Go Back  FlyerTalk Forums > Travel&Dining > Travel Technology
Reload this Page >

Personal File Encryption

Community
Wiki Posts
Search

Personal File Encryption

Thread Tools
 
Search this Thread
 
Old Jul 23, 2015 | 12:54 pm
  #16  
100 Countries Visited
All eyes on you!
 
Join Date: Nov 2002
Location: LAX, SAN, ORD, MAA & COK
Programs: AA LT EXP 6+ MM, AC, DL (MM) & LT SkyClub, All Airlines 10+MM, Hilton LT Diamond, Bonvoy LT Plat
Posts: 761
Originally Posted by CPRich
How does pointing out a correct software version translate to commentary on resistance to hacking?

(I guess your handle explains it)
The OP was asking for information on file protection and protection from hacking and so the response was very appropriate IMHO.
ROW2Aisle is offline  
Old Aug 4, 2015 | 3:12 pm
  #17  
 
Join Date: Jan 2015
Location: Eastern NC
Programs: UA, SW RR, Marriott, IHG, Citi, LeAccor
Posts: 15
Thanks for the info on TrueCrypt...I'll get us switched over to VeraCrypt and look into the Bitlocker + TPM suggestion too.
mrobinson927 is offline  
Old Aug 4, 2015 | 9:33 pm
  #18  
FlyerTalk Evangelist
40 Countries Visited3M100 Nights20 Years on Site
 
Join Date: Sep 2000
Programs: BA, AA, DL, KLM, UA
Posts: 37,489
If you share in the cloud, you could consider Hitachi Credeon.

http://psg.hitachi-solutions.com/cre...ction-overview
ScottC is offline  
Old Aug 4, 2015 | 11:23 pm
  #19  
FlyerTalk Evangelist
30 Countries Visited
2M
All eyes on you!
25 Years on Site
 
Join Date: Jul 2000
Location: in the vicinity of SFO
Programs: AA 2MM (LT-PLT, PPro for this year)
Posts: 19,784
Originally Posted by FonzieBone
On Linux...oh who are we kidding, you would already know.
On Linux, the general thing is called LUKS, and the command-line tool is called "cryptsetup."

(Usually, distributions will just have a checkbox during set-up to enable encryption.)

Originally Posted by z28lt1
As an FYI, BitLocker is only included with the enterprise/pro versions of Windows (starting with Vista). So if the OP has home or regular versions of the OS, it will not be included.
Enterprise, or Ultimate, for Vista and 7.
Pro or Enterprise for 8/8.1
Pro, Enterprise, or Education for 10.

Originally Posted by superangrypenguin
Uhh guys, unless there's a TPM chip (trusted platform module chip), please don't think that Bitlocker, or ANY of the software mentioned in this thread cannot be hacked/broken into (relatively) easily (if you know what you're doing.)
As a regular user would use it, and for the normal range of attacks, TPM just saves you from needing a pre-boot password; it can be used to make it more secure, but unless you're dealing with say, the PRC or FBI or some very serious industrial hackers trying to break into your machine, the extra possible security is an irrelevance. Plus, if you don't know what you're doing (or your corporate security detail does) you may actually be less secure with TPM -- or liable to locking yourself out and needing a recovery key.
nkedel is offline  
Old Aug 5, 2015 | 6:59 am
  #20  
Suspended
 
Join Date: Jul 2001
Location: Watchlisted by the prejudiced, en route to purgatory
Programs: Just Say No to Fleecing and Blacklisting
Posts: 102,077
Originally Posted by gfunkdave


TrueCrypt is no longer being developed. You should probably stop using it since bugs are no longer being addressed.
I wouldn't say it's TrueCrypt that had developed its own bugs needing its own addressing.

http://www.theregister.co.uk/2015/08...rypted_by_fbi/
GUWonder is offline  
Old Aug 5, 2015 | 10:23 am
  #21  
FlyerTalk Evangelist
30 Countries Visited
2M
All eyes on you!
25 Years on Site
 
Join Date: Jul 2000
Location: in the vicinity of SFO
Programs: AA 2MM (LT-PLT, PPro for this year)
Posts: 19,784
nkedel is offline  
Old Aug 5, 2015 | 12:54 pm
  #22  
Suspended
 
Join Date: Jun 2009
Location: YYZ
Programs: AC E50K (*G) WS Gold | SPG/Fairmont Plat Hilton/Hyatt Diamond Marriott Silver | National Exec Elite
Posts: 19,284
Originally Posted by nkedel
TPM just saves you from needing a pre-boot password; it can be used to make it more secure, but unless you're dealing with say, the PRC or FBI or some very serious industrial hackers trying to break into your machine, the extra possible security is an irrelevance. Plus, if you don't know what you're doing (or your corporate security detail does) you may actually be less secure with TPM -- or liable to locking yourself out and needing a recovery key.
Umm. TPM does much more than that. Give me a machine that's bitlockered without TPM and I can break my way in (and have). -note I'm not a hacker. I'm on the good side

And no, in a corporate environment, there are ways to ensure that people don't lock themselves out. The recovery key can be tied to Active Directory so a user can retrieve it, say by just using their alias.
superangrypenguin is offline  
Old Aug 5, 2015 | 2:32 pm
  #23  
FlyerTalk Evangelist
30 Countries Visited
2M
All eyes on you!
25 Years on Site
 
Join Date: Jul 2000
Location: in the vicinity of SFO
Programs: AA 2MM (LT-PLT, PPro for this year)
Posts: 19,784
Originally Posted by superangrypenguin
Umm. TPM does much more than that. Give me a machine that's bitlockered without TPM and I can break my way in (and have). -note I'm not a hacker. I'm on the good side.
If so, it wasn't configured adequately (and a misconfigured machine with a TPM is equally prone to being broken into; it's just a different set of attacks.)

TPM basically just gives you two things; pre-boot configuration verification (although this has the risk of a lot of accidental lock-outs) and being a physical token for pre-boot authentication.

Windows still caches the key, so memory-based attacks can be used to recovery the key -- given a locked machine without a BIOS password, there are some realy fun hacks involving cooling the DIMMs.

It's also still pretty easy to grab Windows passwords via trojan horse programs (or via browser hacks if the user uses Webmail, and the Outlook password is the domain password.) It's also pretty easy to beat a password out of someone, or get it via subpoena.

If you think you can break bitlocker on a totally cold environment without TPM, I tell you what -- I'll bitlocker-encrypt your choice of a cheapo USB stick or an old bootable hard drive with a strong password and then mail it to you, with a message. Post the message here, and I'll donate $100 to a US 501(c)3 charity of your choice.

And no, in a corporate environment, there are ways to ensure that people don't lock themselves out. The recovery key can be tied to Active Directory so a user can retrieve it, say by just using their alias.
Like I said, that's a matter of if you (or your IT support) knows what they're doing. And assuming giving people self-service access to their recover keys (either directly, or through AD) opens up a whole new volume of potential attack avenues.

The number of people I know who've either printed their recovery key and/or saved it to Google/Dropbox/Box/Onedrive is really high.

Bitlocker, with or without TPM, or LUKS, or most of these full-disk encryption programs are best for preventing casual data theft after a machine is lost or stolen, but they're hardly perfect protection (indeed, there is literally no such thing on a portable, network connected computer -- and even perfect security in an electronic sense -- air gap and faraday cage -- is only as good as the physical security guarding it.)
nkedel is offline  
Old Aug 5, 2015 | 3:11 pm
  #24  
Suspended
 
Join Date: Jun 2009
Location: YYZ
Programs: AC E50K (*G) WS Gold | SPG/Fairmont Plat Hilton/Hyatt Diamond Marriott Silver | National Exec Elite
Posts: 19,284
Originally Posted by nkedel
and even perfect security in an electronic sense -- air gap and faraday cage -- is only as good as the physical security guarding it.)
Agreed.
superangrypenguin is offline  
Old Aug 5, 2015 | 4:34 pm
  #25  
Suspended
 
Join Date: Jul 2001
Location: Watchlisted by the prejudiced, en route to purgatory
Programs: Just Say No to Fleecing and Blacklisting
Posts: 102,077
Originally Posted by nkedel
So true, as with how ATMs are used to rob people made to give up or even enter their own card PIN at the ATM; but the "wrench" may sometimes be things that don't involve direct physical violence: examples such as threat of prosecution on more charges or of worse sentencing outcomes if/when convicted; such as threats to ruin the lifestyles/opportunities of relatives/friends.
GUWonder is offline  
Old Aug 5, 2015 | 4:45 pm
  #26  
FlyerTalk Evangelist
30 Countries Visited
2M
All eyes on you!
25 Years on Site
 
Join Date: Jul 2000
Location: in the vicinity of SFO
Programs: AA 2MM (LT-PLT, PPro for this year)
Posts: 19,784
Originally Posted by GUWonder
So true, as with how ATMs are used to rob people made to give up or even enter their own card PIN at the ATM; but the "wrench" may sometimes be things that don't involve direct physical violence: examples such as threat of prosecution on more charges or of worse sentencing outcomes if/when convicted; such as threats to ruin the lifestyles/opportunities of relatives/friends.
Sure.

Ain't a much bigger wrench on earth than the force of the law.
nkedel is offline  
Old Aug 5, 2015 | 5:09 pm
  #27  
 
Join Date: Aug 2014
Posts: 57
for individual files/directories, I use axcrypt (free): http://www.axantum.com/AxCrypt/

if I need to put that data in the cloud, I use tresorit (also free with paid plans as well): https://tresorit.com/
andrewjs18 is offline  
Old Aug 7, 2015 | 10:39 pm
  #28  
10 Countries Visited
20 Countries Visited
30 Countries Visited
25 Years on Site
 
Join Date: Oct 2000
Location: Los Angeles
Posts: 336
Surprised no one has mentioned Jetico's BestCrypt. I know it's not open source (although they do publish their encryption and keygen routines), but their volume and container encryption is excellent, fast, and secure.

I did a lot of homework on this a year or so ago, and ultimately decided on them.
Maine2LA is offline  
Old Aug 8, 2015 | 8:31 am
  #29  
10 Years on Site
 
Join Date: Mar 2013
Posts: 56
Originally Posted by acitrano
Surprised no one has mentioned Jetico's BestCrypt. I know it's not open source (although they do publish their encryption and keygen routines), but their volume and container encryption is excellent, fast, and secure.
The linux version (at least) of BestCrypt is open source. It and TrueCrypt are (were) very similar.

To the OP: I could suggest separating the problems of encrypting flies on disk v. being shared. For things on local disk, use some combination of full disk encryption + BestCrypt or some other "container" encryption.

For encrypting individual files (e.g. to share), there are countless tools. One answer might be GnuPG in symmetric mode:

gpg --output doc.gpg --symmetric doc
milestraveler is offline  


Contact Us - Archive - Advertising - Cookie Policy - Privacy Statement - Terms of Service -

This site is owned, operated, and maintained by MH Sub I, LLC dba Internet Brands. Copyright © 2026 MH Sub I, LLC dba Internet Brands. All rights reserved. Designated trademarks are the property of their respective owners.