I understand why "self destruct" is a popular idea but it is really a false kind of security. If your data is encrypted by Truecrypt or PGP and...
If your entire disk is encrypted then there is no "pre-loaded" software that could allow access to the data. Everything on the disk is encrypted...
I think the OP has it reversed. You should never store UNENCRYPTED data on a flash drive. If you store unencrypted data on a flash drive and...
UGH...
Are you kidding me? Some pseudo authentic email snippit about a "spook" that broke Truecrypt? If AES were breakable by "spooks" it would be all...
One theory used to assert that long passwords will remain safe from brute force is the "Von Neumann-Landauer Limit". See:...
Does anyone know why websites have password character restrictions? I don't mean minimum restrictions but maximum restrictions such as maximum...
http://www.cbsnews.com/8301-501465_162-20027837-501465.html and...
Not sure what you mean by accessing encrypted data through the BIOS. The only way someone could do this is to flash the BIOS with some malicious...
I often need to use hibernation because I work with complex design software that takes forever to load. If I am working on batteries and running...
Kind of an old thread but... If you are using Truecrypt (V7.0 or higher) and full disk encryption then hiberfil.sys is encrypted. As far as I...
Yes, lots of confusion about what QC could and could not do. Thanks for clarifying cronomatic. There is a difference between using a computer to...
I don't think that adding a few extra bytes to the headers would matter. If AES were truly broken that would mean the master key could be found...
A really interesting idea of no practical use. The write-read speed of such a system is extremely slow. There is no way these Chinese students...
What I don't understand is why device manufacturers are not frantically redesigning all flashable components? Most of this could be avoided by...
Just to clarify, truecrypt does leave timestamp data of keyfiles untouched. The issue is that Windows may track events associated with file...
The point of the disclaimer in the truecrypt document is that Windows can't be trusted. Undocumented "features" make it impossible for truecrypt...
You need to talk to a lawyer. I wouldn't bother with a legal forum, just call some attorneys and ask how much for one hour of consult. It may be...
If I remember correctly truecrypt always preserves timestamps of keyfiels since version 4.3a but doing a search of the version 7a PDF document...
There have been some theoretical discussions about how data may persist in a memory chip. The theory is that if a block of data is held in the...
It's about time! Acrobat reader has been a playground for criminals for way too long. Now they can play in the sandbox without hurting other kids!!!
Someone correct me if I am wrong but if you use an anonymous email like anonymouse.org throug TOR enabled browser your real IP address is hidden.
A hidden volume hides in the unused space at the end of the standard volume. The hidden volume must have contiguous space at the end of the...
Quote: You mean master key gets copied over to both RAMs (if I have 2)? No, I mean that the master key is 256 bits which is a tiny piece of data....
Q:Will super long passwords play big role due to lost characters by decaying data in RAM? A: No, all OTFE programs use a master key that is...
Separate names with a comma.