![]() |
Originally Posted by CPRich
(Post 25158394)
How does pointing out a correct software version translate to commentary on resistance to hacking?
(I guess your handle explains it) |
Thanks for the info on TrueCrypt...I'll get us switched over to VeraCrypt and look into the Bitlocker + TPM suggestion too.
|
If you share in the cloud, you could consider Hitachi Credeon.
http://psg.hitachi-solutions.com/cre...ction-overview |
Originally Posted by FonzieBone
(Post 25148897)
On Linux...oh who are we kidding, you would already know. ;)
(Usually, distributions will just have a checkbox during set-up to enable encryption.)
Originally Posted by z28lt1
(Post 25151224)
As an FYI, BitLocker is only included with the enterprise/pro versions of Windows (starting with Vista). So if the OP has home or regular versions of the OS, it will not be included.
Pro or Enterprise for 8/8.1 Pro, Enterprise, or Education for 10.
Originally Posted by superangrypenguin
(Post 25153471)
Uhh guys, unless there's a TPM chip (trusted platform module chip), please don't think that Bitlocker, or ANY of the software mentioned in this thread cannot be hacked/broken into (relatively) easily (if you know what you're doing.)
|
Originally Posted by gfunkdave
(Post 25150654)
:eek:
TrueCrypt is no longer being developed. You should probably stop using it since bugs are no longer being addressed. http://www.theregister.co.uk/2015/08...rypted_by_fbi/ |
|
Originally Posted by nkedel
(Post 25223022)
TPM just saves you from needing a pre-boot password; it can be used to make it more secure, but unless you're dealing with say, the PRC or FBI or some very serious industrial hackers trying to break into your machine, the extra possible security is an irrelevance. Plus, if you don't know what you're doing (or your corporate security detail does) you may actually be less secure with TPM -- or liable to locking yourself out and needing a recovery key.
And no, in a corporate environment, there are ways to ensure that people don't lock themselves out. The recovery key can be tied to Active Directory so a user can retrieve it, say by just using their alias. |
Originally Posted by superangrypenguin
(Post 25225865)
Umm. TPM does much more than that. Give me a machine that's bitlockered without TPM and I can break my way in (and have). -note I'm not a hacker. I'm on the good side.
TPM basically just gives you two things; pre-boot configuration verification (although this has the risk of a lot of accidental lock-outs) and being a physical token for pre-boot authentication. Windows still caches the key, so memory-based attacks can be used to recovery the key -- given a locked machine without a BIOS password, there are some realy fun hacks involving cooling the DIMMs. :D It's also still pretty easy to grab Windows passwords via trojan horse programs (or via browser hacks if the user uses Webmail, and the Outlook password is the domain password.) It's also pretty easy to beat a password out of someone, or get it via subpoena. If you think you can break bitlocker on a totally cold environment without TPM, I tell you what -- I'll bitlocker-encrypt your choice of a cheapo USB stick or an old bootable hard drive with a strong password and then mail it to you, with a message. Post the message here, and I'll donate $100 to a US 501(c)3 charity of your choice. And no, in a corporate environment, there are ways to ensure that people don't lock themselves out. The recovery key can be tied to Active Directory so a user can retrieve it, say by just using their alias. The number of people I know who've either printed their recovery key and/or saved it to Google/Dropbox/Box/Onedrive is really high. Bitlocker, with or without TPM, or LUKS, or most of these full-disk encryption programs are best for preventing casual data theft after a machine is lost or stolen, but they're hardly perfect protection (indeed, there is literally no such thing on a portable, network connected computer -- and even perfect security in an electronic sense -- air gap and faraday cage -- is only as good as the physical security guarding it.) |
Originally Posted by nkedel
(Post 25226426)
and even perfect security in an electronic sense -- air gap and faraday cage -- is only as good as the physical security guarding it.)
|
|
Originally Posted by GUWonder
(Post 25227017)
So true, as with how ATMs are used to rob people made to give up or even enter their own card PIN at the ATM; but the "wrench" may sometimes be things that don't involve direct physical violence: examples such as threat of prosecution on more charges or of worse sentencing outcomes if/when convicted; such as threats to ruin the lifestyles/opportunities of relatives/friends.
Ain't a much bigger wrench on earth than the force of the law. |
for individual files/directories, I use axcrypt (free): http://www.axantum.com/AxCrypt/
if I need to put that data in the cloud, I use tresorit (also free with paid plans as well): https://tresorit.com/ |
Surprised no one has mentioned Jetico's BestCrypt. I know it's not open source (although they do publish their encryption and keygen routines), but their volume and container encryption is excellent, fast, and secure.
I did a lot of homework on this a year or so ago, and ultimately decided on them. |
Originally Posted by acitrano
(Post 25238637)
Surprised no one has mentioned Jetico's BestCrypt. I know it's not open source (although they do publish their encryption and keygen routines), but their volume and container encryption is excellent, fast, and secure.
To the OP: I could suggest separating the problems of encrypting flies on disk v. being shared. For things on local disk, use some combination of full disk encryption + BestCrypt or some other "container" encryption. For encrypting individual files (e.g. to share), there are countless tools. One answer might be GnuPG in symmetric mode: gpg --output doc.gpg --symmetric doc |
| All times are GMT -6. The time now is 4:50 am. |
This site is owned, operated, and maintained by MH Sub I, LLC dba Internet Brands. Copyright © 2026 MH Sub I, LLC dba Internet Brands. All rights reserved. Designated trademarks are the property of their respective owners.