Hi Tony,

TO> Luckily,  most  of  us don't live in China and have to worry about
TO> security  to  that extent. Do you have TrueCrypt set up for hidden
TO> volumes and plausible deniability?

Only  a  small  one  for  most important files (ex: passwords and user
names  file)  but  I  made  it  rather  as a test. There was a case of
Brasilian  banker  that  encrypted  his  HDD with TC (AES only) ; when
police confiscated HDD they tried to decrypt it (with FBI help) for 18
month  and  failed. On my HDD (apart of OS) you have triple encryption
on  any  container/partition with a keyfile so it's rather unbreakable
within reasonable time.

TC  for  me is rather to protect me when laptop is lost than to try to
hide  data from police (no matter if I think they have right to spy on
us   all the time ; ex: Google Drive, Dropbox, TuneIn, VoIP connection
software  on  my  Android  phone  and many more are already blocked in
China  because  police  can't  control  moved  data).  It's one of the
reasons  why  apart  of protecting my data against ordinary theft I do
try to protect my privacy :)


IMO  hidden  volume  can  be  detected  in  the  container even if you
cooperate with police - there will be a size difference of data copied
to a container and container size (unless I'm mistaken here).

IMO,  much  better  to claim plausible deniability is encrypting a raw
clusters on the HDD (ex: external). In that way data on such HDD looks
like a rubbish without any structure nor readable header to see what's
there unless you know the password or a keyfile. Each time you connect
such  HDD  to  your  system Windows is reporting unformatted drive and
asks to format it.

As   for  AES  hardware encrypted USB it's possible that you might not
know  the  password  if ie. your kid for instance changed it long time
ago :) Life is life ;P


TO> If  you  use a VPN to a trusted server in EU/US, aren't you better
TO> off  leaving  you  email  on  the trusted IMAP server so if you do
TO> loose your laptop again, your email is easily recoverable?

First  is  the  size  (over 6GB database), second is that I can do the
same  with  TBK  archive  copied  in TC container and burnt on DL DVD.
Actually  I  have  all e-mails doubled because every e-mail I sent and
receive  is  saved on HDD as EML and I do make copies of it. I do burn
on DVD TC containers so even if somebody gets it they can't read it.

Last  thing  is that I do not have much trust in IMAP and leaving your
data  on  some  server ; even big companies lost customers data due to
mistakes  -  you can call me old fashioned here but if it's lost I can
only blame myself :)

> I do appreciate that some unlucky people have a real need to protect
> themselves from serious danger and to leave as little trace as
> possible. My TB installation on my laptop is password protected and 'On
> the Fly' encrypted. Any idea how secure that is?

Sorry,  I  don't know. I would love to know what encryption is used by
Ritlab.  As  for  now  I  use non-encrypted TB! installed on separated
TC container and it works good for me.

I  used  on-fly-encrypted  version  first  I  installed TB! but had to
switch  to  none-encrypted  due  to some problems I had with it (don't
remember now what it was ; reported it on BugTraq but it's gone now).

Tried  to  use  Voyager that is on-fly-encrypted on my 32GB USB but it
didn't  work  good. I mean here that Voyager worked good but sync to a
my desktop failed 3 times in a raw so I just gave it up.

At   the  moment I just use TBK to move it between laptop<->desktop if
I need to travel.

-- 
Best Regards,
RS (FEDARA)

The Bat! 5.1.2
Windows 7 x64 Professional (7601 Service Pack 1)
POP3 accounts (x5)

Wednesday, May 2, 2012 (19:08 ; GMT+8)




________________________________________________________
 Current beta is 5.1.2.2 | 'Using TBBETA' information:
http://www.silverstones.com/thebat/TBUDLInfo.html

Reply via email to