[Boards: 3 / a / aco / adv / an / asp / b / biz / c / cgl / ck / cm / co / d / diy / e / fa / fit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mu / n / news / o / out / p / po / pol / qa / r / r9k / s / s4s / sci / soc / sp / t / tg / toy / trash / trv / tv / u / v / vg / vp / vr / w / wg / wsg / wsr / x / y ] [Home]
4chanarchives logo
How secure is BitLocker?
Images are sometimes not shown due to bandwidth/network limitations. Refreshing the page usually helps.

You are currently reading a thread in /g/ - Technology

Thread replies: 129
Thread images: 9
File: Capture.png (7 KB, 366x215) Image search: [Google]
Capture.png
7 KB, 366x215
How secure is BitLocker?
>>
>>46815334
How dare you question the security of a proprietary tool developed by a company that has to obey the NSA, of course it is secure.
>>
However secure Microsoft says it is :^)
>>
Encryption is like a fedora for your HDD.
>>
>>46815352
That's what I'm worried about. Can you suggest an alternative for full disk encryption?
>>
>>46815334

Any trustworthy method of security has been put out of business.

Everything else and any remaining companies have back doors or are honeypots.
>>
There's no way to verify how secure it is.
>>
>>46815370
Rot13
>>
Which is the alternativa for truecrypt?
>>
>>46815334
Owning any encryption software automatically puts you on a CP watchlist.
>>
Microsoft worked hand in hand with the NSA/FBI. How secure do you think it is?

>>46815370
Truecrypt. It's not like it magically stopped working when the development was halted.
>>
>>46815370
Truecrypt 7.1a

>>46815404
Veracrypt. Not really an alternative, but you have to trust the people who did the changes- even though they do have the source available.
>>
>>46815370
Truecrypt 7.1a. So good, the NSA had it killed. And still the best!
>>
>>46815334
more secure than leaving your files in the open
Less secure and probably faster than something you wrote yourself
>>
>>46815406
just how the hell would they know what i own? your paranoia is showing.
>>
>>46815452
The only illegal data is CP or terror material therefore if you feel the need to hide your data from the government and are not a muslim you have CP.
>>
>>46815452

In the war on terror everyone is guilty until proven innocent.
>>
>>46815498
and who says im hiding it from the gov?
>>
>>46815498
your illogic is showing
>>
>>46815530

Look, its simple, if you are hiding something, you are obviously guilty of something.
>>
>>46815406
I guess that puts about 75% of PC and laptop owners on a list, and practically all mobile users on it too
>>
what if I just dont want to accidentally let someone get into my f. f. porn collection files?
>>
>>46815370
diskcryptor

>>46815414
>>46815421
>>46815426
fuck Truecrypt. It's deprecated
>>
>>46815522
ah yes, the bogus "war on terror". just like all the other bogus government trumped up wars.
proving innocence is impossible. that's why the state is burdened with proving guilt.
>>
>>46815553

It may be illogical but its pretty much the mindset of the security personnel running the guvment.
>>
File: 1425047627632.jpg (55 KB, 327x322) Image search: [Google]
1425047627632.jpg
55 KB, 327x322
>>46815580
>fuck Truecrypt. It's deprecated
hello NSA.
>>
>>46815554
look it's a simpleton. you are obviously guilty of being a fool.
>>
>>46815580
>fuck Truecrypt. It's deprecated
Still works.

And if you think it's depreciated there's Veracrypt.
>>
>>46815577

Are you embarrassed by your porn? Is it illegal porn? Why would you hide things anon unless there was something wrong with it? Obviously you are either a CP peddler or a terrorist!
>>
>>46815554
>"yes my honor, i am guilty"
>"I am guilty of liking...mlp futa porn"
>>
>>46815602

> Implying the benevolent protectors at the NSA are simpletons.
>>
>>46815334
>encrypting a disk that's already compromised through firmware exploits
shiggy diggy
>>
>>46815608
If you wouldn't want your employer knowing it, then it gets encrypted.
>>
File: security.png (26 KB, 448x274) Image search: [Google]
security.png
26 KB, 448x274
>>46815334
>>
>>46815594
>implying an NSA agent would recommend an open source alternative that is still worked on.
>>
>>46815629
That's the idea shitstain. If it wasn't encrypted they'd just read the data straight up. The backdoored firmware doesn't magically beat encryption.
>>
The only good answer is ProxyCrypt you plebeians.
>>
Decently secure but it really only matters if your HDD could possibly be separated from your machine.
>>
>>46815643
>that is still tampered with
ftfy
>>
>>46815629
>>encrypting a disk that's already compromised through firmware exploits
>shiggy diggy

Yeah, yeah, which is why they waited for Ross Ulbricht to type his password in before stealing his laptop and detaining him. :^}
>>
>>46815580
>fuck Truecrypt. It's deprecated
No, far from it. It might still be the best tool out there.
https://www.grc.com/misc/truecrypt/truecrypt.htm
Fun fact Phase II of the public audi (cryptanalysis) is ongoing. So yeah where is your alternative?
>inb4 LUKS+dmcrypt+...
haha, NO.
>>
>>46815661
>implying he wasn't using a secure lemote given to him by RMS as part of his initiation into the Freetard Masons
>>
>>46815660
>not verifying before installing
>implying that truecrypt can't be tampered with.
shiggy diggy
>>
>>46815370
Encrypted 7z archives. Make sure you scramble and delete the original files after adding them to the archive.
Alternatively write your own script to do the same. It's what I'm working on right now.
>>
>>46815648
>That's the idea shitstain. If it wasn't encrypted they'd just read the data straight up. The backdoored firmware doesn't magically beat encryption.
Well it pretty much does since it can steal your key or replace it and act like it's all good.
>>
>>46815674
>LUKS+dmcrypt
What's wrong with this?
>>
>>46815674
>>inb4 LUKS+dmcrypt+...
>haha, NO.
that's as good as truecrypt, and allows you to dual boot as well.
>>
>>46815653
My laptop takes 4 screws to open up.
>>
>>46815621
>"oh my god you monster"
>"i condemn you to the capital punishment"
>>
>>46815674
none truecrypt's crypto has been audited, by the way
:^)
>>
>2015
>not using cryptolocker
shig and dig
>>
>>46815690
Do you have a phd in cryptography?
Otherwise i'm seriously hoping you are joking and no one should ever use anything you write (certainly not yourself).
Don't kid yourself. Crypto is fucking hard leave it to the experts. Really...
>>
>>46815661
That was FBI not NSA wasn't it?
>>
>>46815690
>encrypting something with a compressor that let the files be found like compressed files even if hidden then allowing brute-force and algorithms on them
how is your day kid?
>>
File: nice_shoulder.jpg (45 KB, 959x959) Image search: [Google]
nice_shoulder.jpg
45 KB, 959x959
>having encrypted data physically stored on your own devices so there is evidence about encrypted data left behind
plebs, plebs everywhere
>>
File: passwordcracking.png (108 KB, 1557x1168) Image search: [Google]
passwordcracking.png
108 KB, 1557x1168
>>46815731
tarball file/directory, use openssl to encrypt, scramble the file by overwriting with random data, then delete the file.
I'm not implementing the algos themselves fucktard.

>>46815751
>brute force
You do know that good passwords are not brute-forcable?
>>
>>46815721
>none truecrypt's crypto has been audited, by the way
Code has been analyzed and no serious flaws were found. That's already more than any other competitor. Give me an alternative that has?
>protip:you can't
Truecrypt truely is the best we currently have. Denying otherwise is silly.
It's been around for so long, NSA was mad about it (see Snowden revelations). Most likely story I heared is that the original dev stopped because he didn't want to cooperate with some gov and covered his ass legally with the (obviously ironic) notice on his website.
>>
>>46815721
more pleb than the fags who unironically believe they're secure on windows XP. but hey. when your software gets rekt with a future major exploit, don't come crying to me about it.
>>
>>46815772
>tarball file/directory, use openssl to encrypt, scramble the file by overwriting with random data, then delete the file.
Cute, where you get your randoms from? How long is your key? Where do you store your key?
>>
>>46815713
Right but is there a chance that someone could steal just the HDD without the computer?

This is more for businesses that give remote users laptops. If they think they're about to be fired and start tampering with the computer, then there's nothing they could do if they tried to separate the drive from the PC without also destroying the contents on it.
>>
>>46815732

Its all the same thing.
>>
>>46815842
Clearly it's not

While i'm sure they'll help each other out i've seen no evidence of FBI installing firmware exploits and shit like that
>>
If you need to absolutely secure something, even an image

> Open on text editor
> Print file on paper
> Destroy the disk it was on phayically
> Crosscut shred the print out
> Mail tufts of the shreds to random strangers.

The only way to get to it would be to gather the pieces, tape them back together, then do an OCR scan back to the original file.
>>
>>46815642
This actually worries me.

And yet, most people don't even think about it.
>>
>>46815888
It doesn't really matter what encryption software you use. A false sense of security is what is gonna bring you down.
>>
>>46815871

The news promotes one three letter agency getting "caught" doing X to distract from the others doing it even more so, duh.

They spin a wheel or something to see who is the "fall guy".
>>
>>46815852
that's still physically on your device.
>rent anonymous private server via some shady bitcoin transfer
>upload your encrypted stuff
>wipe it all from your drive
>whenever you need access dl it, wipe, repeat
>>
>>46815913
Nah, I'm actually worried that somone just tortures me to get access to my encrypted files.
>>
>>46815919
Yea i'm gonna need some reliable sources on that
>>
>>46815334
Whoever steals your laptop wont be able to crack it.
>>
>>46815888

Have two anons each enter half the password using some sort of remote software.

You will never know what it is.

If you need access you just send put some sort of bat signal. The signal should also have some sort of rotation and any occurence of the wrong signal means "never ever enter the password again anywhere" because things have been compromised.
>>
>>46815814
>Cute, where you get your randoms from?
Mersenne Twister algo in python's random library
>How long is your key?
However long I want it.
>Where do you store your key?
My head.
>>
>>46815930
Ye sure let's trust yet ANOTHER third party with our sensitive data and download it over and over so they can employ timing attacks and what not. Great idea goyim :^)
>>
>>46815877
Pro tip use the hp with photo paper. They guarantee 100 years life span.
>>
>>46815947
kek
>>
>>46815498
Implying only muslims are terrorists. Wow you have been brainwashed by the media
>>
>>46815953
>Mersenne Twister algo in python's random library
Pahahahahhahahahahahahahah. Oh boy. This is the kind of thing i was hoping for. You already lost here.
>However long I want it.
Clearly not long enough if you don't even dare answering it. Again, how many bits of entropy?
>My head.
Well I am too storing it in my head. But cryptographers all around the world insist on using multiple factors. Because the human brain is terrible at remembering a random key that's sufficiently large enough to use as long term storage key.
>>
Do people on /g/ really have shit so dangerous and/or valuable that people/the govt would spend significant time and effort to get hardware access and crack it open?
>>
>>46816073
hey, i can dream, can't i?
>>
>>46816073
No, they just want to hide their porn folder from their parents, forgetting that said parents don't even know what a brute force attack is.
>>
>>46816103
>implying my dad isn't a cryptography expert
>>
>>46816030
>>However long I want it.
>Clearly not long enough if you don't even dare answering it. Again, how many bits of entropy?
if he was to answer the length of his password, it would be alot easier to bruteforce the password if the attackers know how long it is, its a lot less combinations to try thats why one should never ever mention any details about their passwords
>>
>>46816073
Their autism and extreme paranoia makes them think we live in 1984 and the big bad government is gonna send them to room 101 for interrogation for shitposting on 4chan worthless opinions.
>>
>>46816030
Than you.
>>
>>46816030
>You already lost here.
It's used to WRITE OVER THE FILE, it literally does not matter what algo is used, I could use arcfour and it would not matter it there to SHRED. Fucktard.
>Again, how many bits of entropy?
Really? I have several keys memorized that are pretty random at 14, 16, and 13 characters long I'm 100% sure I can memorize another of similar length. They are sufficient if you look at the pic I posted in the previous post.
> But cryptographers all around the world insist on using multiple factors.
Unnecessary. And depending upon what the other factors come are, possible points of failure.
>>
>>46815370
Truecrypt or disk cryptor (perfoms better on SSDs)
>>
>>46816073

> Implying the NSA monitoring is about terror and not about putting the framework in for keeping citizens in line with an increasingly strict set of society rules.
>>
>>46816103

> Implying today's parents didn't grow up on technology and don't know how to track all internet activity via the firewall.
>>
>>46815554
It has more to do with what these people inside the goverment could do with the data. Collecting and modifing this shit cake sauce. Just remember there are people with these type of power who are austic and fagfaces just like /g/.
>>
>>46816699
Now that's a fucking scaring thought

Brb encrypting
>>
>>46815554
Hi, I encrypt my bank credentials, am I a terrorist for doing so?
>>
>>46817143

Yes. You are clear secretly funding terror.
>>
No full disk encryption is secure.
https://www.youtube.com/watch?v=JDaicPIgn9U
Also, they got the pirate roberts even using full disk encryption because they just arrested him just after he unlocked the drive.
>>
>>46816030
>Clearly not long enough if you don't even dare answering it. Again, how many bits of entropy?
>Because the human brain is terrible at remembering a random key that's sufficiently large enough to use as long term storage key
The most secure password I have memorized is the entire song of Solomon.
it's 1624 characters long, or 275 words long, and entirely memorized
even with a dictionary attack, that would take an obscenely long amount of time to crack.
>>
>>46817309
>cold boot attacks
Nigger please you're talking about things you don't actually understand.
Cold boot attack only works in very certain situations.
>>
>>46817329
Yeah, like I said, if you have your partition unlocked at the moment.
Or you try to shut it down pluging the plug instead of locking the drive again (if its not the boot partition).
>>
>>46817317
I should mention that's only the first verse, using more than just the first verse on a single file would be ridiculous.

I have 8 verses that long all in my head, so what was that you said about not being able to memorize a password of sufficient length?
>>
>>46817317
Guess what the first password I try is going to be
>>
>>46817369
memorizing a chapter from a book is a trivial task though, I already have well over ten 1000+ character passwords in my head, because of chapters or plays I've memorized.
>>
>>46815334
>How secure is BitLocker?
8
>>
>>46817415
>a password of any length
>being secure without using numbers and symbols
Step:1 download every book and play in the world (a few GB tops)
Step2: ???
Step3: AYY LMAO
>>
>>46815334
9/10 OP, made me chuckle
>>
>>46815370
Just get Cryptolocker. Then nobody can access your drive.
>>
>>46817634
a few things are wrong with what you're saying.
First thing is that an attacker wouldn't know that I'm not using numbers or symbols.
Secondly, chapters from books generally include periods, semicolons, and other punctuation.
Third thing is that a chapter from a book is generally 1000 characters in length at minimum. That is a ridiculous number of bits of entropy and several orders of magnitude above a 60 character password with all the symbols you could think of.
Fourth thing is that a chapter from a book, or a scene from a play is trivial to memorize, and a random character combination of similar length is hard to memorize.
Fifth thing is this http://xkcd.com/936/
>>
>>46815814
>where you get your randoms from?
Does it matter?
>>
>>46817194
>>46815406
>>46815498
>>46815554
>>46815580
>>46815608
>>46815625
So much NSA/Chris Hansen ITT
>>
>>46817634
>Step:1 download every book and play in the world (a few GB tops)
>Step2: ???
>Step3: AYY LMAO
Also using parts of chapters or even just chapters would make this sort of attack impossible to pull off the library of congress has 200tb of books alone.
>>
>>46815871

It is. There are numerous stories the NSA giving information to the DEA's Special Operation Division.

http://en.wikipedia.org/wiki/Parallel_construction

https://www.techdirt.com/articles/20130827/17564624327/congress-asks-eric-holder-to-explain-why-nsa-supplies-dea-info-which-it-then-launders-to-go-after-americans.shtml
>>
>>46817845
I didn't say they don't work together but saying it's the same thing is clearly false
>>
>>46817868

The only thing that separates them is a phone call. This was actually one of the stated goals of the Patriot Act. The 9/11 Commission believed all the pieces of the puzzle were there but different agents didn't talk enough to put them together.
>>
>>46817908

different agencies*

(cont.) That is not to say that they work together in every case, but if a target was high enough priority (like the "kingpin" of a large internet drug market) NSA support wouldn't be there.
>>
>>46817908
It's getting very speculative now but i'd think there is a difference between how they handle a drug dealer and a terrorist group, as in maybe NSA didn't want to risk exposing the firmware exploits for a drug dealer
>>
>>46817924

NSA support would be there*

Fuck, I can't type today.
>>
>>46817938

>NSA didn't want to risk exposing the firmware exploits for a drug dealer

Herein lies the beauty of parallel construction. They don't have to reveal anything. They simply send a note the DEA saying "xyz is doing this" and the DEA builds a bogus backstory as to how they got the information. This is how they got Ulbright. Apparently the "FBI" typed in "miscellaneous" characters into the Silk Road's captcha and suddenly the server's IP address was magically revealed.
>>
>>46816183
>It's used to WRITE OVER THE FILE, it literally does not matter what algo is used, I could use arcfour and it would not matter it there to SHRED. Fucktard.
You would surprised what forensics can do.
>Really? I have several keys memorized that are pretty random at 14, 16, and 13 characters long I'm 100% sure I can memorize another of similar length. They are sufficient if you look at the pic I posted in the previous post.
Pws with 16 chars have been cracked. It's all about the entropy and again humas have tendencies to stick with typical patterns etc which increases the chances of "smart" bruteforcing.
>Unnecessary. And depending upon what the other factors come are, possible points of failure.
Well never put your eggs in one basket. That's all I'm saying. A physical limitation (something you have) is always a major improvement in combination with a strong password. Sure they can fail. But you often have backup options too so that's nice.
>>
>>46817317
That's all good and well. But attackers usually try to get to know their target. So if he knows you like Solomon he might as well try a dictionary attack with it's songs. What I said is human are bad at remembering RANDOM things. HIGH entropy, truly without a system or something you can easily link too it. That is a very valid statement. Look it up if you don't believe me. There is a reason why people that know hundreds of pi digits use advanced mnemonics to be able to remember them (there are some freaks that don't even need those but that are exceptions not the rule). Evolutionary speaking you don't have any benefit in remembering random stuff. Even the opposite is true because we clearly became superior because we were able to remember structured, logical and symbolic stuff better.
>>
>>46817780
Of course it does. For crypto all this matters a lot. Pseudo random generators are a source of many attacks.
>>
File: 1423859681347.gif (2 MB, 290x189) Image search: [Google]
1423859681347.gif
2 MB, 290x189
>>46815370
AutoCAD
>>
Reminds me of CrypticLock
>>
>>46815947
Yeah, gotha be careful with that there dwarf tranny porn and flutteryshy futa pics.
>>
>>46818276
I'm not even a christian, I just have sections of the bible memorized because I've read it so many times, same with a few scenes, or even acts Shakespeare's plays and some chapters from my favorite books. You wouldn't guess from knowing me that I have entire books of the bible memorized well enough to use them as a password.
>>
File: 1398290982001.png (29 KB, 200x200) Image search: [Google]
1398290982001.png
29 KB, 200x200
>>46815334
As secure as the rest of windows.

Why do you imbeciles believe they'd put a backdoor ONLY in bitlocker and leave the rest of the multi giga byte OS alone? If Microsoft really did NSAs bidding, they could just as well lift your truecrypt/veracrypt/whateverthefuckcrypt keys right out of ram if they wanted to.

If you don't trust Microsoft, you can't use windows. There is no middle ground.
>>
>>46815334
The Chinese didn't find any backdoors.Well unless you count the "why not backup your encryption keys to onedrive?". I get why MS offers that though. Think of all the retarded people encrypting their hard drives and then forget the password.

I feel about as safe using bitlocker as I ever did using truecrypt. I'd run a fully encrypted FreeBSD setup with jails if I had extremely sensitive data I'd want to protect.
>>
>>46815334
>How secure is BitLocker?
About as secure as the NSA wants it to be.
>>
File: 1419086726621-1.jpg (39 KB, 469x750) Image search: [Google]
1419086726621-1.jpg
39 KB, 469x750
>>46815947
I work crypto (operator level, more how to use it/basics than making it/complex shit.) for the government and this is pretty much how you should do it. We call it two person integrity. No person can ever know both keys, not even the head honcho, not even the guy responsible for the SCI. We rotate keys/combos/passwords constantly.

Honestly though, use multiple encryption(encrypt encrypted data.) We use this to transmit new keys. Encrypt it with a "KEK" key encryption key, then send it on its way.

Two things that are helpful: have one encrypted volume with embarrassing but legal content, then have another hidden volume that cannot be proved to be there with whatever you're trying to hide. I think trucrypt lets you do this (no idea if it's still secure.)

Also the less intelligent the person trying to crack you thinks you are the better. Hide all searches/research involving cryptography, hide your keys in multiple places or practice TPI. Possibly use keyboard patterns, then have your written key something to help you remember them. qazsedcftgbhujmkol.;[' is an example of a pattern of pressing keys on a keyboard that is resistant to brute force. Just add a password you can remember at the end so they can't get it by running common keyboard-pattern(forgot the name) passwords. Using two methods always helps add to the entropy. pattern + words/characters = gg.

im bad at writing sorry
>>
>>46815498
Yeah because I can't protect my files in case my computer is stolen, it contains company files

0/10 bait
>>
Why do you have anything to hide you sick pedo?
>>
>>46815370

If you're worried about security, stop using Windows.
>>
>>46815888

most people use passwords like 123456 and password
Thread replies: 129
Thread images: 9

banner
banner
[Boards: 3 / a / aco / adv / an / asp / b / biz / c / cgl / ck / cm / co / d / diy / e / fa / fit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mu / n / news / o / out / p / po / pol / qa / r / r9k / s / s4s / sci / soc / sp / t / tg / toy / trash / trv / tv / u / v / vg / vp / vr / w / wg / wsg / wsr / x / y] [Home]

All trademarks and copyrights on this page are owned by their respective parties. Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.
If a post contains personal/copyrighted/illegal content you can contact me at [email protected] with that post and thread number and it will be removed as soon as possible.
DMCA Content Takedown via dmca.com
All images are hosted on imgur.com, send takedown notices to them.
This is a 4chan archive - all of the content originated from them. If you need IP information for a Poster - you need to contact them. This website shows only archived content.