dynamik wrote: » I stand corrected. That doesn't seem like much of a "rescue" though, especially if this is being used by less tech-savvy end users. I have my password backed up in a secure location, but that's not going to help my company retrieve anything off my machine if I get hit by a bus.
kalebksp wrote: » I guess it depends on your situation, obviously the rescue disk is intend for use if your MBR is overwritten or corrupted. As you stated if your company needs access to your data they're SOL. Which is why I don't recommend TrueCrypt for a business environment. It also illustrates why companies should have a policy stating that only approved forms of encryption configured to they're specifications are allowed.
Paul Boz wrote: » Your point is moot if the organization has a policy which dictates that the company owns any full-disk encryption backup media and passwords as a supplement to the IT acceptable use policy. The user may maintain their own unique passwords for login systems (windows domain, file server, whatever) but the full-disk encryption password is company property. Language could be included that states that full-disk encryption passwords will be randomly tested as an integrity check on the password on file. At that point the password is re-set by the user and re-recorded for the records. Violation (changing passwords, removing encryption) can be made a fireable offense with legal ramifications for non-compliance. In this scenario if someone is found to have modified the password on their full-disk encryption they can be reprimanded for it and have it re-set or if its criminal / repeat violation they can be terminated and sued.
Paul Boz wrote: » TrueCrypt is excellent software that is used by quite a few security professionals (including the company that I work for.) You can not blow past its full-disk boot sector authentication and it renders tools like Kon-boot worthless.
Paul Boz wrote: » My gripe with people posing the question about bricking a drive is this: How much does a hard drive cost? How much does a data breech cost? If the data stored on the disk is worth less than or equal to the cost of the disk don't bother with truecrypt (or any full-disk encryption). If the data on the disk holds some type of significant value to your organization (blueprints, client data, etc) than the cost of the disk is negligible. The whole concept of rescue disks doesn't even matter when you look at it in these terms.
Paul Boz wrote: » All valid and good points. I'm just trying to provide a rebuttal to the many statements that Truecrypt isn't valid or advisable in corporate environments. You don't have to be a security engineer to put in an additional password. I wouldn't advise the validity of the software in a corporate environment if I didn't see it work in hundreds of corporate environments I've seen (including the one I work at).
Paul Boz wrote: » If the data stored on the disk is worth less than or equal to the cost of the disk don't bother with truecrypt (or any full-disk encryption).
Lantzvillian wrote: » If you need data secure, keep it off your computer or lock it up in good safe.
Lantzvillian wrote: » If you have the money, most encryption methods can be broken with a serious render-farm or substantial computing device.
JDMurray wrote: » This is bad advice. To prove in court that you are doing everything you can to prevent data breeches due to carelessness and negligence, you'll encrypted your hard drives even if they are blank. Not having data protection policies and procedures in place--regardless of your data--could leave you defenseless in front of prosecuting attorneys should you find yourself in court.
dynamik wrote: » I believe that was the point he was making; it seems like loss of reputation, legal fees, settlement costs, etc. would be more than the cost of the drive.
veritas_libertas wrote: » Is cost an issue for you? If not then get something like GuardianEdge or Check Point Full Disk Encryption. Remember the less you pay the worse the support. I am not sure about Bitlocker. The reason I suggest these is that you are going to need some sort of Central management. The last thing you want is an angry VP who can't get access to his laptop because he change the password yesterday and cannot remember his password. Trust me on that one, I have been there. Not the VP, but almost as bad, an HR person.
tiersten wrote: » Excluding any super secret weaknesses in the algorithms and funding on the level of the NSA, I don't see how you can say this. It isn't feasible to get enough computing resources to bruteforce the current encryption algorithms which are deemed to still be secure.
dratnol wrote: » One of my instructors works in the digital forensics field in Florida. He was on a team that busted a guy for child ****. His day job was changing tires and he lived in a 20' x 20' shed that did not have running water. He had two computers that had multiple gig Bestcrypt containers on it. It is assumed that they contained more **** since he forgot to encrypt a few of his folders. Anyways two different governmental agencies (one was the Secret Service, I don't remember the other one) have been trying to crack the encryption on these files with some serious hardware for just over a year and a half. They have not had any luck in doing so. Based on that and other people I have spoken to in the security/encryption field, I am inclined to think that it is pretty secure.
dratnol wrote: » Anyways two different governmental agencies (one was the Secret Service, I don't remember the other one) have been trying to crack the encryption on these files with some serious hardware for just over a year and a half. They have not had any luck in doing so. Based on that and other people I have spoken to in the security/encryption field, I am inclined to think that it is pretty secure.
GAngel wrote: » If there was true blue state secrets etc on there it would have been cracked in days/weeks.
GAngel wrote: » If it's commercially available you can bet there are a host of countries that can get around it. There is more than enough computing power now available to do it before you factor in quantum machines coming online.
GAngel wrote: » I wouldn't be surprised in the least that if it's developed in the USA it has some type of trapdoor built in that in times of "national security" it couldn't be cracked.