TrueCrypt and Internet

Discussion in 'privacy technology' started by TaranScorp, Dec 29, 2013.

Thread Status:
Not open for further replies.
  1. TaranScorp

    TaranScorp Registered Member

    Joined:
    Jul 6, 2012
    Posts:
    57
    Location:
    USA
    I TrueCyrpted my entire hard drive and operating system. When I log onto the computer TrueCyrpt unencyrpts the drive and I can see everything on my hard drive. When I go on the Internet via my web browser does that mean anyone that wanted to can also see everything on my compuer ?

    Thanks
     
  2. firefox2008

    firefox2008 Registered Member

    Joined:
    May 17, 2007
    Posts:
    125
    Nobody could see anything on your computer unless they hacked into it. Turn Windows firewall on or install one. If you are paranoid put your private data on flash drives and encrypt them and only access them when you are not connected to the net.
     
    Last edited: Dec 29, 2013
  3. Palancar

    Palancar Registered Member

    Joined:
    Oct 26, 2011
    Posts:
    2,402
    TC affords no protection on "mounted" volumes. If your system disk (C drive) is mounted then it would appear the same as a normal operating system while you are on the internet. That said; what makes you think while you are online that anyone can "see" your hard drive? The concerns you seem to be expressing are really outside of TrueCrypt's arena. We concentrate heavily on privacy and security here. Keep reading the threads in these forums and you'll pick up some solid methods for securing your online experience.
     
  4. TaranScorp

    TaranScorp Registered Member

    Joined:
    Jul 6, 2012
    Posts:
    57
    Location:
    USA
    My entire system drive is encrypted. No mount or umounted drive
     
  5. Palancar

    Palancar Registered Member

    Joined:
    Oct 26, 2011
    Posts:
    2,402
    When you enter your PBA and boot your system disk it is mounted!! For confirmation go to your TC control panel and view your system disk. Most likely its the C drive but you may have it somewhere else. It cannot be booted without being mounted. Or put it another way. Instead of the internet threat you are worried about, how about a stranger walking up to your computer when you have it booted. If he/she can view anything at all it is mounted. TC encryption only protects data when it is dismounted. That is its sole purpose and its the best of the best at what it does.
     
  6. TaranScorp

    TaranScorp Registered Member

    Joined:
    Jul 6, 2012
    Posts:
    57
    Location:
    USA
    OK I get it
    Thanks very much

    Now I'm thinking about Tor and a VPN service like Private Internet Access

    You can learn much from this forum :)
     
  7. firefox2008

    firefox2008 Registered Member

    Joined:
    May 17, 2007
    Posts:
    125
    Mullvad for VPN.
     
  8. Page42

    Page42 Registered Member

    Joined:
    Jun 18, 2007
    Posts:
    6,941
    Location:
    USA
    Are there products or services that do encrypt mounted drives?
     
  9. Palancar

    Palancar Registered Member

    Joined:
    Oct 26, 2011
    Posts:
    2,402
    Why would you want this? The user mounts the encrypted volume/file/data for the sole purpose to view and use it. When you dismount the same the contents again become a pile of gibberish, which is by design. If you have items on your system disk that need to remain "private" while the system is running move them to another still encrypted area. They could be a volume on the system disk or another partition. Then when you need the data go ahead and mount to access.
     
  10. chiraldude

    chiraldude Registered Member

    Joined:
    Jul 3, 2010
    Posts:
    157
    I believe what you are asking is for is a way to make your data accessible to you but appear encrypted to anyone that may be "hacking" in while you are connected to the internet. This is a contradiction. The data is either mounted and decrypted or unmounted and inaccessible.
     
  11. Page42

    Page42 Registered Member

    Joined:
    Jun 18, 2007
    Posts:
    6,941
    Location:
    USA
    Yes, it is a contradiction... but it made so much sense to me before I thought it through. :cautious: TY
     
  12. MrBrian

    MrBrian Registered Member

    Joined:
    Feb 24, 2008
    Posts:
    6,032
    Location:
    USA
    If you have malware, and your TrueCrypt volume is only sometimes mounted, you could:
    1) disconnect from the internet
    2) mount the TrueCrypt volume
    3) do whatever you want to with files on mounted TrueCrypt volume
    4) dismount the TrueCrypt volume
    5) connect to internet

    However, the malware could possibly store the pilfered info from the TrueCrypt volume and send it when the internet is connected again.

    Better yet, if you're using a program such as Returnil on your OS+programs partition(s), and if your encrypted container file is on a separate volume than your OS+programs partition(s), then you could:
    1) disconnect from internet
    2) enable Returnil on OS+programs partition(s)
    3) mount TrueCrypt volume
    4) do whatever you want to with files on mounted TrueCrypt volume
    5) dismount the TrueCrypt volume
    6) return OS+programs partition(s) to previous state using Returnil
    7) reboot to clear memory (if step 6 didn't do this already)
    8 ) connect to internet

    Here I think you'd be vulnerable only if the malware stored your pilfered info somewhere that Returnil didn't revert to prior state.
     
    Last edited: Dec 30, 2013
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.