Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Privacy Security IT

Schneier, UW Team Show Flaw In TrueCrypt Deniability 225

An anonymous reader writes "Bruce Schneier and colleagues from the University of Washington have figured out a way to break the deniability of TrueCrypt 5.1a's hidden files. What about the spanking-new TrueCrypt 6? Schneier says that 'The new version will definitely close some of the leakages, but it's unlikely that it closed all of them.' Meanwhile, PC World is reporting that the problems Schneier and colleagues found are bigger than just TrueCrypt. Among their discoveries: Word auto-saves the contents of encrypted files to the unencrypted portions of your disk, and this problem should apply to all non-full disk encryption software. Their research paper will appear at Usenix HotSec '08."
This discussion has been archived. No new comments can be posted.

Schneier, UW Team Show Flaw In TrueCrypt Deniability

Comments Filter:
  • by EvanED ( 569694 ) <evaned@noSPam.gmail.com> on Thursday July 17, 2008 @05:40PM (#24234311)

    Full disk encryption doesn't protect against the threat model that TrueCrypt's hidden files try to. The model there is that you are being forced to give up your key (or stand in contempt of court until you do), which means full disk encryption doesn't help you.

  • Found? (Score:1, Insightful)

    by Anonymous Coward on Thursday July 17, 2008 @05:43PM (#24234373)

    From TFA:

    But Schneier, chief security technology officer with British Telecom and researchers from the University of Washington *found* that Microsoft Vista, Word, and Google Desktop each can blow the cover of files using this so-called âoedeniable file systemâ (DFS) feature.

    Translation:

    Renowned security experts state obvious security flaws of ciphered units and unciphered temporary folders, having nothing to do with plausible deniability

  • by Anonymous Coward on Thursday July 17, 2008 @05:50PM (#24234469)

    I like Bruce, I think he's got a lot of good insight, but when he spins up a "white paper" that basically says that applications are doing what they're supposed to be doing, and TrueCrypt isn't changing their native behavior, it does everyone in the "Security" community a disservice.

    Bruce, if you're trying to make a point - make it. Don't sit there and *publish* nitpicky crap that basically is a bug (or lacking feature) of the software. You'd be far better to say that security applications do not provide adequate deniability, and then cite the sources.

    The fact that this sort of stuff passes for "High academia" makes me weep. Let's try to do more than just scratch the surface and point fingers, shall we?

  • by Praxx ( 918463 ) on Thursday July 17, 2008 @06:03PM (#24234601)
    Opening an encrypted partition with Windows Explorer is also a risk, because explorer will happily cache the directory structure of everything you browse to. Those paths and filenames show up in the explorer history, even if the drive is offline.
  • by serviscope_minor ( 664417 ) on Thursday July 17, 2008 @06:07PM (#24234671) Journal

    you run at least full disk encryption. If one needs further plausible deniability, THEN you can run truecrypt. Also, cleaning out temp files should be a regular occurrence, as should running on an encrypted swap file/partition.

    This is why secutiry needs to be left to the professionals and requires scrutiny. It is very hard to get right and very easy to leave holes. You run full disk encryption, but in many parts of the world, you can be compelled to disclose your keys. So, since your keys are disclosed, you now may as well assume that you never had the encryption in the first place. That puts you right back to square 1 and there is now evidence that you have a hidden volume.

    Full disk encryption protects you against the consequences of theft, and for this, deniability has no utility. Deniability protects you against certain governments, and for this, full disk encryption often provides little utility.

  • by Ant P. ( 974313 ) on Thursday July 17, 2008 @07:08PM (#24235221)

    If you want _plausible_ deniability, which is what this is about, then having no history file is only going to arouse suspicion. Open a shell with HISTFILE=/dev/null only when you're running the secret VM, and run the shell command using a GUI+script or some other method that doesn't keep tracks.

  • by 10101001 10101001 ( 732688 ) on Thursday July 17, 2008 @07:35PM (#24235441) Journal

    Have you checked your ~/.bash_history file?

    Use 'unset HISTFILE' every terminal that uses the secret volume.

    Are you sure your editor isn't leaving autosaves in /tmp?

    Mount /tmp as a ramdisk.

    There could even be plain text in your swap partition.

    Encrypt your swap with cryptmount*.

    It's hard to really know.

    Agreed. You failed to mention things like ~/.thumbnails/ or ~/.gimp/tmp/, to name a few. All-in-all, this is exactly why the only safe thing to do is be paranoid and encrypt the whole thing. Even then, though, I'm not sure how feasible it is to create a plausibly deniable full system. That's the sort of thing that'd seem to be nearly a full time job in itself.

    *I'd imagine that actually doing so just makes you look extremely guilty, as it shows a real depth to one's paranoia (just like your disable swap and link ~/.bash_history to /dev/null). And at that point, the most paranoid thing to do with Truecrypt would be to take advantage of the "Plausible Deniability" feature. So, it's sort of a Catch-22: the more you try to patch possible leaks, the more clear it is you're trying to patch possible leaks.

Mystics always hope that science will some day overtake them. -- Booth Tarkington

Working...