+ Reply to Thread
Page 1 of 2 12 LastLast
Results 1 to 15 of 20

Thread: In Truecrypt We Trust

  1. #1
    Advanced User Renk's Avatar
    Join Date
    17.08.08
    Location
    Elsewhere
    P2P Client
    utorrent
    Posts
    581
    Activity Longevity
    0/20 19/20
    Today Posts
    0/5 ssssss581

    In Truecrypt We Trust

    The FBI failed to break the encryption code of hard drives seized by federal police at the apartment of banker Daniel Dantas, in Rio de Janeiro, during Operation Satyagraha. The operation began in July 2008. According to a report published on Friday (25) by the newspaper Folha de S. Paulo, after a year of unsuccessful attempts, the U.S. federal police returned the equipment to Brazil in April.

    According to the report, the fed only requested help from USA in early 2009, after experts from the National Institute of Criminology (INC) failed to decode the passwords on the hard drives. The government has no legal instrument to compel the manufacturer of the American encryption system or Dantas to give the access codes.

    G1 - Not even FBI was able to decrypt files of Daniel Dantas - notícias em English
    Reply With QuoteReply With Quote
    Thanks

  2. Who Said Thanks:

    BrianBosworth (03.09.10) , SBfreak (29.06.10) , KalPenn (29.06.10) , Mihai (29.06.10) , MrCheat (29.06.10) , Blocker (29.06.10) , anon (29.06.10)

  3. #2

    Join Date
    24.12.09
    Location
    USA
    P2P Client
    uTorrent
    Posts
    135
    Activity Longevity
    0/20 17/20
    Today Posts
    0/5 ssssss135
    Yeah its true that the FBI cannot decrypt hard passworded files/hard drives, however the NSA can but it usually never goes that far since it is expensive. However, if you were a person with high interest, they would send your file to the NSA and have it decrypted.
    Thanks for the info.
    Reply With QuoteReply With Quote
    Thanks

  4. #3
    What helps, is never get a person of interest:)
    Reply With QuoteReply With Quote
    Thanks

  5. #4
    Advanced User
    Join Date
    30.07.09
    P2P Client
    Azureus™
    Posts
    847
    Activity Longevity
    0/20 18/20
    Today Posts
    0/5 ssssss847
    Quote Originally Posted by MrCheat View Post
    ...however the NSA can but it usually never goes that far since it is expensive....
    What are they(nsa) doing with the hdd?
    I thought there is no way to decrypt such systems (at least within few years).
    Reply With QuoteReply With Quote
    Thanks

  6. #5
    I thought there is no way to decrypt such systems (at least within few years).
    Ha you never know what kind of technology is hidden from us.
    Reply With QuoteReply With Quote
    Thanks

  7. #6
    Moderator anon's Avatar
    Join Date
    01.02.08
    Posts
    39,444
    Activity Longevity
    8/20 19/20
    Today Posts
    5/5 ssss39444
    Quote Originally Posted by tokiodrift1 View Post
    I thought there is no way to decrypt such systems (at least within few years).
    Nothing's flawless.
    "I just remembered something that happened a long time ago."
    Reply With QuoteReply With Quote
    Thanks

  8. #7
    Advanced User
    Join Date
    30.07.09
    P2P Client
    Azureus™
    Posts
    847
    Activity Longevity
    0/20 18/20
    Today Posts
    0/5 ssssss847
    I've heard that somewhere...

    btw, anon, its futbol-time.
    Last edited by tokiodrift1; 29.06.10 at 20:22.
    Reply With QuoteReply With Quote
    Thanks

  9. #8
    Advanced User saebrtooth's Avatar
    Join Date
    21.06.09
    Location
    somewhere?
    P2P Client
    An eMule & VEM
    Posts
    2,150
    Activity Longevity
    0/20 18/20
    Today Posts
    0/5 sssss2150
    Even if some org didnt have super computers even with secret malware they could steal CPU and bandwidth to do their dirty stuff
    dont ban me just spank me
    Reply With QuoteReply With Quote
    Thanks

  10. #9


    Join Date
    22.06.08
    Location
    astral planes
    P2P Client
    sbi finest
    Posts
    3,125
    Activity Longevity
    0/20 19/20
    Today Posts
    0/5 sssss3125
    Quote Originally Posted by MrCheat View Post
    Yeah its true that the FBI cannot decrypt hard passworded files/hard drives, however the NSA can
    translated, that means the fbi can do it too since they cooperate when necessary or they can simply install another system for this purpose within the fbi

    but it usually never goes that far since it is expensive.
    which is what they want people to believe, whereas the federal bank prints money as they please and the federal bureau gets it when needed, and the public gets served with a watered down (harmonized, non transparent) version of the truth

    what info does one have about truecrypt, their authors, their financial records, donations, connections to the government and so on - one can be pretty sure the government (via intelligence agencies) is very interested to be ahead (or infiltrated/prepared/informed/in control) of anything potentially dangerous (which includes unknown/new technology) to the system
    Reply With QuoteReply With Quote
    Thanks

  11. Who Said Thanks:

    Renk (01.07.10) , saebrtooth (01.07.10)

  12. #10

    Join Date
    16.06.10
    P2P Client
    I can haz candy
    Posts
    590
    Activity Longevity
    0/20 17/20
    Today Posts
    0/5 ssssss590
    TrueCrypt isn't something I'd trust. Why you ask? Read this Bootkit bypasses hard disk encryption - The H Security: News and Features
    Reply With QuoteReply With Quote
    Thanks

  13. #11
    Moderator
    shoulder's Avatar
    Join Date
    12.04.08
    Location
    I*** D* M*****
    Posts
    4,827
    Activity Longevity
    3/20 19/20
    Today Posts
    0/5 sssss4827
    And you think this is a problem by TrueCrypt?



    ------------------------------>>>>>>>>>> <<<<<<<<<<------------------------------

    Reply With QuoteReply With Quote
    Thanks

  14. #12

    Join Date
    16.06.10
    P2P Client
    I can haz candy
    Posts
    590
    Activity Longevity
    0/20 17/20
    Today Posts
    0/5 ssssss590
    Err, yes? Even if the BIOS is weak to this attack, TrueCrypt should be able to protect it somehow.

    This quotation is interesting;

    For instance, using Windows' own BitLocker encryption mechanism is said to be a reliable antidote, because an infected MBR's hash value no longer corresponds to the hash value stored in the TPM, prompting the TPM to abort the boot process.
    Source - http://www.h-online.com/security/new...on-742721.html
    Last edited by Gapo; 05.11.10 at 12:33.
    Reply With QuoteReply With Quote
    Thanks

  15. #13
    Moderator
    shoulder's Avatar
    Join Date
    12.04.08
    Location
    I*** D* M*****
    Posts
    4,827
    Activity Longevity
    3/20 19/20
    Today Posts
    0/5 sssss4827
    Well, Bitlocker realizes this using additional hardware (TPM), which TrueCrypt doesn't.



    ------------------------------>>>>>>>>>> <<<<<<<<<<------------------------------

    Reply With QuoteReply With Quote
    Thanks

  16. #14

    Join Date
    16.06.10
    P2P Client
    I can haz candy
    Posts
    590
    Activity Longevity
    0/20 17/20
    Today Posts
    0/5 ssssss590
    Not an excuse to be vulnerable to this attack

    TrueCrypt can just implement this feature and be done with it.
    Last edited by Gapo; 05.11.10 at 12:49.
    Reply With QuoteReply With Quote
    Thanks

  17. #15
    Moderator
    shoulder's Avatar
    Join Date
    12.04.08
    Location
    I*** D* M*****
    Posts
    4,827
    Activity Longevity
    3/20 19/20
    Today Posts
    0/5 sssss4827
    Quote Originally Posted by Gapo View Post
    TrueCrypt can just implement this feature and be done with it.
    And tell all their users without TPM, "Sorry, you can't use us anymore"?



    ------------------------------>>>>>>>>>> <<<<<<<<<<------------------------------

    Reply With QuoteReply With Quote
    Thanks

+ Reply to Thread
Page 1 of 2 12 LastLast

Tags for this Thread

Posting Permissions

  • You may post new threads
  • You may post replies
  • You may not post attachments
  • You may not edit your posts
  •