FlyerTalk Forums

FlyerTalk Forums (https://www.flyertalk.com/forum/index.php)
-   Travel Technology (https://www.flyertalk.com/forum/travel-technology-169/)
-   -   Personal File Encryption (https://www.flyertalk.com/forum/travel-technology/1696341-personal-file-encryption.html)

ROW2Aisle Jul 23, 2015 12:54 pm


Originally Posted by CPRich (Post 25158394)
How does pointing out a correct software version translate to commentary on resistance to hacking?

(I guess your handle explains it)

The OP was asking for information on file protection and protection from hacking and so the response was very appropriate IMHO.

mrobinson927 Aug 4, 2015 3:12 pm

Thanks for the info on TrueCrypt...I'll get us switched over to VeraCrypt and look into the Bitlocker + TPM suggestion too.

ScottC Aug 4, 2015 9:33 pm

If you share in the cloud, you could consider Hitachi Credeon.

http://psg.hitachi-solutions.com/cre...ction-overview

nkedel Aug 4, 2015 11:23 pm


Originally Posted by FonzieBone (Post 25148897)
On Linux...oh who are we kidding, you would already know. ;)

On Linux, the general thing is called LUKS, and the command-line tool is called "cryptsetup."

(Usually, distributions will just have a checkbox during set-up to enable encryption.)


Originally Posted by z28lt1 (Post 25151224)
As an FYI, BitLocker is only included with the enterprise/pro versions of Windows (starting with Vista). So if the OP has home or regular versions of the OS, it will not be included.

Enterprise, or Ultimate, for Vista and 7.
Pro or Enterprise for 8/8.1
Pro, Enterprise, or Education for 10.


Originally Posted by superangrypenguin (Post 25153471)
Uhh guys, unless there's a TPM chip (trusted platform module chip), please don't think that Bitlocker, or ANY of the software mentioned in this thread cannot be hacked/broken into (relatively) easily (if you know what you're doing.)

As a regular user would use it, and for the normal range of attacks, TPM just saves you from needing a pre-boot password; it can be used to make it more secure, but unless you're dealing with say, the PRC or FBI or some very serious industrial hackers trying to break into your machine, the extra possible security is an irrelevance. Plus, if you don't know what you're doing (or your corporate security detail does) you may actually be less secure with TPM -- or liable to locking yourself out and needing a recovery key.

GUWonder Aug 5, 2015 6:59 am


Originally Posted by gfunkdave (Post 25150654)
:eek:

TrueCrypt is no longer being developed. You should probably stop using it since bugs are no longer being addressed.

I wouldn't say it's TrueCrypt that had developed its own bugs needing its own addressing.

http://www.theregister.co.uk/2015/08...rypted_by_fbi/

nkedel Aug 5, 2015 10:23 am

http://imgs.xkcd.com/comics/security.png

superangrypenguin Aug 5, 2015 12:54 pm


Originally Posted by nkedel (Post 25223022)
TPM just saves you from needing a pre-boot password; it can be used to make it more secure, but unless you're dealing with say, the PRC or FBI or some very serious industrial hackers trying to break into your machine, the extra possible security is an irrelevance. Plus, if you don't know what you're doing (or your corporate security detail does) you may actually be less secure with TPM -- or liable to locking yourself out and needing a recovery key.

Umm. TPM does much more than that. Give me a machine that's bitlockered without TPM and I can break my way in (and have). -note I'm not a hacker. I'm on the good side

And no, in a corporate environment, there are ways to ensure that people don't lock themselves out. The recovery key can be tied to Active Directory so a user can retrieve it, say by just using their alias.

nkedel Aug 5, 2015 2:32 pm


Originally Posted by superangrypenguin (Post 25225865)
Umm. TPM does much more than that. Give me a machine that's bitlockered without TPM and I can break my way in (and have). -note I'm not a hacker. I'm on the good side.

If so, it wasn't configured adequately (and a misconfigured machine with a TPM is equally prone to being broken into; it's just a different set of attacks.)

TPM basically just gives you two things; pre-boot configuration verification (although this has the risk of a lot of accidental lock-outs) and being a physical token for pre-boot authentication.

Windows still caches the key, so memory-based attacks can be used to recovery the key -- given a locked machine without a BIOS password, there are some realy fun hacks involving cooling the DIMMs. :D

It's also still pretty easy to grab Windows passwords via trojan horse programs (or via browser hacks if the user uses Webmail, and the Outlook password is the domain password.) It's also pretty easy to beat a password out of someone, or get it via subpoena.

If you think you can break bitlocker on a totally cold environment without TPM, I tell you what -- I'll bitlocker-encrypt your choice of a cheapo USB stick or an old bootable hard drive with a strong password and then mail it to you, with a message. Post the message here, and I'll donate $100 to a US 501(c)3 charity of your choice.


And no, in a corporate environment, there are ways to ensure that people don't lock themselves out. The recovery key can be tied to Active Directory so a user can retrieve it, say by just using their alias.
Like I said, that's a matter of if you (or your IT support) knows what they're doing. And assuming giving people self-service access to their recover keys (either directly, or through AD) opens up a whole new volume of potential attack avenues.

The number of people I know who've either printed their recovery key and/or saved it to Google/Dropbox/Box/Onedrive is really high.

Bitlocker, with or without TPM, or LUKS, or most of these full-disk encryption programs are best for preventing casual data theft after a machine is lost or stolen, but they're hardly perfect protection (indeed, there is literally no such thing on a portable, network connected computer -- and even perfect security in an electronic sense -- air gap and faraday cage -- is only as good as the physical security guarding it.)

superangrypenguin Aug 5, 2015 3:11 pm


Originally Posted by nkedel (Post 25226426)
and even perfect security in an electronic sense -- air gap and faraday cage -- is only as good as the physical security guarding it.)

Agreed.

GUWonder Aug 5, 2015 4:34 pm


Originally Posted by nkedel (Post 25225079)

So true, as with how ATMs are used to rob people made to give up or even enter their own card PIN at the ATM; but the "wrench" may sometimes be things that don't involve direct physical violence: examples such as threat of prosecution on more charges or of worse sentencing outcomes if/when convicted; such as threats to ruin the lifestyles/opportunities of relatives/friends.

nkedel Aug 5, 2015 4:45 pm


Originally Posted by GUWonder (Post 25227017)
So true, as with how ATMs are used to rob people made to give up or even enter their own card PIN at the ATM; but the "wrench" may sometimes be things that don't involve direct physical violence: examples such as threat of prosecution on more charges or of worse sentencing outcomes if/when convicted; such as threats to ruin the lifestyles/opportunities of relatives/friends.

Sure.

Ain't a much bigger wrench on earth than the force of the law.

andrewjs18 Aug 5, 2015 5:09 pm

for individual files/directories, I use axcrypt (free): http://www.axantum.com/AxCrypt/

if I need to put that data in the cloud, I use tresorit (also free with paid plans as well): https://tresorit.com/

Maine2LA Aug 7, 2015 10:39 pm

Surprised no one has mentioned Jetico's BestCrypt. I know it's not open source (although they do publish their encryption and keygen routines), but their volume and container encryption is excellent, fast, and secure.

I did a lot of homework on this a year or so ago, and ultimately decided on them.

milestraveler Aug 8, 2015 8:31 am


Originally Posted by acitrano (Post 25238637)
Surprised no one has mentioned Jetico's BestCrypt. I know it's not open source (although they do publish their encryption and keygen routines), but their volume and container encryption is excellent, fast, and secure.

The linux version (at least) of BestCrypt is open source. It and TrueCrypt are (were) very similar.

To the OP: I could suggest separating the problems of encrypting flies on disk v. being shared. For things on local disk, use some combination of full disk encryption + BestCrypt or some other "container" encryption.

For encrypting individual files (e.g. to share), there are countless tools. One answer might be GnuPG in symmetric mode:

gpg --output doc.gpg --symmetric doc


All times are GMT -6. The time now is 4:50 am.


This site is owned, operated, and maintained by MH Sub I, LLC dba Internet Brands. Copyright © 2026 MH Sub I, LLC dba Internet Brands. All rights reserved. Designated trademarks are the property of their respective owners.