Overclock.net › Forums › Software, Programming and Coding › Networking & Security › So realistically, how much encryption is enough? (TrueCrypt)
New Posts  All Forums:Forum Nav:

So realistically, how much encryption is enough? (TrueCrypt) - Page 5

post #41 of 46
Quote:
Originally Posted by hawkeye071292 View Post

I believe there is an option of after 10 failed attempts it is dismounted/deleted. Doesn't really matter though, because a good forensic analyst would have made multiple backups of the drive in question. So therefore even if it did fail, they have another copy of said hard drive to fall back to.

it does matter because it makes it more harder to crack.
post #42 of 46
Quote:
Originally Posted by hawkeye071292 View Post

I believe there is an option of after 10 failed attempts it is dismounted/deleted. Doesn't really matter though, because a good forensic analyst would have made multiple backups of the drive in question. So therefore even if it did fail, they have another copy of said hard drive to fall back to.

TrueCrypt creates an encrypted file. How would a file know how many times it has been accessed or mounted? That's a file system level piece of information. A file cannot modify itself without a process. TrueCrypt files are not a processes (even if they were, they could easily be blocked from executing.)
Once again...
(13 items)
 
  
CPUMotherboardGraphicsRAM
i7 920 [4.28GHz, HT] Asus P6T + Broadcom NetXtreme II VisionTek HD5850 [900/1200] + Galaxy GT240 2x4GB G.Skill Ripjaw X [1632 MHz] 
Hard DriveOSMonitorKeyboard
Intel X25-M 160GB + 3xRAID0 500GB 7200.12 Window 7 Pro 64 Acer H243H + Samsung 226BW XARMOR-U9BL  
PowerCaseMouseMouse Pad
Antec Truepower New 750W Li Lian PC-V2100 [10x120mm fans] Logitech G9 X-Trac Pro 
  hide details  
Reply
Once again...
(13 items)
 
  
CPUMotherboardGraphicsRAM
i7 920 [4.28GHz, HT] Asus P6T + Broadcom NetXtreme II VisionTek HD5850 [900/1200] + Galaxy GT240 2x4GB G.Skill Ripjaw X [1632 MHz] 
Hard DriveOSMonitorKeyboard
Intel X25-M 160GB + 3xRAID0 500GB 7200.12 Window 7 Pro 64 Acer H243H + Samsung 226BW XARMOR-U9BL  
PowerCaseMouseMouse Pad
Antec Truepower New 750W Li Lian PC-V2100 [10x120mm fans] Logitech G9 X-Trac Pro 
  hide details  
Reply
post #43 of 46
Quote:
Originally Posted by DuckieHo View Post

There are different Court of Appeal districts. I think a ruling only applies in that district unless it goes up the chain to federal level and then Supreme Court.

Aha cool smile.gif thanks ^_^.. america why you so complicated wink.gif,
Escobar
(9 items)
 
Supercomputer ^_^
(13 items)
 
 
CPUMotherboardGraphicsRAM
1055T M4A88T-D EVO USB3 ATI 6850 4 GB 
Optical DriveOSMonitorKeyboard
DVD RW Windows 8 Pro lp1900 + 2 X 15 inch dell Microsoft Comfort Curve 
PowerCase
600watt thermaltake antec 200 
  hide details  
Reply
Escobar
(9 items)
 
Supercomputer ^_^
(13 items)
 
 
CPUMotherboardGraphicsRAM
1055T M4A88T-D EVO USB3 ATI 6850 4 GB 
Optical DriveOSMonitorKeyboard
DVD RW Windows 8 Pro lp1900 + 2 X 15 inch dell Microsoft Comfort Curve 
PowerCase
600watt thermaltake antec 200 
  hide details  
Reply
post #44 of 46
Quote:
Originally Posted by DuckieHo View Post

TrueCrypt creates an encrypted file. How would a file know how many times it has been accessed or mounted? That's a file system level piece of information. A file cannot modify itself without a process. TrueCrypt files are not a processes (even if they were, they could easily be blocked from executing.)

You are right, technically the TrueCrypt program used to easily access the file would be the "Trigger"
 
My desktop
(12 items)
 
First Desktop
(11 items)
 
CPUMotherboardGraphicsGraphics
AMD FX-8350 Vishera @ 4.86 Ghz 1.5V ASUS SABERTOOTH 990FX R2.0 AM3+ AMD 990FX EVGA GTX 660 TI 3GB EVGA GTX 660Ti FTW+ 3GB 
RAMHard DriveOptical DriveCooling
16 GB DDR3 1600 G.Skill Samsung Pro 850 256GB SSD LG BD Corsair H110i 
OSPowerCaseOther
Windows 7x64 Professional CORSAIR HX Series HX750 750W ATX12V Antec LanBoy Air 5 switch fan controller 
CPUMotherboardGraphicsRAM
AMD Phenom X4 965 Black Edition MSI NF750-G55 AM3 NVIDIA nForce 750a SLI HDMI ATX ASUS GTX 550TI 1GB 8GB 1333 DDR3 G. Skill (2x 4GB) 
Hard DriveOptical DriveCoolingOS
1x 500 GB Western Digital Caviar Black 7200RPM Samsung DVD  Stock air Windows 7 Professional x64 
PowerCaseAudio
700 Watt Rosewill Rosewill CHALLENGER Black Gaming ATX Mid Tower ... Integrated  
  hide details  
Reply
 
My desktop
(12 items)
 
First Desktop
(11 items)
 
CPUMotherboardGraphicsGraphics
AMD FX-8350 Vishera @ 4.86 Ghz 1.5V ASUS SABERTOOTH 990FX R2.0 AM3+ AMD 990FX EVGA GTX 660 TI 3GB EVGA GTX 660Ti FTW+ 3GB 
RAMHard DriveOptical DriveCooling
16 GB DDR3 1600 G.Skill Samsung Pro 850 256GB SSD LG BD Corsair H110i 
OSPowerCaseOther
Windows 7x64 Professional CORSAIR HX Series HX750 750W ATX12V Antec LanBoy Air 5 switch fan controller 
CPUMotherboardGraphicsRAM
AMD Phenom X4 965 Black Edition MSI NF750-G55 AM3 NVIDIA nForce 750a SLI HDMI ATX ASUS GTX 550TI 1GB 8GB 1333 DDR3 G. Skill (2x 4GB) 
Hard DriveOptical DriveCoolingOS
1x 500 GB Western Digital Caviar Black 7200RPM Samsung DVD  Stock air Windows 7 Professional x64 
PowerCaseAudio
700 Watt Rosewill Rosewill CHALLENGER Black Gaming ATX Mid Tower ... Integrated  
  hide details  
Reply
post #45 of 46
Go with plain AES with a very strong keypass. It's been scrutinized for years and years by every university and government/industry expert - there is no way to crack it besides brute-force. The big plus is modern CPUs have hardware acceleration for it making making it just as fast as not using any encryption at all (that's why there's such a huge performance difference after AES).

Also:
Green Lantern
(18 items)
 
 
The Router 3.0
(14 items)
 
CPUMotherboardGraphicsGraphics
Intel i7 920 3.8GHz 1.25v HT Asus P6T XFX 5870 XFX 5780 
RAMHard DriveHard DriveOptical Drive
Kingston HyperX Intel X25-M 80GB G2 10Tb iSCSI Lite-On 1635S 
CoolingOSMonitorKeyboard
Corsair H50 Windows 7 x64 Ultimate Asus PA246 Logitech G15 v1 
PowerCaseMouseAudio
Corsair 1000HX Lian Li v1000+ Logitech G5 v1 Creative Audigy 2 ZS 
Other
Intel Pro/1000 PT Server Adapter 
CPUCPUMotherboardGraphics
Intel Xeon L5335 Intel Xeon L5335 Intel 5000P ATI ES1000 
RAMHard DriveOSPower
Elpida ECC WD20NPVT SmartOS HP 350W + Hot Spare 
Case
HP Proliant 380 G5 
CPUMotherboardRAMHard Drive
AMD Athlon 64 X2 3800+ nForce 3 250 2 GB 512MB CF To IDE 
OSCaseOtherOther
pfSense 2.0.1 x64 Shuttle XPC Intel PWLA8492MT PRO/1000 MT Dual Port Server A... Verizon FiOS 75/35Mbit 
  hide details  
Reply
Green Lantern
(18 items)
 
 
The Router 3.0
(14 items)
 
CPUMotherboardGraphicsGraphics
Intel i7 920 3.8GHz 1.25v HT Asus P6T XFX 5870 XFX 5780 
RAMHard DriveHard DriveOptical Drive
Kingston HyperX Intel X25-M 80GB G2 10Tb iSCSI Lite-On 1635S 
CoolingOSMonitorKeyboard
Corsair H50 Windows 7 x64 Ultimate Asus PA246 Logitech G15 v1 
PowerCaseMouseAudio
Corsair 1000HX Lian Li v1000+ Logitech G5 v1 Creative Audigy 2 ZS 
Other
Intel Pro/1000 PT Server Adapter 
CPUCPUMotherboardGraphics
Intel Xeon L5335 Intel Xeon L5335 Intel 5000P ATI ES1000 
RAMHard DriveOSPower
Elpida ECC WD20NPVT SmartOS HP 350W + Hot Spare 
Case
HP Proliant 380 G5 
CPUMotherboardRAMHard Drive
AMD Athlon 64 X2 3800+ nForce 3 250 2 GB 512MB CF To IDE 
OSCaseOtherOther
pfSense 2.0.1 x64 Shuttle XPC Intel PWLA8492MT PRO/1000 MT Dual Port Server A... Verizon FiOS 75/35Mbit 
  hide details  
Reply
post #46 of 46
It won't make any difference how much encryption you manage to use if they torture the key out of you it's all for naught.
New Posts  All Forums:Forum Nav:
  Return Home
  Back to Forum: Networking & Security
Overclock.net › Forums › Software, Programming and Coding › Networking & Security › So realistically, how much encryption is enough? (TrueCrypt)