+ Reply to Thread
Page 2 of 2 FirstFirst 12
Results 16 to 20 of 20

Thread: In Truecrypt We Trust

  1. #16

    Join Date
    16.06.10
    P2P Client
    I can haz candy
    Posts
    590
    Activity Longevity
    0/20 17/20
    Today Posts
    0/5 ssssss590
    Pretty much

    Better to have true than false security, if you ask me.
    Reply With QuoteReply With Quote
    Thanks

  2. #17
    Moderator
    shoulder's Avatar
    Join Date
    12.04.08
    Location
    I*** D* M*****
    Posts
    4,827
    Activity Longevity
    3/20 19/20
    Today Posts
    0/5 sssss4827
    Well, then Bitlocker is also not for you as it's closed source.



    ------------------------------>>>>>>>>>> <<<<<<<<<<------------------------------

    Reply With QuoteReply With Quote
    Thanks

  3. #18
    Advanced User Renk's Avatar
    Join Date
    17.08.08
    Location
    Elsewhere
    P2P Client
    utorrent
    Posts
    581
    Activity Longevity
    0/20 19/20
    Today Posts
    0/5 ssssss581
    TrueCrypt isn't something I'd trust. Why you ask? Read this Bootkit bypasses hard disk encryption - The H Security: News and Features
    THanks for the link, but I don't share your conclusion:

    As Shoulder suggested, I don't think TrueCrypt could be incriminated for that. TrueCrypt is an encryption tool, not an anti-malware. For the same reason you could say "don't trust PGP" or even "don't trust Zone Alarm because everyone who stole your HDD with ZA installed can read your data in plain text" ?


    Imo, the links you gave doesn't really prove you don't trust TrueCrypt, it shows you don't trust your PC. What could be safe if your machine is compromised ?

    In the attacked decribed, the MBR is compromised by an attancker before the user log to is truecrypt. A possible countermeasure could be to boot only from CD.
    Reply With QuoteReply With Quote
    Thanks

  4. #19

    Join Date
    16.06.10
    P2P Client
    I can haz candy
    Posts
    590
    Activity Longevity
    0/20 17/20
    Today Posts
    0/5 ssssss590
    I already answered to that question. TrueCrypt by nature should be able to protect against that.
    Reply With QuoteReply With Quote
    Thanks

  5. #20
    Advanced User Renk's Avatar
    Join Date
    17.08.08
    Location
    Elsewhere
    P2P Client
    utorrent
    Posts
    581
    Activity Longevity
    0/20 19/20
    Today Posts
    0/5 ssssss581
    Quote Originally Posted by Gapo View Post
    I already answered to that question. TrueCrypt by nature should be able to protect against that.

    To feed the debate: This question has been discussed on the TrueCrypt forums

    Moreover, in saying "TrueCrypt by nature should be able to protect against that" you could be right, and I could have been wrong in speaking about PGP. Indeed in doing some search, I have found that:

    PGP Advisory Board

    Stoned Boot Attack
    Tuesday, August 4th, 2009

    Another development that came out this last week at Black Hat is the “Stoned Bootkit” boot-level malware. You can find documentation including the source code at the http://www.stoned-vienna.com/ site.

    This is an interesting piece of malware, particularly since it works around the full-disk encryption provided by the open source TrueCrypt application. Despite the excellent paper and presentation on the Stoned-Vienna website, there is a good deal of misinformation about it, even on that site.

    (...)

    The creators managed to get around TrueCrypt through a clever bit of brute-force. They install themselves as a shim driver above TrueCrypt and below Windows, thus completely bypassing TrueCrypt’s encryption.

    The natural question for anyone who uses PGP is whether it would affect a system protected with PGP® Whole Disk Encryption (WDE).

    The answer I give is that it would not as written.

    PGP WDE has a clever feature in it — WDE prevents you from writing over the MBR. Consequently, it’s impossible to install MBR-level malware on a system with PGP WDE for that simple reason.

    This particular piece of malware very cleverly installs itself in the MBR and performs a judo move on TrueCrypt. That particular judo move wouldn’t work on PGP WDE because we protect the MBR. It wouldn’t work on a system that protects the MBR some other way, like with a Trusted Platform Module (TPM). It also doesn’t affect systems that don’t have an MBR at all, like systems that boot with EFI including all Macs.

    Stoned Boot Attack


    But then, we can trust TrueCrypt on systems booting with EFI ?
    Last edited by Renk; 08.11.10 at 01:34.
    Reply With QuoteReply With Quote
    Thanks

+ Reply to Thread
Page 2 of 2 FirstFirst 12

Tags for this Thread

Posting Permissions

  • You may post new threads
  • You may post replies
  • You may not post attachments
  • You may not edit your posts
  •