Hi Tony, TO> Luckily, most of us don't live in China and have to worry about TO> security to that extent. Do you have TrueCrypt set up for hidden TO> volumes and plausible deniability?
Only a small one for most important files (ex: passwords and user names file) but I made it rather as a test. There was a case of Brasilian banker that encrypted his HDD with TC (AES only) ; when police confiscated HDD they tried to decrypt it (with FBI help) for 18 month and failed. On my HDD (apart of OS) you have triple encryption on any container/partition with a keyfile so it's rather unbreakable within reasonable time. TC for me is rather to protect me when laptop is lost than to try to hide data from police (no matter if I think they have right to spy on us all the time ; ex: Google Drive, Dropbox, TuneIn, VoIP connection software on my Android phone and many more are already blocked in China because police can't control moved data). It's one of the reasons why apart of protecting my data against ordinary theft I do try to protect my privacy :) IMO hidden volume can be detected in the container even if you cooperate with police - there will be a size difference of data copied to a container and container size (unless I'm mistaken here). IMO, much better to claim plausible deniability is encrypting a raw clusters on the HDD (ex: external). In that way data on such HDD looks like a rubbish without any structure nor readable header to see what's there unless you know the password or a keyfile. Each time you connect such HDD to your system Windows is reporting unformatted drive and asks to format it. As for AES hardware encrypted USB it's possible that you might not know the password if ie. your kid for instance changed it long time ago :) Life is life ;P TO> If you use a VPN to a trusted server in EU/US, aren't you better TO> off leaving you email on the trusted IMAP server so if you do TO> loose your laptop again, your email is easily recoverable? First is the size (over 6GB database), second is that I can do the same with TBK archive copied in TC container and burnt on DL DVD. Actually I have all e-mails doubled because every e-mail I sent and receive is saved on HDD as EML and I do make copies of it. I do burn on DVD TC containers so even if somebody gets it they can't read it. Last thing is that I do not have much trust in IMAP and leaving your data on some server ; even big companies lost customers data due to mistakes - you can call me old fashioned here but if it's lost I can only blame myself :) > I do appreciate that some unlucky people have a real need to protect > themselves from serious danger and to leave as little trace as > possible. My TB installation on my laptop is password protected and 'On > the Fly' encrypted. Any idea how secure that is? Sorry, I don't know. I would love to know what encryption is used by Ritlab. As for now I use non-encrypted TB! installed on separated TC container and it works good for me. I used on-fly-encrypted version first I installed TB! but had to switch to none-encrypted due to some problems I had with it (don't remember now what it was ; reported it on BugTraq but it's gone now). Tried to use Voyager that is on-fly-encrypted on my 32GB USB but it didn't work good. I mean here that Voyager worked good but sync to a my desktop failed 3 times in a raw so I just gave it up. At the moment I just use TBK to move it between laptop<->desktop if I need to travel. -- Best Regards, RS (FEDARA) The Bat! 5.1.2 Windows 7 x64 Professional (7601 Service Pack 1) POP3 accounts (x5) Wednesday, May 2, 2012 (19:08 ; GMT+8) ________________________________________________________ Current beta is 5.1.2.2 | 'Using TBBETA' information: http://www.silverstones.com/thebat/TBUDLInfo.html

