TrueCrypt 4.3 Released 285
RedBear writes "A new update to the best open source transparent encryption software has been released. TrueCrypt is (the only?) open source encryption software capable of creating and mounting encrypted virtual disk images that can then be worked with transparently like any other storage drive, with data encrypted and decrypted in real-time. These virtual disks can be created as files, or entire partitions or physical drives can be encrypted and mounted transparently. Sadly there is still no Linux GUI or Mac OS X port in sight. If you are one of the thronging hordes who have been patiently awaiting ubiquitous multi-platform encryption, please consider donating time or money to the cause, and add your voice to the forum." From the site:"Among the new features [are] full compatibility with 32-bit and 64-bit Windows Vista, support for devices and file systems that use a sector size other than 512 bytes (such as new hard drives, USB flash drives, DVD-RAM, MP3 players, etc.), auto-dismount when a host device (e.g., a USB flash drive) is inadvertently removed, and many more." Read on for more features of TrueCrypt and cached versions of all the links above.
Also including features like plausible deniability, steganographically hidden volumes, unidentifiable partition headers, traveler mode, and your choice of the strongest available encryption algorithms up to and including multi-algorithm cascades. TrueCrypt is practically the Holy Grail for advocates of free ubiquitous encryption. Now, if only it were platform independent.
To reduce load on their servers here are some Coralized versions of all the links:
TrueCrypt home page
Future development goals
Forum thread about Mac OS X version
Donations page
General forum
Plausible deniability
Hidden volumes
Traveler mode
Encryption algorithms
Multi-algorithm cascades
Version history
The coolest part. (Score:3, Insightful)
I can not believe that the other encryption software out there is not even 1/20 as good as truecrypt.
you can hide your data pretty easy with it.
Re:The coolest part. (Score:5, Informative)
That's not entirely true. When TrueCrypt opens, it installs a driver (in Windows). This driver remains there unless you remove it. In fact, I just had to manually remove it because the old version of the driver was already installed, and the new version of it couldn't override it.
Don't get me wrong, I absolutely LOVE TrueCrypt, I use it everyday, however it's not entirely true that it leaves no footprint. At least, not in my experience.
-Eddie
Pet Peeve (Score:3, Interesting)
Re: (Score:2, Insightful)
One other downside worth mentioning is that on Windows you have to have administrator rights on the machine to use it.
Re: (Score:2)
Re: (Score:3, Interesting)
Re: (Score:3, Informative)
wrong, if you read the info on the site about "traveller mode"
After examining the registry file, it may be possible to tell that TrueCrypt was run (and that a TrueCrypt volume was mounted) on a Windows system even if it is run in traveller mode.
so it still writes to the registry and so can be discovered by forensics in an instant
why it writes to the registry really needs to be addressed, i wish apps went back to the old
Re:The coolest part. (Score:4, Informative)
In fact, TrueCrypt's settings are maintained in a file called Configuration.xml in the same directory as TrueCrypt.exe, in order to remain truly portable.
Re: (Score:2)
Re: (Score:3, Interesting)
Re:The coolest part. (Score:5, Informative)
Traveller Mode
TrueCrypt can run in so-called 'traveller' mode, which means that it does not have to be installed on the operating system under which it is run. However, there are two things to keep in mind:
* You need administrator privileges in order to able to run TrueCrypt in 'traveller' mode.
* After examining the registry file, it may be possible to tell that TrueCrypt was run (and that a TrueCrypt volume was mounted) on a Windows system even if it is run in traveller mode.
If you need to solve these problems, we recommend using BartPE for this purpose. For further information on BartPE, see the question "Is it possible to use TrueCrypt without leaving any 'traces' on Windows?" in the section Frequently Asked Questions.
Re: (Score:2, Interesting)
Now if you can get that I ran the trucrypt binary that was renamed to vi on that thumbdrive then you are an incredible researcher and need to be working for the FBI/NSA right now.
leave the history intact. it shows I ran VI.
Re: (Score:3, Informative)
But if you have to run it from the command line, you probably need to give it command-line arguments. Do truecrypt's typical arguments look like typical vi arguments?
Re: (Score:2)
Re: (Score:2, Informative)
The first few bytes of the file contain the encrypted symmetric key for the block cypher, which looks random, just like the rest of the file.
it will even tell you what volume you've mounted - Standard or Hidden
So? By definition that information has to be available or Truecrypt wouldn't know where to read or write. That it's displayed to you doesn't make a difference if someone gets to inspect the running system. Plausible den
No OS X Port? (Score:3, Insightful)
Re:No OS X Port? (Score:5, Informative)
You can also use any file as the key, instead of (or in combination with) a password.
And you can encrypt an entire partition, instead of putting the image inside another filesystem and letting it get copied around by the defragmenter (which may have security implications for the ultra-paranoid).
Re: (Score:2)
As an example:
I have a volume with porn in it. The hidden volume contains other things. All I can divulge is that first password and they get a volume of porn. Hey, I was hiding my secrete homo-autoerotic transvestite fetish from my S.O. Nevermind the 15 megs of "unused" space at the end of the volume.
-nB
Comment removed (Score:4, Funny)
Re:No OS X Port? (Score:5, Informative)
When you create the (main) volume, it's filled with random data. Formatting overwrites some of that, but the empty space is still full of random bytes. So, let's say you create a main volume on a 100 MB partition, and copy over some "cover" files, leaving 75 MB of free space at the end.
Then you create a 50 MB hidden volume, which is stored at the end of the partition. You put your top secret files in there, dismount it, and remount the main volume. The main volume still says "100 MB total, 75 MB free", and the free space still appears to be full of random bytes (since the hidden volume is encrypted), but they're different random bytes than they were at first.
So no, you can't tell just by looking at the mounted main volume that there's a hidden volume. All you can do is suspect that there might be something hidden in that free space, but you can't prove it - there are no plaintext headers, so both volumes are completely encrypted and appear random without the correct key. TrueCrypt will even let you reformat the main volume, destroying the hidden volume in the process, unless you specifically tell it to protect the hidden volume (using the correct key) when you mount the main one.
OTOH, you might be able to make a snapshot of the entire encrypted partition (without alerting the owner), then come back later and look for changes once you've gotten him to give up the key to the main volume. If the changes are in the main volume's free space, and they can't be explained by creating and deleting files, then you know there's a hidden volume. However, this requires covert monitoring over a period of time while the system is in active use; you can't detect the hidden volume simply by seizing a drive and examining it all at once.
Re: (Score:2)
Re: (Score:2, Interesting)
Of course, if someone can access your computer as freely as you've described, it would probably be a lot easier for them to install a keylogger program (or a hardware hack) & get your secret key when you type it in.
Re: (Score:3, Insightful)
Re: (Score:2, Informative)
Here's a page from Microsoft that does some calculations on how hard it is to brute force a good key:
http://www.microsoft.com/technet/security/secnews/ articles/itproviewpoint091004.mspx [microsoft.com]
and the followup article about using passphrases:
http://www.microsoft.com/technet/security/secnews/ articles/itproviewpoint100504.mspx [microsoft.com]
Not lifetime-of-the-universe lengths of time, but any security-conscious individual can certainly make their hidden passwo
Re: (Score:3, Insightful)
Brute forcing true crypt takes a LONG TIME. Just using the standard truecrypt executable, it takes about 2.26 seconds per guess on my Athlon 2500+. To put that in perspective, it would take my machine nearly 70 days to brute force a 4 charactor password (Aprox 14 million
Re:No OS X Port? (Score:4, Insightful)
Re: (Score:3, Interesting)
Monday morning, the attacker sneaks in and records a snapshot of your 100 MB partition.
Friday evening, he comes back with guns blazing and forces you to reveal a key. He uses it to mount both copies of your main volume, the current one and the snapshot, and then compares them byte-for-byte. Some of the changes are in files present on the main volume, but other changes are in fre
Re:No OS X Port? (Score:5, Insightful)
Re:No OS X Port? (Score:4, Insightful)
Re:No OS X Port? (Score:5, Insightful)
Re:No OS X Port? (Score:5, Interesting)
Blew mod points to respond to this.
Disk Utility, the graphical application, is not open source. diskutil and hdiutil, the command-line programs it is a front-end for, are open source. I don't know whether the DiskImages framework (which hdiutil could be considered a front-end for) is open source, though. (my guess is "yes")
-:sigma.SB
Re:No OS X Port? (Score:4, Insightful)
Re: (Score:3, Informative)
Re: (Score:3, Informative)
Linux downloads available (Score:5, Informative)
Not really, you can download ubuntu binaries from their download section [truecrypt.org].
Re:Linux downloads available (Score:5, Informative)
Re:Linux downloads available (Score:4, Insightful)
Hell, I used PGPdisk back in the '90s, and it was "all that".
Re: (Score:3, Insightful)
Re: (Score:3, Insightful)
The point is that your actual volume is hidden within a decoy volume. You give them the key to open the decoy volume, and they find a bunch of files that won't get you incarcerated.
There
Re: (Score:2)
Raarrgh (Score:2, Funny)
Re:Raarrgh (Score:4, Funny)
So much for education.
debian has transparent encryption (Score:3, Informative)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Not entirely sure what you're hinting at here with the space bit, the encryption is 1:1 and doesn't consume any space (except maybe a few kb headers), and you can use whatever combination of crypto/RAID/LVM you want, looped into each other. Also if you want an encrypted container you can create that on a current system, the only reason you need the installer is if you'r
Nothing to see here (Score:4, Funny)
Re: (Score:2)
While ideally they wouldn't snoop for snooping's sake, we all know there are wanna-be Simons out there
-nB
Re:Nothing to see here (Score:4, Insightful)
Anyway--I think there are legitimate reasons to want to encrypt data. How about a doctor wanting to ensure patient records are private? Or a corporation that has done some research that it doesn't want to get out? Or what about your personal diary (some people, believe it or not, don't think MySpace is the best place for a private diary)? Or what if you work for the CIA and have been stealing data from a small quiet--a little too quiet--Scandinavian company for a couple years...and they find you out and take your computer after breaking your legs? (ok, that last one's a stretch).
I'm sure commenters will add many more legitimate items to this list.
Re: (Score:3, Insightful)
Brute force attack built in, is what I want (Score:2, Interesting)
I had the recent misfortune to forget the password to an encrypted file. It has stuff that isn't that important or/and can be replaced, but the point is, it takes time to replace this sort of stuff (if it can be replaced). The reason is simply, running on a laptop, if it falls into someone elses hands (and they manage to get past the various passwords (reset the BIOS, insert KNOPPIX away you go)) I don't really want them to
Re: (Score:2)
You could always use something like jack the ripper to try and brute force your password. You'd still have to produce your own dictionary file though.
Re: (Score:2)
Re: (Score:2)
Algorithm Cascades == BAD? (Score:2, Interesting)
Other than that, it is a very nice little program.
Re:Algorithm Cascades == BAD? (Score:4, Interesting)
Re: (Score:2, Insightful)
Re: (Score:3, Informative)
There's a special case you're not considering: Multi-algorithm cascade with the same key. Arbitrary (and dumb) example: A single cipher in CTR mode. Encrypt once with key k and you're in good shape. Run the algorithm again with key k and your data is plaintext again. It's an extreme case, but one can come up with other more reasonable thought experiments.
FreeOTFE? (Score:5, Informative)
think TrueCrypt is "the only" one.
Clipped (and truncated) from the website: [freeotfe.org]
Re: (Score:2)
Re: (Score:2)
Re: (Score:3, Interesting)
It doesn't need admin privs, leaves no tracesif set up properly, and is open source. If you want to store multiple files under one encrypted file, slap them in a zip file and encrypt that.
Don't get me wrong, I'm sure there are legitimate purposes for transparent volume encryption, and plausible deniability, b
TrueCrypt also supports 'plausible deniabilty' (Score:4, Informative)
Dangerous feature (Score:2)
Re: (Score:3, Insightful)
If you're going to be indefinitely held while being tortured, until you die or are killed, all the software features in the world aren't going to help you. It's more useful in places where "plausible deniability" can be used to get you out of trouble, not in countries or organizations where the concept is irrelevant.
Good interim solution . . . (Score:2)
Hopefully hardware-based encryption will become standard soon. I want to boot up, type in my passphrase, and have A
Spread the word - truecrypt volumes can be rsync'd (Score:2, Informative)
Just be sure to read about the --checksum option. I personally keep all of my most sensitive files in
Re:Spread the word - truecrypt volumes can be rsyn (Score:3, Interesting)
It should be noted that this is not necessarily a good idea if you have a hidden volume and like to writ
EncFS (Score:2, Interesting)
Re: (Score:2)
Do you have a system in that which memory is encrypted to prevent superuser attacks (TPM)?
Fedora Blues (Score:2)
Virtual Machine + TS = Fully encrypted OS? (Score:3, Interesting)
Sure (Score:2)
eCryptfs (Score:4, Informative)
http://ecryptfs.sourceforge.net/ecryptfs-faq.html
Caveated Gush (Score:2)
TrueCrypt looks good. It's got a nice GUI, explains everything, has promised not to go commercial and best-yet they give you the option to use MULTIPLE CIPHERS! YAY! As in why
Caveated Caveat (Score:3, Informative)
Whole Disk Encryption missing from TrueCrypt (Score:2)
I would use TrueCrypt in conjuction with PGP WDE, however, on a secondary harddrive containing, um, "a
Will it run on OS X command line? (Score:2)
Laptop data-security using TrueCrypt (Score:2, Informative)
Its called "Steal my laptop (I don't care) - Securing laptop-data"
Here's the link to it:
http://ergo.rydlr.net/?p=39 [rydlr.net]
Bootable FDE? (Score:2)
Re: (Score:3, Informative)
Re: (Score:2)
I don't expect you to read the article, but at least read the summary. Does disk utility give you plausible deniability, steganographically hidden volumes, unidentifiable partition headers, traveler mode, and your choice of the strongest available encryption algorithms up to and including multi-algorithm cascades?
I'm afraid this is definitely an area where os x lags.
Re: (Score:2, Interesting)
Maybe because the tinfoil hat crowd usually doesn't buy Apple computers.
While I support a lot of what the FOSS movement does, I think this is a good example of the overall trend -- it (over)fills very small nich
Re: (Score:3, Informative)
Errrr right - did you not read the linked thread where all the os x users were asking for a truecrypt port?
While I support a lot of what the F/OSS movement does, I think this is a good example of the overall trend -- it (over)fills very small niches very well, but doesn't do much for the masses.
Right dude, apart from the craploads of FOSS stuff you use on your mac every day? OS X is built on F/OSS - absolutely nothing on the system woul
Re: (Score:2)
Maybe because the tinfoil hat crowd usually doesn't buy Apple computers.
This stuff isn't just for the tinfoil hat crowd.
If you're using encryption at all, it's because you want to keep something private, right? Now imagine someone discovers an encrypted partition on your computer. In some circumstances (e.g. if you live in the UK), you may be forced to reveal the password, or punished for refusing to reveal it. So you can either accept the punishment, or reveal the files that you thought were private enough to justify using encryption in the first place.
That's not a good outco
Re: (Score:3, Funny)
Re: (Score:2)
A GUI to mount/umount a volume would be useful to just setup a little utility with a link say on your desktop so all you'd have to do is click the icon on your desktop/panel/m
Re: (Score:2)
Re: (Score:2, Funny)
Re:What a load of BS... (Score:5, Informative)
Incorrect, there is no container file inside the first container, and if you don't enter the password for the second container the same time as the first container you *CAN* overwrite the data in the second container, thus corrupting it.
From the website (If only people would RTFM (no, I'm not new here)):
Protection of Hidden Volumes Against Damage
As of TrueCrypt 4.0, it is possible to write data to an outer volume without risking that a hidden volume within it will get damaged (overwritten).
When mounting an outer volume, the user can enter two passwords: One for the outer volume, and the other for a hidden volume within it, which he wants to protect. In this mode, TrueCrypt does not actually mount the hidden volume. It only decrypts its header and retrieves information about the size of the hidden volume (from the decrypted header). Then, the outer volume is mounted and any attempt to save data to the area of the hidden volume will be rejected (until the outer volume is dismounted).
Note that TrueCrypt never modifies the filesystem (e.g., information about allocated clusters, amount of free space, etc.) within the outer volume in any way. As soon as the volume is dismounted, the protection is lost. When the volume is mounted again, it is not possible to determine whether the volume has used hidden volume protection or not. The hidden volume protection can be activated only by users who supply the correct password (and/or keyfiles) for the hidden volume (each time they mount the outer volume).
Re: (Score:2)
---Incorrect, there is no container file inside the first container, and if you don't enter the password for the second container the same time as the first container you *CAN* overwrite the data in the second container, thus corrupting it.
I am talking about this link [truecrypt.org] in which displays a large container and 2 containers inside of it. The text accompanying it is also sort of misleading. What does worry me is this statement:
"NT
Re: (Score:3, Informative)
More terse version of another response you've seen already: If you do this, TrueCrypt will happily overwrite the hidden sectors and you will get nothing. TrueCrypt will
Re: (Score:2)
Re: (Score:2)
I understand that. I'm not going to challenge if the random # gen is actually random, because that is aside the point.
Instead, if one can watch the sectors and bits changed, one can identify after the "sucker" password is given. A hidden volume can be identified. Also, one would have to be absolutely sure that any parts of the unencrypted system does not
Re: (Score:2)
I think you're really not understanding how this system works. If you only have the "sucker" password, you can manipulate the contents of the mounted outer volume all you want. TrueCrypt, having no clue that there's a hidden volume, will simply overwrite useful data blocks and destroy the hidden volume. Hidden volumes are only protected from corruption if you
Re:This really is not _the only_ program out there (Score:3, Informative)
dd if=/dev/zero of=image_name bs=1k count=lenth
mdconfig -a -t vnode -f image_name -u 0
geli init -a hmac/sha256
geli attach
dd if=/dev/random of=/dev/md0.eli bs=1m
newfs
mount
okay its a bunch of commands, but I'm basically reading out of the man page. And this setup has tamper detection.
Re: (Score:2)
Easy solution: Run RAID-5, or R
Re:What I'd like to see (and plan to implement soo (Score:3, Informative)
This will take /dev/md0, create an encrypted volume from it using the supplied 16 byte password in hex, and create /dev/mapper/encrypted_raid to mount as your root file system. Replace /dev/md0 and /dev/mapper paths with the appropriate locations your devices for your distro. A combination of pivot_root and chroot can be used to move the mounted encrypt
Re: (Score:2)
Re: (Score:2)
If it has over a certain limit (Mythbusters ran against this limit too), it has to be used only by 'licensed professionals'.
Best bet: create an electromagnet.