Free drive encryption
-
@BRRABill said:
@scottalanmiller said:
Ah, thought taht you were thinking that he broke in somehow.
No just that regardless of what we are talking about, government documents and secrets or the secure enclave, someone knows where the bodies are buried and could cause damage if they wanted to.
that's mostly true, but good cryptography systems are supposed to be designed without the ability to disable them. That's what Apple is changing in their new releases.
-
@scottalanmiller said:
that's mostly true, but good cryptography systems are supposed to be designed without the ability to disable them. That's what Apple is changing in their new releases.
You've already convinced me that once you lose the physical device, the data is compromised.
THERE'S NO TURNING BACK NOW!
-
@Dashrender said:
@BBigford said:
@Dashrender said:
@BBigford said:
@Dashrender said:
Personally, for the standard things we need to be concerned about - a stolen laptop that had HIPAA data or some such, Bitlocker is totally acceptable. If you're worried about the NSA, then no, you can't use it.
It's more of a search for the "gotcha" in Bitlocker. There's so much controversy behind it, I'm just curious if there is a "see... it's crackable with <method x> or <software x>." I haven't found any solid evidence throughout the years aside from the cold boot vulnerabilities, so that's why I turned to the community.
Exactly - and I'm betting you won't find any either. It's like this FBI thing and the bomber's phone. I'm not sure I believe that anyone actually cracked the encryption on the phone. Personally I think that's a lie so they could drop a case they felt they were losing and didn't want to have a precedent set against them.
So you're speculating that Bitlocker is ultra secure,
ultra? who's to say - but I do consider it secure enough for the common man to use. Again, Healthcare worker trying to keep their PHI (personal health information) away from prying eyes on a stolen laptop, it's more than likely fine, the average thug on the street will just format it if able and reinstall Windows and move on. But if you're talking about a targeted attack, say the FBI is trying - then I have no idea how good it is against them trying to crack into it.
or any material on it is just being smothered?
No idea what you mean here.
Sorry, what I meant is any material that shows it is able to be cracked, is not lasting online as its been kept hush-hush... (that's getting more into conspiracy territory though).
-
@BRRABill said:
@scottalanmiller said:
that's mostly true, but good cryptography systems are supposed to be designed without the ability to disable them. That's what Apple is changing in their new releases.
You've already convinced me that once you lose the physical device, the data is compromised.
THERE'S NO TURNING BACK NOW!
eh? I definitely don't believe this - of course assuming I am using a crypto that I believe in.
-
@iroal said:
I use Veracrypt, It's fully compatible with Truecrypt.
It's free and very similar to Truecrypt, I use it with Dropbox and Google Drive.
Veracrypt here as well