Smallguy wrote: » recently something happened in my work place which I suspect will mean that our security belts will have to be tightened for executive employees who travel frequently. unfortunately no matter what we've tried certain people will always store documents they should not locally... and with no backing to enforce a policy stating no one should have local data the policy is pretty useless. I've used gpg4win but with my limited knowledge of it it seems you have to encrypt files as go and specify what is encrypted... it won't as and example encrypt and entire drive and anything added to that drive afterwards. I dug around and found Trucrypt is popular for entire HD encryption but how secure is it should someone get physical access to a laptop ? With a proper pass phrase of say 20+ characters mix of upper lower,, special characters, numbers etc and a solid algorithm.. are there features of Windows XP that make it possible for a pro to still realistically get the pass phrase... ie windows by default having that password cached somewhere or it is in the ram... or stored in the registry in plain text
JDMurray wrote: » A big problem with full-disk encryption is that a disk error (bad block) can render the disk undecipherable.In Soviet Russia, TrueCrypt Encrypts You! | TechExams.net Blogs
Smallguy wrote: » what about Bit locker built in to windows 7 and Vista.... I know it is possiable to use the cold boot attack on it. but other than that are their any known security risks? has it been confirmed that TPM can be hacked... I know I read 2 brothers claimed to have hacked it but I did not see it was ever confirmed ? what about recovering data of the drive should the drive ever get a bad sector like the Truecrypt bog above GuardianEdge seems to have all the features though
Smallguy wrote: » has it been confirmed that TPM can be hacked... I know I read 2 brothers claimed to have hacked it but I did not see it was ever confirmed ?
Hyper-Me wrote: » Remember with Bitlocker you can use GPO's to force the storage of bitlocker recovery data in Active Directory, if your domain controllers are Windows Server 2003 SP2 or better. I dont think TrueCrypt or any other non-enterprise offering is going to do this for you.
kalebksp wrote: » TrueCrypt doesn't have any interaction with Windows authentication, it implements it's own pre-boot authentication. The only conceivable way to break into TrueCrypt (other than brute force or guessing the password) would be the cold boot attack, which all encryption methods I'm aware of are susceptible to. I would not recommend TrueCrypt in a business environment, if a user forgets their password that data is gone for good. But if that's acceptable to you, go for it. My work uses GuardianEdge to encrypt hard drives, it works well enough but comes with a pretty good performance hit.
dynamik wrote: » +1 for Tiersten's rubber hose attack. That's a classic!
miller811 wrote: » Our company recently started using the product also... Partioned the windows drive, to OS and then user data... Company image easily replaced if password is lost, user data is users responsibility.
dales wrote: » Probably a bit random but we were sent a security alert about truecrypt the other day. basically theres a virus going round that can change the bootloader for truecrypt and keylog the response.
dynamik wrote: » Are you referring to TrueCrypt or something else? With TrueCrypt, you just burn an .iso that contains recovery information. I assume other products provide something similar.
Hyper-Me wrote: » I wonder how many people keep the ISO on the computer, or burnt to a disc thats kept with the computer.
Hyper-Me wrote: » So what if someone forgets the password entirely?
dynamik wrote: » He meant that you'd need the password to get to the .iso that's stored on the drive (in your hypothetical situation). If someone could already do that, the machine would already be compromised and having the .iso wouldn't provide any benefit. There's no security risk associated with storing the .iso on the drive that's encrypted. If you're dumb enough to carry it with you, then you probably have more significant issues to worry about than full-disk encryption.
Note that even if you lose your TrueCrypt Rescue Disk and an attacker finds it, he or she will not be able to decrypt the system partition or drive without the correct password.
dynamik wrote: » I have my password backed up in a secure location, but that's not going to help my company retrieve anything off my machine if I get hit by a bus.