TrueCrypt Question

Discussion in 'privacy technology' started by curious george, Mar 27, 2009.

Thread Status:
Not open for further replies.
  1. curious george

    curious george Registered Member

    Joined:
    Jun 24, 2007
    Posts:
    218
    Now I kinda sorta know what TrueCrypt does, but my question is, what if a hacker where to get into your system...would they still be able to access your files?
     
  2. Chuck57

    Chuck57 Registered Member

    Joined:
    Sep 2, 2002
    Posts:
    1,422
    Location:
    New Mexico, USA
    I'm about as far from an expert as you can get. I see your scenario this way.

    If I have files or folders encrypted and don't remember my password, I can't access those folders.

    I'd say if a hacker got in, or some kind of malware, they or it couldn't get to those files or folders.
     
  3. curious george

    curious george Registered Member

    Joined:
    Jun 24, 2007
    Posts:
    218
    So theoretically speaking, they could not get access any file, since it is all pretty much encrypted.
     
  4. Chuck57

    Chuck57 Registered Member

    Joined:
    Sep 2, 2002
    Posts:
    1,422
    Location:
    New Mexico, USA
    Files that are encrypted, in my opinion, couldn't be accessed without the password.
     
  5. Warlockz

    Warlockz Registered Member

    Joined:
    Oct 30, 2008
    Posts:
    642
    If a hacker had control of your system remotely, wile you are on it, he can basically obtain anything he wants like your passwords/keyfiles, because he will/would have been watching all of your activities, he can also take an index snapshot of the contents of your encrypted drive/s wile the encrypted drive/s is/are open, because if he had access, he can access your machine just like you can access it!

    This is why you should be comfortable with the HIPS/Firewall/AV you are using, and trust them to be doing the job they are intended for, Protecting you from Hackers, if your second guessing your security apps I suggest you look into something/security apps you feel you can trust to protect you!
     
    Last edited: Mar 28, 2009
  6. curious george

    curious george Registered Member

    Joined:
    Jun 24, 2007
    Posts:
    218
    IT doesn't matter now, after encrypting the entire drive, i wasn't able to access it...good thing i took an image.
     
  7. Warlockz

    Warlockz Registered Member

    Joined:
    Oct 30, 2008
    Posts:
    642
    Sounds like you didn't remember your password ECT, don't let this discourage you from using whole disk encryption, just make sure to read everything you can about it like how to use it and read about the vulnerabilities ect, Now if you were asking, what if a hacker got a hold of your machine, like broke into your house and took it, or you lost your laptop, the hacker cant access it without the password/keys, unless you used a weak password that can be attacked using bruitforce/dictionary attack methods!
     
  8. LockBox

    LockBox Registered Member

    Joined:
    Nov 20, 2004
    Posts:
    2,275
    Location:
    Here, There and Everywhere
    You said at 7:00 tonight that you only then "sorta knew" what Truecrypt does and you tried to encrypt an entire drive? Study the user's guide before using TC. It's easy, but not out-of-the-box easy.
     
  9. Enigm

    Enigm Registered Member

    Joined:
    Dec 11, 2008
    Posts:
    188
    Truecrypt doesn't do file/folder-encryption,
    it encrypts entire volumes/devices .
    So, if you are being owned by a CRACKER he can see/access
    (at least) anything you can . Once you mount the encrypted volume it's game over .
     
  10. Searching_ _ _

    Searching_ _ _ Registered Member

    Joined:
    Jan 2, 2008
    Posts:
    1,988
    Location:
    iAnywhere
    Attacking Truecrypt
     
  11. Chuck57

    Chuck57 Registered Member

    Joined:
    Sep 2, 2002
    Posts:
    1,422
    Location:
    New Mexico, USA
    Right about the hacker. I thought of that but was apparently in the midst of a 'Senior Moment' and forgot to mention keylogger, hacker, etc.

    Seems I read someplace that PGP protects against external threats, such as the black van parked down the street monitoring your keystrokes, but it was quite a while ago. I don't know if anything can keep an embedded keylogger, hacker or whatever from reading your keyboard strokes, except good security software and prayers.
     
  12. Sam Hell

    Sam Hell Registered Member

    Joined:
    Aug 13, 2007
    Posts:
    44
    Location:
    my desk
    Would you have to be on line?

    What if you cut/paste or load pass from another drive?
     
  13. Nebulus

    Nebulus Registered Member

    Joined:
    Jan 20, 2007
    Posts:
    1,582
    Location:
    European Union
    Let's split the problem into parts:
    1) While your TC volume is mounted, a hacker has access to your computer (remote or local). In this case he can read from your TC volume as if it was another normal hard disk.
    2) When your TC volume is not mounted, a hacker can't read data from your TC volume. The thing that he might do in this case is to install a keylogger, find out your password and then mount TC volume himself.

    So basically, try to mount TC volumes only when you need them and use software like firewall and/or HIPS to keep hackers out of your computer.
     
Loading...
Thread Status:
Not open for further replies.