Long time listener, first time caller! My first post! I noticed that your discussions on Communications security/encryption didn't seem to mention anything about TrueCrypt. I then looked for a discussion about rejecting TrueCrypt- couldn't find one. I'm just curious, what is it that you don't like about TrueCrypt?
Welcome, clear bobby, we'll come to the monkey tree. Grab a branch and hold on tight. (It can get a bit windy sometimes) What is your interest in TrueCrypt? Connected in some way to the product?
Search again, bobby. True Crypt comes up readily using the search function (top of the page on the right side), it's been around since at least 08. I'd give you the links, but seems to me you'll have more fun learning if you do it for yourself. But you are right, it's not in comms.
I get it, you're concerned I'm a vendor. For the record, I have no connection with TrueCrypt beyond being a user. If you re-read my original request, you will see that I searched within the comms area only. Did it again too, just so I can let you know there is no mention of TrueCrypt in comms (beyond this post). One time pads are fun. Fun to make, fun to use. If you guys don't wish to discuss the comms application of TrueCrypt that's fine with me. Live & let live!
Yep, as I said and we agree, it isn't in comms. Widen your search on the site, you'll find it. Good to know you aren't going to start off selling, that's death for new members. Welcome aboard. So far as secure comms go, BTPost is our guru in that department. He'll no doubt see this thread --
I think (but I'm only speaking for myself here) that the reason it isn't included in the comms section is due to the nature of the software. There's nothing wrong with TrueCrypt but to my knowledge, there's no way to use it specifically in comms. It is useful for encrypting files, folders and drives, and while those files, folders and drives can be transmitted via any medium (comms), TrueCrypt itself isn't a "comms" tool. GPG can be used to encrypt, decrypt and verify the signature of files and can be directly embedded into a comms package or tool. The tools (one time pads, stego, etc) discussed in this section are also specifically designed as "comms" tools. I am absolutely open to a discussion of how TrueCrypt, outside of encrypting a file for transmission, can/should/would be used and integrated into comms. If there's a capability or even an add-on for TrueCrypt that allos for this, I'm all ears!
The discussions of TrueCrypt date, IIRC, to before comms (especially radio) became a hot topic with SM, and certainly before the "one pad" secure comms scheme was developed. Too lazy this morning to go back and confirm that, but joining the topics didn't occur to anyone that I remember. It would not be inappropriate to pick and choose portions of the earlier discussions for inclusion in comms.
I use TC regularly - am pretty sure it's been discussed before although it's been awhile. for the record, TC is free and open source - with some FOSS concern over the license. TrueCrypt - Free Open-Source On-The-Fly Disk Encryption Software for Windows 7/Vista/XP, Mac OS X and Linux
Here are a couple existing SM discussions found via Google: (our search isn't always so good) TrueCrypt "on the fly" HD and file encryption.. | Survival Monkey Forums true crypt??? | Survival Monkey Forums Secure Portable Data Storage... | Survival Monkey Forums Encryption options for non-hackers | Survival Monkey Forums Kiss the 4th and 5th amendments good bye! | Survival Monkey Forums
TrueCrypt has one weakness that I am aware of: weak password(s). There is a brute force program (brutusGUI) that will destroy TrueCrypt files with weak passwords. Stronger TrueCrypt passwords will destroy brutusGUI! One thing I like about TrueCrypt is how it's container file(s) [when unmounted] become crazy random file(s). Another thing I like about TrueCrypt is it's ability to produce hidden files. One way I use Truecrypt is in encrypting my email attachment(s). Very secure, especially if you use a computer that has never been connected to the internet to encrypt your file(s)/attachment(s). TrueCrypt files are perfect for hand-to-hand delivery (using a thumb drive, etc). The file(s) can be transported separately from the password(s). I would be happy to participate in a technical demonstration, encrypting any file that you provide. So, we will both know the encrypted file content(s) and I will know the password. If you decrypt the file, then you can tell me the password! When you are tired of trying to decrypt the file, I will give you the password- and you can see that you are in possession of the original file that you gave to me. There is, however, one very great weakness in TrueCrypt: do not lose your password! There is no password recovery program or backdoor master password for TrueCrypt.
Untraceable Great example of having 2 tc containers with 2 separate passwords - one 'real' and the other 'fake'.
Yes, do not loss that pass word!! I did, sort of.. Am waiting to be confined some time with absolutely nothing else to do and work through all the letter and symbol combinations in the phrase to get it open again.. Won't trust electronic storage of pass words ..
So, one way to secure things would be as follows. I would suggest no smaller than an 8 GB drive. The purpose of this is ONLY to have a bootable/accessible means to get to the KeePass database. Install Tails on a USB thumb drive (will use 2.6 GB of space) Configure the "Persistent Volume" on the remaining space (5.5 in the above example of 8 GB drive and will encrypt it using LUKS) Configure the Persistent Volume to hold your personal information from within Tails, including: Personal Data (files that you manually put in the 'Persistent' directory GPG Keys SSH Client information Pidgin IM config (if you use it) Claws Mail config and mail the Gnome keyring Browser bookmarks Personally I wouldn't attach to remote drives/network resources/printers, etc. from a tails installation Keep your KeePass database file in the Persistent Volume Additionally you can install Oracle's VirtualBox and create an empty VM (one with no hard drive) and boot your Tails drive as a VM. The key to making this bit work is to download the Plop Boot Manager ISO that will let you boot either your VM or ANY machine that doesn't support booting from USB in the BIOS. "Insert" the ISO into the VM CD drive and once you get to the selection screen, attach your inserted USB drive to the VM. Et Voila, persistent Tails in a VM with a LUKS encrypted partition. Now, yes you could simply create a Linux VM to hold your information (or better yet, run Linux natively), however, with the thumb drive you can take this bad boy with you wherever you go. I'm looking at whether or not it's possible to put the Tails image on a TC encrypted USB drive. Not sure if that's going to work or not.
DarkLight, Have downloaded tails and plan to load it on a flash drive.. Seems each time I get a new flash drive I load it up with other files.. But will follow your directions and set one up..