TrueCrypt

Discussion in 'Survival Communications' started by Clear Bobby, Jan 26, 2014.


  1. Clear Bobby

    Clear Bobby Monkey

    Long time listener, first time caller! My first post! I noticed that your discussions on Communications security/encryption didn't seem to mention anything about TrueCrypt. I then looked for a discussion about rejecting TrueCrypt- couldn't find one. I'm just curious, what is it that you don't like about TrueCrypt?
     
  2. kellory

    kellory An unemployed Jester, is nobody's fool. Banned

    Welcome, clear bobby, we'll come to the monkey tree. Grab a branch and hold on tight. (It can get a bit windy sometimes);)

    What is your interest in TrueCrypt? Connected in some way to the product?
     
  3. ghrit

    ghrit Ambulatory anachronism Administrator Founding Member

    Search again, bobby. True Crypt comes up readily using the search function (top of the page on the right side), it's been around since at least 08. I'd give you the links, but seems to me you'll have more fun learning if you do it for yourself. But you are right, it's not in comms.
     
  4. Clear Bobby

    Clear Bobby Monkey

    I get it, you're concerned I'm a vendor. For the record, I have no connection with TrueCrypt beyond being a user. If you re-read my original request, you will see that I searched within the comms area only. Did it again too, just so I can let you know there is no mention of TrueCrypt in comms (beyond this post).

    One time pads are fun. Fun to make, fun to use. If you guys don't wish to discuss the comms application of TrueCrypt that's fine with me. Live & let live!
     
  5. ghrit

    ghrit Ambulatory anachronism Administrator Founding Member

    Yep, as I said and we agree, it isn't in comms. Widen your search on the site, you'll find it.

    Good to know you aren't going to start off selling, that's death for new members. Welcome aboard. So far as secure comms go, BTPost is our guru in that department. He'll no doubt see this thread --
     
  6. DarkLight

    DarkLight I self identify as a Blackhawk Attack Helicopter! Site Supporter

    I think (but I'm only speaking for myself here) that the reason it isn't included in the comms section is due to the nature of the software. There's nothing wrong with TrueCrypt but to my knowledge, there's no way to use it specifically in comms. It is useful for encrypting files, folders and drives, and while those files, folders and drives can be transmitted via any medium (comms), TrueCrypt itself isn't a "comms" tool.

    GPG can be used to encrypt, decrypt and verify the signature of files and can be directly embedded into a comms package or tool. The tools (one time pads, stego, etc) discussed in this section are also specifically designed as "comms" tools.

    I am absolutely open to a discussion of how TrueCrypt, outside of encrypting a file for transmission, can/should/would be used and integrated into comms. If there's a capability or even an add-on for TrueCrypt that allos for this, I'm all ears!
     
  7. ghrit

    ghrit Ambulatory anachronism Administrator Founding Member

    The discussions of TrueCrypt date, IIRC, to before comms (especially radio) became a hot topic with SM, and certainly before the "one pad" secure comms scheme was developed. Too lazy this morning to go back and confirm that, but joining the topics didn't occur to anyone that I remember. It would not be inappropriate to pick and choose portions of the earlier discussions for inclusion in comms.
     
  8. melbo

    melbo Hunter Gatherer Administrator Founding Member

  9. DarkLight

    DarkLight I self identify as a Blackhawk Attack Helicopter! Site Supporter

    I think the point of the OP is that TrueCrypt has been discussed solely as it pertains to Comms.
     
  10. melbo

    melbo Hunter Gatherer Administrator Founding Member

  11. Clear Bobby

    Clear Bobby Monkey

    TrueCrypt has one weakness that I am aware of: weak password(s). There is a brute force program (brutusGUI) that will destroy TrueCrypt files with weak passwords. Stronger TrueCrypt passwords will destroy brutusGUI!

    One thing I like about TrueCrypt is how it's container file(s) [when unmounted] become crazy random file(s). Another thing I like about TrueCrypt is it's ability to produce hidden files.

    One way I use Truecrypt is in encrypting my email attachment(s). Very secure, especially if you use a computer that has never been connected to the internet to encrypt your file(s)/attachment(s).

    TrueCrypt files are perfect for hand-to-hand delivery (using a thumb drive, etc). The file(s) can be transported separately from the password(s).

    I would be happy to participate in a technical demonstration, encrypting any file that you provide. So, we will both know the encrypted file content(s) and I will know the password. If you decrypt the file, then you can tell me the password! When you are tired of trying to decrypt the file, I will give you the password- and you can see that you are in possession of the original file that you gave to me.

    There is, however, one very great weakness in TrueCrypt: do not lose your password! There is no password recovery program or backdoor master password for TrueCrypt.
     
    Witch Doctor 01 and BTPost like this.
  12. melbo

    melbo Hunter Gatherer Administrator Founding Member

    Untraceable
    Great example of having 2 tc containers with 2 separate passwords - one 'real' and the other 'fake'.
     
  13. Dont

    Dont Just another old gray Jarhead Monkey Site Supporter

    Yes, do not loss that pass word!! I did, sort of.. Am waiting to be confined some time with absolutely nothing else to do and work through all the letter and symbol combinations in the phrase to get it open again.. Won't trust electronic storage of pass words ..
     
  14. DarkLight

    DarkLight I self identify as a Blackhawk Attack Helicopter! Site Supporter

    So, one way to secure things would be as follows. I would suggest no smaller than an 8 GB drive. The purpose of this is ONLY to have a bootable/accessible means to get to the KeePass database.
    • Install Tails on a USB thumb drive (will use 2.6 GB of space)
    • Configure the "Persistent Volume" on the remaining space (5.5 in the above example of 8 GB drive and will encrypt it using LUKS)
      • Configure the Persistent Volume to hold your personal information from within Tails, including:
      • Personal Data (files that you manually put in the 'Persistent' directory
      • GPG Keys
      • SSH Client information
      • Pidgin IM config (if you use it)
      • Claws Mail config and mail
      • the Gnome keyring
      • Browser bookmarks
    • Personally I wouldn't attach to remote drives/network resources/printers, etc. from a tails installation
    • Keep your KeePass database file in the Persistent Volume
    Additionally you can install Oracle's VirtualBox and create an empty VM (one with no hard drive) and boot your Tails drive as a VM. The key to making this bit work is to download the Plop Boot Manager ISO that will let you boot either your VM or ANY machine that doesn't support booting from USB in the BIOS. "Insert" the ISO into the VM CD drive and once you get to the selection screen, attach your inserted USB drive to the VM. Et Voila, persistent Tails in a VM with a LUKS encrypted partition.

    Now, yes you could simply create a Linux VM to hold your information (or better yet, run Linux natively), however, with the thumb drive you can take this bad boy with you wherever you go.

    I'm looking at whether or not it's possible to put the Tails image on a TC encrypted USB drive. Not sure if that's going to work or not.
     
  15. Dont

    Dont Just another old gray Jarhead Monkey Site Supporter

    DarkLight, Have downloaded tails and plan to load it on a flash drive.. Seems each time I get a new flash drive I load it up with other files.. But will follow your directions and set one up..
     
  16. DarkLight

    DarkLight I self identify as a Blackhawk Attack Helicopter! Site Supporter

    Let me know if you need a hand, happy to help out.
     
    kellory likes this.
  17. Dont

    Dont Just another old gray Jarhead Monkey Site Supporter

    Thanks for the offer..
     
survivalmonkey SSL seal        survivalmonkey.com warrant canary
17282WuJHksJ9798f34razfKbPATqTq9E7