to NOT use their software and move on
Ok.
>>
>>55048615
Yes, it's actually wiping your fucking drive. What else do you think it would be doing? Also, what on earth gave you the impression that selecting a 1-pass wipe was going to do something OTHER than wiping your drive?
>>
Used it.
Worked no problems.
Disk got corrupted somehow so had to reformat everything.
Used it again.
Worked no problems.

If it's a botnet then I guess it's a botnet. That truecrypt audit said it had vulnerabilities fixed in Veracrypt.

I don't know what you're autisming about regarding drive wiping. 1pass zero write is enough; 2 is overkill. Shut shouldn't take 33 hours to wipe unless you're DBANing which is just plain stupid and you shouldn't be using encryption software if you do that.
>>
>>55049162
It isn't actually deleting my drive contents is it?
>>
>>55049152
Because they way it described it, it sounded like some mechanism for when you want to wipe your drive.......
AHHHHHHHHHHHHHHHHHHHHHH
brb gonna go blow my brains out
>>
>>55049152
This is how Veracrypt describes wiping:


VeraCrypt reads a data block into memory for encrypting.
For wipe modes, VeraCrypt writes random data to the same data block on the target device N times depending on which option the user selected for the wipe mode.
After all wipe operations are completed, VeraCrypt writes the encrypted data block back to the target device.

That doesn't sound like it will delete everything. It sounds like, it is going to fill it will random data, and then re write the encrypted data back on.
>>
Recently moved from Realcrypt to Veracrypt.

Not sure if it makes a difference, seeing as there are still updates coming to Realcrypt.

They're not the same thing though since I don't see Veracrypt features in Realcrypt.
>>
>>55049230
>I selected 1-Wipe mode
Yes, it's deleting your shit right now. Very slowly for some reason though.
>>
>>55049372
I paused it. It is at 17.8%
Will I be able to recover any of it?
Also if it is deleting my shit why does it say this:
"After all wipe operations are completed, VeraCrypt writes the encrypted data block back to the target device."
>>
>>55049399
I think it would be dumber to stop in the process.
>>
>>55049399
Did you choose wipe or encrypt when you started the process
If former, yes it's deleting
If latter, no it's encrypting

For fucks sake this isn't hard to understand.
>>
File: 1262315868823.jpg (52 KB, 360x365) Image search: [Google]
1262315868823.jpg
52 KB, 360x365
>>55049399

I h-hope you have b-backups
>>
>>55049399
If you're lucky it hasn't touched your data yet. How much free space did you have?
>>
>>55049421
No. Pausing is entirely fine.
>>55049425
It has to encrypt first, it is not one or the other.
I chose the 1-Wipe also, but the description is very misleading.
Considering that
1. The first reply doesn't realize that pausing it does no harm
and
2.The second reply doesn't realize it is not either/or.
It sounds like neither of you, or anyone in this thread really understands what the 1-Wipe does.
>>55049444
I don't, sadly.
And I had the entire truths of world history in there, and more. I mean, there is not a single drive in existence more important data on it. But no one would believe me, and it doesn't matter.
>>
UNPLUG THE POWER CABLE NOW
>>
>>55049513
I only had 70 GB or so out of a 1 TB drive.
>>
>>55049399
How will it write the data back in? Will it be stored in memory?

You sound fucked.
>>
File: fuck.jpg (6 KB, 169x251) Image search: [Google]
fuck.jpg
6 KB, 169x251
>>55049534

Damn, this is a conundrum. I'm unsure what I'd do in this situation besides cry.

You either resume wiping hoping that it is gonna just put the encrypted data back on, or, cancel and recover what hasn't been securely wiped.

I had an incident long ago using partition magic on one of my data drives. One partition resize gone wrong and all my data vanished. I recovered the data over two days and since that I always have backups.

Live and learn.
>>
>>55049534
Veracrypt user here:

It wipes the drive before copying the encrypted files back onto it. Your drive is safe. Veracrypt has no file shredder tool or usage. Just let it finish.
>>
here's an idea

stop downloading pornographic videos of children being raped
>>
>>55048615
>Not using bitlocker
PLEBS
L
E
B
S
>>
>>55049613
>it keeps 930GB of encrypted data in memory before completely wiping the drive and then writing back the encrypted data
>sounds legit
>>
>>55049603
>You either resume wiping hoping that it is gonna just put the encrypted data back on, or, cancel and recover what hasn't been securely wiped.
This is exactly my conundrum right. I've been have an anxiety attack for the past hour. ALL, and I mean ALL of my data is on there. The cream of everything that is important.
>>55049601
I got a vague reply from a pro Veracrypt user at a forum and basically he said this:
"After all wipe operations are completed, VeraCrypt writes the encrypted data block back to the target device."
>>55049613
This is exactly what I thought initially.
See, I am not fucking retarded. I watched out to see if it gave any warning message like "your files will be deleted"
etc. and there was no such thing.
>>55049631
>If you have nothing to hide why do you want privacy, hmm?
Thanks, Obama.
>>
File: 1433176547937.png (184 KB, 939x705) Image search: [Google]
1433176547937.png
184 KB, 939x705
>>55049633
>>
OP, you're obviously not getting anywhere here, so do a scientific test.

Get a flash drive, put an image on it, then do what you're doing now.

The results will speak for themselves.
>>
>>55049647

It does the reading/writing in blocks you mong
>>
>>55049647
Maybe it uses the drive itself and does it in portions?
>>
>>55049667
>put an image
Put enough data to exceed the amount of RAM you have, then try.
>>
>>55048615
>it says it will take 33 more hours to finish
Why do you have a 8TB harddrive in your potato?
>>
>>55049649
>I watched out to see if it gave any warning message like "your files will be deleted"

I think it'll be fine then. Let it continue.
>>
>>55049647
Are you completely fucking retarded or what?

>>55049649
>This is what I thought initially
Desu you should have just picked no wipe. Why didn't you?
>>
>>55049687
>>55049688
Hive mind. Just what I was thinking.
Thanks man, you've been the most helpful in this thread.
>>55049729
The 35-Wipe option would've taken 3 weeks
>>55049745
I don't know I just wanted the most security :(
>>
>>55049687
>>55049688
I'm sure faith is the answer. Let's just assume it does this. No risk!
>>
>>55049774
Can anyone confirm that it does do this so I can stop worrying?
I mean I did get an answer from someone who works at veracrypt, and they said:


VeraCrypt reads a data block into memory for encrypting.
For wipe modes, VeraCrypt writes random data to the same data block on the target device N times depending on which option the user selected for the wipe mode.
After all wipe operations are completed, VeraCrypt writes the encrypted data block back to the target device.

Except I couldn't really understand this answer and they haven't said anything else since I asked him to clarify.
>>
>>55049756
>The 35-Wipe option would've taken 3 weeks
I am not questioning why the wipe would be so slow.
But a one pass wipe will not slow down encryption by any great time, so i am questioning what type of hardware you are using that is that slow.
>>
>>55049756
>>55049774

This will be the reason it is taking 33 hours to complete. It reads, wipes, encrypts then writes before moving onto the next block.

It will be fine. Just don't interrupt it.
>>
I hate windows. Resized partition on Linux. After booting to win10 chkdsk ran, reduced true crypt file container to 0kb. Trying to find at least the header for ages. Well at least I learned a bit about crypto.
>>
Took me couple of days to encrypt my 5TB HD.

Werks just fine
>>
>>55049756
I mean the point of wiping with X passes is to make sure that even if your encryption is cracked that deleted files can't be recovered. There was no point for you to do this and it just slows down the process.

However, 33 fucking hours to encrypt even with a 1 wipe pass is ridiculous. What piece of shit computer are you running this on? The external HD on a USB 2 connection with a 5400rpm drive in it? Jesus fucking christ.
>>
>>55049756
>encrypting you shit without any backup
Depending on the type of encryption if you fuck one block up you lose everything. Also stop storing illegal material involving children.
>>
Why the fuck do you need to wipe a section of your drive before putting data back on it? Is this just an option for next level autistics?
>>
>>55049819
>>55049829
I'm using a shitty little laptop to do it also, so that will extend the time.

I wasn't so upset about the fact that it takes so long, it was just that after it started, I started getting paranoid about this "wipe" word. However, I've been slowly convinced that my actions were correct for a few reasons. 1. When reading what this process does, there was no mention of files being deleted, removed etc. It only described it as something of a special encryption method. Furthermore I got a reply from a veracrypt expert on a forum, plus some anons in this thread seem to really know what they're talking about, despite the apparent danger of the situation at first glance.
>>
>>55049896
Veracrypt doesn't use an encryption method that will do this.

>>55049908
Extra security in case you had deleted CP on it before you encrypted the current CP.
>>
>>55049895
It's the shittiest little acer half tablet thing.
>>55049939
Even of the CP accusations I don't have any of that disgusting shit.
I am new to Veracrypt and encryption in general, so I didn't even know that it was SUCH a next level paranoia option, this is only my second time ever encrypting a drive and my first time selecting that option. I'm only encrypting my drive so my family can't snoop around in stuff.
>>
>>55049983
Enough of*
>>
File: Response to improving security.jpg (63 KB, 460x388) Image search: [Google]
Response to improving security.jpg
63 KB, 460x388
>>55049983

Just out of curiosity, what encryption have you used?
>>
>>55049983
(The reason I chose my shitty little computer is because I want to be able to use my main laptop while I let the drive use my small acer for the encryption.)
>>
>>55050009
I used Serpent.
>>
>>55049291
>That doesn't sound like it will delete everything. It sounds like, it is going to fill it will random data, and then re write the encrypted data back on.

That's literally how you should erase a hard drive. You write random data. And that encrypted chunk will also act like random data and even further make it less likely someone could recover data.
>>
>>55050025

Serpent is slower than AES. If you used cascading that would also decrease performance.
>>
>>55050071

That is to say, increase time needed to securely wipe and setup encryption on your 5400rpm laptop drive.
>>
>>55050071
But it will restore the data which was initially on the drive, correct?
>>
>>55049131
>He doesn't know the conspiracy
>>
File: 1401673327655.gif (1012 KB, 192x108) Image search: [Google]
1401673327655.gif
1012 KB, 192x108
>>55050093

Sounds like it. Remember, save yourself the stress and make backups next time.
>>
>>55050088
>>55050093
Thanks for your help Veracrypt anon.
I will make quadruple backups!
Oh man, have I learned my lesson.
>>
>>55050066
It's not zero write we've already been over this.
It's an Alex Jones tier feature there just because people probably asked for it. It zero writes then copies encrypted data from RAM which is why it takes forever.
>>
>>55049081
Truecrypt has also been the only encryption software of its kind to have had a full audit. Veracrypt can't claim that, especially since it modified the source code of truecrypt.
As for your lack of warnings, those are programmed in by the devs. They don't HAVE to include them.
To find out if it's readable by windows, check under system manager. If windows can't read it, it's a decent indication that veracrypt is working on your hard drive. As for whether it actually is wiping the drive, I can't tell you. Check the source code or become an expert in data recovery.
Thread replies: 63
Thread images: 6

banner
banner
[Boards: 3 / a / aco / adv / an / asp / b / biz / c / cgl / ck / cm / co / d / diy / e / fa / fit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mu / n / news / o / out / p / po / pol / qa / r / r9k / s / s4s / sci / soc / sp / t / tg / toy / trash / trv / tv / u / v / vg / vp / vr / w / wg / wsg / wsr / x / y] [Home]

All trademarks and copyrights on this page are owned by their respective parties. Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.
If a post contains personal/copyrighted/illegal content you can contact me at [email protected] with that post and thread number and it will be removed as soon as possible.
DMCA Content Takedown via dmca.com
All images are hosted on imgur.com, send takedown notices to them.
This is a 4chan archive - all of the content originated from them. If you need IP information for a Poster - you need to contact them. This website shows only archived content.