| Forum Home | ||||
| Press F1 | ||||
| Thread ID: 137020 | 2014-05-14 03:14:00 | How to protect your PC with Encryption. | kingdragonfly (309) | Press F1 |
| Post ID | Timestamp | Content | User | ||
| 1374956 | 2014-05-14 08:45:00 | You read the links before you posted your reply. Yeah right I did, and when they made references to 3 year old SSDs I lost interest. |
Alex B (15479) | ||
| 1374957 | 2014-05-14 09:14:00 | I haven't seen any SSD that doesn't use wear-leveling. From my original link "Some storage devices (e.g., some solid-state drives, including USB flash drives) and some file systems utilize so-called wear-leveling mechanisms to extend the lifetime of the storage device or medium. These mechanisms ensure that even if an application repeatedly writes data to the same logical sector, the data is distributed evenly across the medium (logical sectors are remapped to different physical sectors). Therefore, multiple "versions" of a single sector may be available to an attacker. " If you need further more proof that using software encryption on an SSD is not good, here's a link from last month, from "Digital Forensics Consulting, LLC" discussing wear-leveling www.dfinews.com As mentioned before, nearly all new SSD have hardware based FDE built-in, however it adds an additional attack vector. |
kingdragonfly (309) | ||
| 1374958 | 2014-05-14 10:00:00 | Them: "You can 'bypass' this password thing can't you?" Me: "Um - no... Where are your [unencrypted] backups?" Them: "Ah......" (priceless look on face as reality hits) Me: ROFLMFAO Yeah, normal sign in passwords are a piece of cake to bypass. Had one last week a lady had called to clean out hers and sons Laptop, she didn't know the sons password, and couldn't get hold of him. She asked if there was a way to get around it - I said yes, but only with her permission - she said go ahead, around a minute later I was working on it -- she was a little surprised :horrified & this was windows 8.1. Encrypted stuff as fred was describing :( |
wainuitech (129) | ||
| 1374959 | 2014-05-14 12:32:00 | Yeah, normal sign in passwords are a piece of cake to bypass. Had one last week a lady had called to clean out hers and sons Laptop, she didn't know the sons password, and couldn't get hold of him. She asked if there was a way to get around it - I said yes, but only with her permission - she said go ahead, around a minute later I was working on it -- she was a little surprised :horrified & this was windows 8.1. How about those Microsoft account 8.x logins? ;) Arggghh, people and passwords. :badpc: Setup new PC, what's your Skype password? "I don't have one", ditto email. Sure you don't :lol: |
Renegade (16270) | ||
| 1374960 | 2014-05-15 11:11:00 | Had a call today, the person had a laptop that's gotten encrypted, no idea of what was done apart from theres a message saying the drive is encrypted -- Asked how much to decrypt it --Didn't like the reply to much :( How about those Microsoft account 8.x logins? Working on that one. Theres a method but have not tried it yet. If its only the local account that's easy as falling off a slippery log while drunk ;) |
wainuitech (129) | ||
| 1374961 | 2014-05-15 20:07:00 | I'd really need to known the model of the laptop, OS, and the text of the prompt to take a guess. Many corporate laptops have "self-encrypting drives" SED (hardware based using the TPM). These are NOT tied to a Windows account, almost always tied to the physical MAC address and stored in a Enterprise level central key server Alternatively course BitLocker is popular. (software based encryption) Note many other products, like TrueCrypt, has an easy to change prompt to anything, to fool the theft. You can look at the boot sector, to give an indication of the encryption, but this of course doesn't get you anywhere near finding the password. |
kingdragonfly (309) | ||
| 1374962 | 2014-05-15 22:10:00 | windowssecrets.com Some quick reading for those interested, discusses Win8 & secureboot issues with whole disk encrytion "TrueCrypt, for example which might well be the worlds most popular open-source, whole-disk encryption tool currently doesnt work on Win8 systems using Secure Boot. This situation will most likely change in the future; but today, some TrueCrypt users who upgraded from Win7 to Win8 have run into severe trouble, such as losing access to the entire contents of their hard drives." |
1101 (13337) | ||
| 1374963 | 2014-05-17 08:32:00 | I find the FireWire security hole a bit shocking: "The [Inception] tool can unlock (any password accepted) and escalate privileges to Administrator/root on almost* any powered on machine you have physical access to. " this is just the way it works. Any system with Firewire or Thunderbolt ports are vulnerable to Direct Memory Access (DMA) attacks when the computer is turned on or is in the Standby power state You can mitigate this by Shutting down the system when not in use Don't use standby Don't use just TPM protection for a 2nd factor Removing Thunderbolt and Firewire ports (not that easy if your laptop already has them) |
nmercer (3899) | ||
| 1374964 | 2014-05-17 08:36:00 | My very first sentence said most people don't care about encryption. It's inconvenient. Even when there's no performance degradation, you still have to do / have something extra to start your PC. Hopefully it of interest to a couple of people. full volume encryption can be configured to not require a 2nd factor but to just use the machines TPM, so there isn't anything extra to do when starting the PC this is particularly handy on Windows Tablets |
nmercer (3899) | ||
| 1374965 | 2014-06-05 23:53:00 | An update to this thread, in May 2014, Truecrypt began displaying message that it was no longer secure. Needless to say, if you were using Truecrypt, decrypt your partition. An open-source alternate is DiskCryptor See this link www.ilovefreesoftware.com |
kingdragonfly (309) | ||
| 1 2 | |||||