Is there some OEM OS that isn't vulnerable to boot exploits? I don't think I've ever heard of a software solution to an adversary having direct...
You'll need to access through a bridge... https://www.torproject.org/docs/bridges...
And Securstar doesn't exactly sound like the most trustworthy......
That's a distinction without a difference. The point is "more likely than not" is not the same thing as "proof." On the contrary, by definition it...
Then that would beg the question as to why the judge simply said "it is more likely than not that the computer belonged to and was used by Ms....
For further support of my point, the EFF concurs, and actually contradicts @justpeace 's claim that "Under the foregone conclusion test, location...
While that's true according to the rules of logic, I would hope that at least people here would be aware that courts do not always operate under...
I guess I'm a little late to the party too, but this actually sounds similar to another thread I just added to a few days ago where there was talk...
If that's really the case then it may be a logical failure. If not, it would be something in the mechanics. When you say "take the disc out of...
You might also try not using robocopy. Either try one of these, or just use the native Windows copy procedure......
It's actually worse than that. If someone is busting down your door, it's very possible you'll end up in an extortion situation...in which case...
Yeah that's pretty odd. My thought would be possible sector corruption. If the drive was ever unplugged without dismounting from TC and/or without...
@Paranoid Eye The TrueCrypt manual is really good. It's really detailed but also is written in about as plain English as you can get for something...
Reminds me of the "Dangers of Bread" list: http://www.funnyjunk.com/funny_pictures/1198672/ I'm pretty curious...What is your setup for that?...
@S.B. getting all this? Also just came across this to reiterate: http://www.wired.com/2013/04/encrypt-your-data/
See my post above and the link to the discussion from the other thread. Again, people don't think this is possible, but these court cases have...
Well crap. There's another example. We were talking about this before:...
I actually posted this earlier in this thread, but there's quite a few repositories......
What do you mean by that?
If you want a sort of uncited grapevine-type account of the story, you can check it here: http://www.statemaster.com/encyclopedia/TrueCrypt And...
What's the story with hardware encryption? Are you ever worried about it messing up? It would seem that that's one area where you have virtually...
I guess that was my fault. Paranoid Eye offered SecurStar's Drivecrypt as his alternative. In this post I was explaining why I'm not a fan of...
I'm definitely interested in this. Is Twofish really considered more secure that AES? I always hear that Serpent is considered the more robust of...
@Morthawt The post is obviously amateur, but sounds legit to me. Aside from the overall point being SecurStar engaged in fraudulent marketing...
It seems like this has gotten a lot deeper than necessary. The title of the thread is "Encrypting an external hard drive with TrueCrypt". Who in...
Separate names with a comma.