[Boards: 3 / a / aco / adv / an / asp / b / biz / c / cgl / ck / cm / co / d / diy / e / fa / fit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mu / n / news / o / out / p / po / pol / qa / r / r9k / s / s4s / sci / soc / sp / t / tg / toy / trash / trv / tv / u / v / vg / vp / vr / w / wg / wsg / wsr / x / y ] [Home]
4chanarchives logo
Is Truecrypt still secure? What are the alternatives?
Images are sometimes not shown due to bandwidth/network limitations. Refreshing the page usually helps.

You are currently reading a thread in /g/ - Technology

Thread replies: 98
Thread images: 9
File: tc.png (61 KB, 143x182) Image search: [Google]
tc.png
61 KB, 143x182
Is Truecrypt still secure? What are the alternatives?
>>
>>53227725
Just use bitlocker. It is very safe and secure.
>>
>>53227725
Truecrypt is kill f@m
Use Veracrypt
>>
>>53227725
veracrypt
>>
can't find any reason to stop using truecrypt. since nsa closed it, i see it even more secure than any other app like that.
>>
>>53227725
Just use 7-zip encryption lad, no one found any security holes on it yet.
>>
File: Untitled.png (29 KB, 1011x524) Image search: [Google]
Untitled.png
29 KB, 1011x524
>>53227725
No, it's not.
Use BitLocker with AES-XTS support in the newest Windows 10 build.
Remember to not use Microsoft account and to block MS servers with peerblock when encrypting.
>>
>>53227983
What makes you think it doesn't have a backdoor?
>>
>>53227725
Use TrueCrypt 7.1a
>>
>>53227909
>>53227914
not audited yet
>>
>>53228035
See:
https://opencryptoaudit.org/reports/TrueCrypt_Phase_II_NCC_OCAP_final.pdf
>>
Yes. Veracrypt but truecrypt is just fine as well. Actually you could use veracrypt for much more simpler passwords
>>
>>53227884
LOL

>>53227983
Bitlocker is not safe at all. There is no evidence they actually use AEE-XTS. And it is obviously backdoored, only a matter of time before a ex Microsoft employee, police officer (highly likely due to all the narcos working for US police) or someone leaks it or get hold of the backdoor. Suddenly narcos or isis get hold of your information, credit card numbers or whatever and you get sent to guantanamo to be tortured due to government backdoors allowing terrorists access to your stuff.

>>53228035
Yeah, truecrypt is audited, open source and no serious flaws.
>>
>>53227983
>peerblock
>block microsoft servers
you need to do that on your router/external firewall mate
>>
More on TrueCrypt 7.1a
https://www.grc.com/misc/truecrypt/truecrypt.htm
>>
>>53228082
Is this the glorious life in muh land of the free, hoem of de brave?
>>
Use AES 256, it's safe
>>
>>53228011
because this is not how encryption works.
Also there are no report of any kind that the police has omitted the encryption in ANY case
Stop being paranoidal, faggot. If BitLocker would be backdoored by the government nobody would be using it.
>>
>>53227884
0.50 dollars have ben transfered to your account
>>
>>53228082
>And it is obviously backdoored, only a matter of time before a ex Microsoft employee, police officer (highly likely due to all the narcos working for US police) or someone leaks it or get hold of the backdoor.
Bitlocker is 10 years old already. Try harder, nigger.
Show me ONE case where BitLocker has been successfully broken.
>>
>>53227725
no one cares about your horse porn
>>
GELI
dmcrypt
>>
>>53227725
It's probably still secure but I don't think it's a great idea to adopt dead software at this point. The spin-offs like VeraCrypt seem questionable to me. Mostly due to some snake oil tier changes.

>huge numbers for every variable is better!

Just use LUKS on Linux and BitLocker on Windows. If privacy and open source is important to you then using Windows in the first place is a bad idea.
>>
>>53228223
Are you seriously asking us to provide a reference where a spy agency announced their backdooor for the most common encryption system out there?
>>
diskcryptor
>>
Veracrypt
>inb4 not audited
Its code base is cryptolocker, copypasted, which has been audited.

Also cryptolocker has an unpatched vuln b/c its not supported any more. Veracrypt > cryptolocker
>>
How hard could it be to write encryption?
If incorrect_guesses > 10
sudo rm-rf
>>
>>53228381
First off that doesn't encrypt anything. Also
>not making a copy of the entire drive first
>>
File: 2086887-spaghett.jpg (29 KB, 470x344) Image search: [Google]
2086887-spaghett.jpg
29 KB, 470x344
>>53228372
>Its code base is cryptolocker
you mean truecrypt
>>
File: SnowdenQuote.png (119 KB, 800x414) Image search: [Google]
SnowdenQuote.png
119 KB, 800x414
>>53227725
Yes TC was audited and confirmed to be still unbreakable, why you think they were forced to shut down?

>>53228201
https://boingboing.net/2013/09/11/how-the-feds-asked-microsoft-t.html
https://redmondmag.com/articles/2013/09/13/encryption-backdoor-by-fbi.aspx

>"I realized that we were in this really interesting spot, sort of stuck in the middle between wanting to do a much better job at protecting our users' information, and at the same time realizing that this was starting to make government employees unhappy," Biddle said in the interview.

>While Biddle denies building in a backdoor, his team worked with the FBI to teach them how they could possibly retrieve data, including targeting the backup encryption keys of users.

>"As soon as we said that, the mood in the room changed dramatically," said the anonymous Microsoft engineer to Mashable. "They got really excited."

https://groups.google.com/forum/#!topic/alt.2600/T6is72zuxMs

>the customs agent said about the possible consequences if I didn't login to my BitLocker-protected computer using my password. He said my computer would be seized, kept by Customs for three or four months, and the BitLocker protection would be broken by their techies. He specifically said that the Government has the ability to break BitLocker encryption, and that as an agency of the Government, Customs also can break the encryption. He suggested there is a backdoor for BitLocker.

You could as well not use encryption at all.
>>
>>53228393
Pass it through AES -256 bit encryption, add salt pass it through 128 bit encryption, inject it into a string in a program that does what I said and compile it and throw away the source. If you guess the 3rd key right it prints the string out and then you have to know the other two codes and the seed for the salt you added.

Why are you faggots trusting NSA made programs when you can just hide it in a platformer you made in C#?
>>
>>53227983
Yeah I use bitlocker too. Local account so no key backup to MS servers. I don't bother with peer block though. I just want to protect my data from a thief not the police. If I were arrested I would happily decrypt my drive. All it has is scans of my important documents which they would already have. Photos and videos from my phone which are nothing I would hide from the authorities and some receipts and banking stuff which again they could easily get from the bank anyway. Of course I have some secrets I wouldn't share but those are not stored in my encrypted drive anyway so who gives a fuck lol.
>>
>>53228313
If a police can do it then it should've happened already.
They obviously can't do shit, especially outside the US. In this case I can use it to encrypt my pirated games and enjoy being untouchable by the police.
Any more questions?

Unlike you, fag/g/ots, I'm not paranoid. Bitlocker is perfectly usable for our needs.
>>
>>53228609
so did all the spying start just after snowden's leaks?
>>
>>53228429
>the customs agent said about the possible consequences if I didn't login to my BitLocker-protected computer using my password. He said my computer would be seized, kept by Customs for three or four months, and the BitLocker protection would be broken by their techies. He specifically said that the Government has the ability to break BitLocker encryption, and that as an agency of the Government, Customs also can break the encryption. He suggested there is a backdoor for BitLocker.
Completely legit.
For your information where I live the police doesn't have such abilities. Pretty much everyone in the Europe is secure from this.
And yes, those governmental faggots were bluffing. And you catch everything like a pelican.
Kill yourself
>>
>>53228429
>buhuuu he was asked
You still cannot provide a SINGLE case where bitlocker HAS BEEN broken.
This conversation is over. Take your daily anti-autism pills.
>>
>>53228609
we use bitlocker at work.

Our company is dirty as fuck, I know the police can't get in and I know the NSA isn't concerned with insider trading and not at arms length deals

You really think that they are giving the backdoor to every patrolman on a beat?
>>
>>53228632
I'm not talking about spying you retarded dipshit.
Don't you understand the police WILL NOT play with your bitlocker protected drives?
What do you have to hide? Sh0tas? Pirated gaymes/movies?
Do you really think the government uses all their abilities for such retarded and gay cases like yours?
>>
>>53228660
>You really think that they are giving the backdoor to every patrolman on a beat?
Are you too retarded to read what I just wrote?
This is literally what I'm saying from the beginning.
>>
>>53228330

Looks interesting, how does it compare to veracrypt?
>>
>>53228107
I love Steve Gibson. He has a security podcast called Security Now that is a great source of information.
>>
File: 1456449403164.png (112 KB, 253x327) Image search: [Google]
1456449403164.png
112 KB, 253x327
>>53228633
>>53228652

Then I guess you can tell me why TC project had to shut down and BL didn't? if Bitlocker is secure and unbreakable as TC is, why is it still allowed to go on undisturbed?

The answer is very simple: because it's not unbreakable.
>>
>>53228698
>They obviously can't do shit, especially outside the US
you expecting the local cops to come find you in foreign countries?
>Show me ONE case where BitLocker has been successfully broken.
No mention of local police, till the next post

Am I arguing with Hilary?
>>
>>53228760
>The answer is very simple: because it's not unbreakable.
In your case: it's unbreakable. Nobody is going to break bitlocker to find your local sh0ta storage.
TC got discontinued for unknown reasons. Even the creators were unknown, so who knows?
>>53228783
Provide a single case where BL was broken. Otherwise our discussion is pointless.
>>
>>53228828
prove a negative

also, 4chan is hardly the place for pointful discussion
>>
File: 1455468689136.jpg (54 KB, 566x480) Image search: [Google]
1455468689136.jpg
54 KB, 566x480
>>53228880
>prove a negative
You're a retard. Enjoy your brain damage.
>also, 4chan is hardly the place for pointful discussion
Enjoy your pointless discussion then. I'm out.
And don't forget to wear your tinfoil. The government is obviously coming to you to arrest your 3dpd anime sluts for their own purposes.
Saged and hidden
>>
>>53228828
>In your case: it's unbreakable. Nobody is going to break bitlocker to find your local sh0ta storage.
Yeah right, of the infinite possibilities that can happen tomorrow, you're making some bold assumptions here.

>TC got discontinued for unknown reasons. Even the creators were unknown, so who knows?
>who knows?
It was audited, it has been targeted by crackers, government agencies, freelancers and skids, even professional encryption experts determined that the program was safe. The source code was raped from head to toe, yet it never bled.
>>
>>53228011
What makes you think windows isn't backdoored?
>>
>>53227725

TrueCrypt 7.1a is still secure. It was recently code audited, and the audit didn't find any major vulnerabilities. So in theory, TC 7.1a is safe to continue using indefinitely, at least until current encryption methods start to be cracked by quantum supercomputers or something.

As a friendly reminder, DO NOT trust third-party TC forks such as VeraCrypt. These forks are not authorized by TC's developers, and you have no idea what's going on in their codebase. For all we know, those forks contain backdoors.
>>
File: Cryptography Engineering.jpg (51 KB, 398x499) Image search: [Google]
Cryptography Engineering.jpg
51 KB, 398x499
>>53228917
You are the one who should read some book, educate yourself about encryption pleb.
>>
>>53228925
>even professional encryption experts determined that the program was safe
Protip: number of iterations
Protip2: compromised TrueCrypt driver in Windows
Protip3: Insecure bootloader
Now seriously read a book, nigger
>of the infinite possibilities that can happen tomorrow
From 10 years nothing happen, but it's definitely going to happen tomorrow.
Ayy carriba

Seriously now I'm outta this thread. Enjoy your "how to securely store pictures of chinese microdicks" discussion.
>>
>>53228880
You were anally raped by aliens. Prove negative.
>>53228964
You're massively retarded. From the beginning I'm saying it doesn't matter if the government has the ability to break bitlocker or not. Still you didn't provide any valid argument to defend your retarded point of view.

I seriously want underage fags outta this board. You're successfully lowering the quality of discussion on this board.
>>
>>53228217
Fifty cents? I know Microsoft is rich after all the data sales and shit but fucking hell. Also, that was pretty poor regardless.

The correct format is:
"Thank you for your service, Rakeesh! 3 Rupees have been deposited into your Microsoft Associates account."
>>
Android full disk encryption user AES 128. AES 128 is not secure. Quantum computers can easily crack it. I should root my phone to use third party encryption software. Can I unlock the bootloader without using PC?
>>
>>53229025
Remember to use Kingroot, anon!
>>
>>53229025
A true quantum computer can crack ALL of our current encryption in seconds in theory so who gives a fuck what you use? AES 128 is fine unless you are a terrorist I guess
>>
File: 1455173508826.jpg (113 KB, 750x421) Image search: [Google]
1455173508826.jpg
113 KB, 750x421
>>53228965
>Protips

Most of those issues were fixed and TC on Linux has yet to show any attackable weakness anyway.

>From 10 years nothing happen, but it's definitely going to happen tomorrow.

Of course, you obviously work at FBI and know in detail every single criminal case where people were arrested in the past 10 years, there's no doubt nobody was ever arrested for false charges of pedophilia because they were caught with some YuruYuri doujins in their encrypted HDDs.

Yes please get outta here and stop using you ass to post in this board.
>>
>>53229113
yes, these were fixed in VeraCrypt, NOT IN TC 7.1a (which is the newest version). Stop spreading FUD you incompetent little shit.
>there's no doubt nobody was ever arrested for false charges of pedophilia because they were caught with some YuruYuri doujins in their encrypted HDDs.
You must be underaged to seriously not understand how live works.
Such things are ALWAYS public.
>>
>>53228996
I am making the statement that I was not raped by aliens. Your choice now is to believe me or not

You are saying that NOW the government has the abilities don't matter.
>>53228760
The answer is very simple: because it's not unbreakable.

Why should anyone believe anything you say if you can't keep your story straight.
>>
>>53229091
Source?
>>
>>53229197
Watch https://www.youtube.com/watch?v=JhHMJCUmq28 for a simpler explanation then you can research the subject for yourself.

real quantum computers dont exist yet, they are still theory except for a few prototype things like dwave but they are not true quantum computers.
>>
>>53229161
>these were fixed in VeraCrypt

VeraCrypt has NOT been audited. There's zero reason to trust that it doesn't contain a backdoor.

I don't care what it claims to have "fixed." None of the issues present in TC aren't intrinsic to any other encryption platform, and those issues can be subverted with some common sense. If you're really paranoid, then burn the TC bootloader to a disc and boot from that instead of the bootloader attached to your HDD.
>>
Isn't AES open source? Why is there so few encryption software?
>>
>>53229228
Very time research for myselft the awnser was negative. Also,

>In a Nutshell
>gobacktorredit.png
>>
>>53229294
>Why is there so few encryption software?
there is loads of encryption software but developing a GOOD encryption system is fucking hard.
>>
>>53229321
Why is that?
>>
>>53229161
>VeraCrypt
Not really, VC wasn't even audited, it was fixed before VC and before 7.1a, the version that was audited is 7.1a and no relevant exploits were found, except some optimization issue.

>Such things are ALWAYS public.
Right sure they are, the media will obviously say something along these lines:

>pedophiles ring caught distributing child porn on social networks
>several computers seized and under analysis by technical experts

What details does it tell you about the kind of meterial that was seized and the methods used to extract such material? nothing because the average mainstream media journalist is tech illiterate and they don't give a shit about technical details, all they care about is that "pedos" are getting trekt left and right which is what most of the people want to hear from the news, and the authorities don't give details about cases like these because of secrecy issues anyway.
>>
>>53229346
The average pedophile is probably tech illiterate too
>>
>>53229341
because it is very easy to make a mistake in implementing something so complex. and one little mistake can break the whole thing to a point where using it isnt possible anymore as the whole encryption protocol is fundamentally broken.
>>
>>53229341
because implementing the algorithm secure is hard, basically all faults for a verified cipher like AES are implementation based, see openssl a while back
just to much to fuck up
>>
>>53229374
but that's not the point, I'm talking about false charges that can heppen if you make enemies in the wrong places, that anon seems to deny that things like this can happen and have happened in the past, just because it doesn't make the front page on CNN or Fox news it doesn't mean that it's not happening.
>>
>>53229379
>>53229399
Surely the NSA has some badass encryption software
>>
>>53228754
I love Steve Gibson too, just not for the same reasons.
https://encyclopediadramatica.se/Steve_Gibson
>>
>>53229419
That's speculative, though, it's certainly no proof that it is in fact happening either.
>>
>>53229423
you mean LUKS

>>53229440
don't post Leos nudes
>>
>>53229451
>no proof that it is in fact happening either
well not in the specific example maybe but don't tell me you never heard of people staying decades in prison for false charges? besides I'm not sure we don't have any proof that things like this aren't being planned right now and on massive scale, pic related: >>53229113
>>
>>53229495
>but don't tell me you never heard of people staying decades in prison for false charges?
Oh, of course, but that is certainly not limited in scope just to cases involving encryption.
>>
>>53228429
>TC was audited and confirmed to be still unbreakable
Source? I want to see this
>>
>>53227954
That's not good as you will have a mixture of unencrypted and encrypted data on the drive.
>>
>>53229573
Google it
Or whatever search engine you use jesus man
>>
>>53227983
Don't worry goy. They'll just sniff them out when you next go online silently.
>>
>>53228372
I feel veracrypt gets updated with new features too often. This is not a good idea for security software.
>>
>>53228962
>not authorized by TC's developers
And who are they?
>>
>>53229573
There's even a whole website dedicated to the TC audit here: http://istruecryptauditedyet.com/

Many media websites talked about it too:
http://www.theregister.co.uk/2013/11/06/truecrypt_audit_is_go/
http://www.theregister.co.uk/2014/04/15/truecrypt_audit/
https://www.rt.com/usa/246601-snowden-truecrypt-security-audit/
http://www.pcworld.com/article/2905995/truecrypt-audit-shows-no-sign-of-nsa-backdoors-just-some-minor-glitches.html

The only way to bypass TC is literally having physical access to the machine, while it's running and while the files are being used, therefore only when the decryption informations are stored in the RAM, but the same can be done for LITERALLY every encryption software out there including BL and VC, it's mathematically impossible to prevent unless you're using special hardware built entirely for the purpose to make the RAM unattackable.
>>
>>53229674
Thank you. This is very helpful.
I couldn't find anything on a veracrypt audit though
>>
>>53229715
I'm not sure VC was audited yet, but if a backdoor is there then it won't take much to be found since it's open source, I'm sure the news will be all over /g/ if it's ever gonna happen, since VC is supposedly the successor of TC people will use it as excuse to attack TC again, just keep lurking here once in a while and you'll know when something happens.
>>
>>53228047
if that's your benchmark of a good crypto program, then you're going to be using truecrypt 7.1a for a long time.
>>
>>53228114
They are free from privacy. Though not sure using world's most backdoored OS is bravery ..
>>
>>53228260
PETA does.
>>
File: happydrake.jpg (11 KB, 252x87) Image search: [Google]
happydrake.jpg
11 KB, 252x87
>>53228082
>Bitlocker is not safe at all. There is no evidence they actually use AEE-XTS. And it is obviously backdoored, only a matter of time before a ex Microsoft employee, police officer (highly likely due to all the narcos working for US police) or someone leaks it or get hold of the backdoor. Suddenly narcos or isis get hold of your information, credit card numbers or whatever and you get sent to guantanamo to be tortured due to government backdoors allowing terrorists access to your stuff.

Microsoft told the government to go pound sand essentially when they asked for ways in. I believe it was along the lines off "if the computer is on it might have the keys in active memory"
>>
>>53227909
>>53227914
>>53228079
>>53228372
>Veracrypt

I would like to interject that the VC bootloader is slow as fuck, takes like 30 seconds alone because Devs implemented it that way.
>>
>>53228760
no one knows why it was shut down, you retarded, autistic fucking faggot. no one even knows the real identities of the developers.
>>
>>53228660

Because companies are the only ones MS gives a shit about unless they wanna get sued out of their ass. Doesn't mean they won't give everything from private users away
>>
>>53230913
Of course the default settings when you set up bitlocker on windows 10 is to upload the recovery file to onedrive, so if you have the illicit warez and massive amounts of CP your shit out of luck if you didn't change that setting
>>
>>53230931
You have to lower the PIM (amount of iteration).
By default it's set to 200,000. TC is using 1,000.
After setting it to 3,000 or 4,000 you won't see a difference between VC and TC.
>>
>>53228880
>Prove a negative.
lol after you ask him to prove a negative first?`

fucking idiot
>>
>>53231108
where?

You still sore samefag?
>>
>>53230964
Just print to pdf and then you can bypass making a backup of the key. Well it backs up on the drive that will be encrypted even though it's not meant to.
Thread replies: 98
Thread images: 9

banner
banner
[Boards: 3 / a / aco / adv / an / asp / b / biz / c / cgl / ck / cm / co / d / diy / e / fa / fit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mu / n / news / o / out / p / po / pol / qa / r / r9k / s / s4s / sci / soc / sp / t / tg / toy / trash / trv / tv / u / v / vg / vp / vr / w / wg / wsg / wsr / x / y] [Home]

All trademarks and copyrights on this page are owned by their respective parties. Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.
If a post contains personal/copyrighted/illegal content you can contact me at [email protected] with that post and thread number and it will be removed as soon as possible.
DMCA Content Takedown via dmca.com
All images are hosted on imgur.com, send takedown notices to them.
This is a 4chan archive - all of the content originated from them. If you need IP information for a Poster - you need to contact them. This website shows only archived content.