Hotspot use of truecrypt ,opinions please

Discussion in 'privacy technology' started by vane, Mar 28, 2011.

Thread Status:
Not open for further replies.
  1. vane

    vane Registered Member

    Joined:
    Mar 28, 2011
    Posts:
    15
    I posted these questions on the truecrypt board but up to now i had no reactions yet.
    Because of a broader user base (i think) on this board i thought to ask for opinions here.

    Current use: i have a netbook with windows 7 , ( no page file) ,a usb stick with a TC filecontainer on it.
    I go to a public wifi access point,open the encrypted filecontainer ,in this container sits a portable Firefox which i start.( using the Tor network, but i am going to use a VPN).
    i save some webpages ( in Scrapbook ,an extension also residing in the container) ,so, when i'm done i dismount the container.
    I want to make this setup more secure if possible ;
    1. there is the problem of "wear leveling" with the usb stick ;this could be alleviated by moving the file container to the hd.
    2. Data leaks to the Os, via the usual suspects, temp files , dr. Watson , bsd's.
    I would like to hear opinions on alternatives.
    1. encrypted system ,with TC filecontainer on it. reading this forum i believe that , for instance , after a bsd, upon reboot the possible plaintext remnants in ram are gone ?
    2. encrypted system and decoy os ,the reason for the decoy: imagine this situation : threat : the netbook is possibly being taken forcefully ,no time to close firefox and dismount properly,
    see : "Shuttng down laptop instantly"at: http://forums.truecrypt.org/viewtopic.php?t=22355 , creating a bsd ,see : http://www.howtogeek.com/howto/4042...a-blue-screen-of-death-in-any-color-you-want/
    so, in case of emergency ,create a bsd, pc reboots into decoy os , so all data in ram will be gone, and adversary sits in the decoy.
    I hope this all makes sense, what would be a good way to achieve my goal ; no data leaking and if possible emergency shutdown.
    Thanks for any suggestions
     
  2. markedmanner

    markedmanner Registered Member

    Joined:
    Nov 1, 2009
    Posts:
    134
    You could use Returnil on your system. Enable it before mounting your truecrypt volume from your USB. Then set Returnil to wipe all disk changes at computer startup. That way any of the BSOD etc. you are worrying about is not saved. As far as emergency shutdown this is the quickest way I know of: http://www.ehow.com/how_4758555_fast-emergency-shutdown-of-windows.html
     
  3. vane

    vane Registered Member

    Joined:
    Mar 28, 2011
    Posts:
    15
    Thank you for helping out, i am reading up on Returnil , see how it works , a virtual environment is a different approach ,i am mainly concerned with plaintext remnants residing somewhere on disk after a forced reboot.
    Good tip i'll try this out.
     
  4. CloneRanger

    CloneRanger Registered Member

    Joined:
    Jan 4, 2006
    Posts:
    4,978
  5. vane

    vane Registered Member

    Joined:
    Mar 28, 2011
    Posts:
    15
  6. chiraldude

    chiraldude Registered Member

    Joined:
    Jul 3, 2010
    Posts:
    157
    1. there is the problem of "wear leveling" with the usb stick ;this could be alleviated by moving the file container to the hd.
    Wear leveling is not an issue if you always save encrypted data to the usb drive. (Only if you encrypt data in-place)

    2. Data leaks to the Os, via the usual suspects, temp files , dr. Watson , bsd's.
    No much you can do about this. Windows does what Windows does...


    1. I believe that , for instance , after a bsd, upon reboot the possible plaintext remnants in ram are gone ?
    The physical ram fades away. I have read posts from people asserting that Windows sometimes writes pagefile like data even if you disable the pagefile. Again with Windows you can never be sure.

    2. encrypted system and decoy os ,the reason for the decoy: imagine this situation : threat : the netbook is possibly being taken forcefully ,no time to close firefox and dismount properly, data in ram will be gone, and adversary sits in the decoy.
    I think you can have a hotkey to dismount all truecrypt containers. Probably just plain system encryption would be best. If you can crash the system with a hotkey then the thief will be left with a system that can't be read or booted without a password. Hidden OS is a real PITA to set up so unless you expect your adversary will force you to give the password it's overkill.
     
  7. x942

    x942 Guest

    To achieve the hotkey Crash you can either use DiskCryptor (free/GPL) or modify this registry:
    (From:http://pcsupport.about.com/od/tipstricks/ht/makebsodxp.htm)

    And finally a little C# script that can do the same:
    Code:
    using System;
    using System.Runtime.InteropServices;
    using System.Diagnostics;
    
    namespace ConsoleApplication3
    {
    class Program
    {
    [DllImport("ntdll")]
    static extern int NtSetInformationProcess(IntPtr p, int c, ref int i, int l);
    
    static void SetEssential()
    {
    int e = 1;
    NtSetInformationProcess(Process.GetCurrentProcess().Handle, 29, ref e, 4);
    }
    
    static void SetUnessential()
    {
    int e = 0;
    NtSetInformationProcess(Process.GetCurrentProcess().Handle, 29, ref e, 4);
    }
    
    static void Main(string[] args)
    {
    SetEssential();
    Console.ReadLine();
    SetUnessential();
    }
    }
    }
    To prevent data leaks FDE is pretty much the only way. I would say use FDE and Encrypt the entire Flash Drive as well. Then use CCleaner and FileShreder/Eraser to clean up windows once in a while.
     
  8. vane

    vane Registered Member

    Joined:
    Mar 28, 2011
    Posts:
    15
    @chiraldude
    Yes i think so to ,System encrypt a clean win 7 install, i still have a XP on the first partition,i'd like to keep this as an unencrypted boot option, but i'm not sure if this will work ,TC encrypts win 7 "in place" but then the win bootloader gets replaced with the TC loader ; i looked in the forum and the docs but couldn't find an answer on how to enable dualbooting in this scenario.
    I
    Yes it seems to be a rather complicated process.
     
  9. vane

    vane Registered Member

    Joined:
    Mar 28, 2011
    Posts:
    15
    Thanks for the code , i have some solutions to try out now.
    I think i do away with the flash drive , if i go for system encryption i can do my things in the os ; i don't want to go for FDE as yet , i'll try system encryption first i think .
     
  10. dantz

    dantz Registered Member

    Joined:
    Jan 19, 2007
    Posts:
    1,034
    Location:
    Hawaii
    RE emergency shutdown: It's not realistic to think that you'll be able to enter a system-crashing hotkey combination right before a thief tries to steal your computer. You'd have to be a mind reader! More likely the thief would wait until you looked away or stepped away, then they'd quietly grab your computer and run.

    Assuming that most "grab and run" thieves would quickly close the laptop's lid in order to conceal their prize and aid their getaway, here's what you can do to help protect your sensitive data:

    1) Store all sensitive data in a TrueCrypt volume such as a file container
    2) Make sure the TC background task is enabled
    3) Set up your laptop to enter power-saving mode whenever the lid is closed
    4) Set TrueCrypt's preferences to forcefully auto-dismount all open volumes when entering power-saving mode.
    5) In case the lid doesn't get closed during the theft, you can also specify that a forcible auto-dismount will occur after a short period of inactivity. Most thieves won't be using the stolen computer for awhile, as they have to get away from the area first.
     
  11. vane

    vane Registered Member

    Joined:
    Mar 28, 2011
    Posts:
    15
    A very good suggestion, following this line of thought ,the simple solution would be to use system encryption, and choose in win power options "what to do when the lid is closed" Shutdown.
    No volumes /containers have to be dismounted , the system is encrypted again after shutdown so i don't have to worry about plain text remnants etc.,
    To prevent nagging about waiting applications ,i could use this:
    "The following command would shut down instantly.
    %windir%\System32\shutdown.exe -s -f -t 00 "
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.