Schneier, UW Team Show Flaw In TrueCrypt Deniability 225
An anonymous reader writes "Bruce Schneier and colleagues from the University of Washington have figured out a way to break the deniability of TrueCrypt 5.1a's hidden files. What about the spanking-new TrueCrypt 6? Schneier says that 'The new version will definitely close some of the leakages, but it's unlikely that it closed all of them.' Meanwhile, PC World is reporting that the problems Schneier and colleagues found are bigger than just TrueCrypt. Among their discoveries: Word auto-saves the contents of encrypted files to the unencrypted portions of your disk, and this problem should apply to all non-full disk encryption software. Their research paper will appear at Usenix HotSec '08."
usenix what? (Score:5, Funny)
HotSex 08? Where do I sign up!
Re: (Score:2)
I think you may want to reconsider your enthusiasm for HotSex 08.
Or maybe not. Not that there's anything wrong with that.
Re: (Score:2)
You didn't get an invitation? Hmmmmm.
Comment removed (Score:5, Funny)
Sorry, dude... (Score:5, Funny)
Seems that someone found a semi-reliable decryption mechanism that can not only stand up to that, but can reverse an even stronger algorithm known as "volcano" [byu.edu].
Didn't mean to dash your dreams, but you know how the security game goes...
Re:Sorry, dude... (Score:5, Funny)
"Volcano" is, indeed, a stronger algorithm than "fire", but it's also much coarser-grained. Further research shows that the decrypted portions were not completely encrypted, merely provided with a partially-encrypted wrapper.
We can also discuss the even more advanced "Thermonuclear ground-zero" algorithm, but the ultimate form of this type of encryption (matter-antimatter annihilation) is only theoretically possible with our current technology.
Re: (Score:2, Funny)
Re:Sorry, dude... (Score:5, Funny)
Thermonuclear ground-zero encryption is unnecessary, you just need good a good Brownian crypto device.
On a serious note, there's also steganography. I wrote up a tool that works like shred(1), except instead of DoD-compliant type over-writes, it uses blocks of harmless text from Project Gutenberg. Theoretically it's weaker than a 35-pass algorithm, but the advantage is that it's now much harder to retrieve the original data, since it's much harder to tell apart.
I really want to do something that would get my computer seized by the NSA so I can laugh while imagining them trying to find the data they're looking for. "Aha! I've found some unencrypted text... it says, 'Of all the cants which are canted in this canting world, â" though the cant of hypocrites may be the worst, â" the cant of criticism is the most tormenting...' Never mind, it's just some crap again...."
Anyone know how to get in touch with Osama bin Laden?
Re: (Score:2, Funny)
Re:Lucky for me... (Score:5, Funny)
I encrypt using a one way algorithm know as "fire" that transforms all my secrets into ashes.
Is that the algorithm invented by the Greek hacker, Prometheus? I heard he got in a bit of trouble over it, he ended up somewhere like Guantanamo, but eventually was rescued.
Re: (Score:2, Funny)
You mean it's a one way hash function!
Ajax (Score:2)
http://www.ajaxtocco.com/default.asp?ID=162 [ajaxtocco.com]
I looked at a house once that had one of those old coal burning stoves; it had "ajax" written in huge letters on the hatch. I wonder if it is the same company.
And this is exactly why.. (Score:2, Informative)
Re: (Score:2, Insightful)
Full disk encryption doesn't protect against the threat model that TrueCrypt's hidden files try to. The model there is that you are being forced to give up your key (or stand in contempt of court until you do), which means full disk encryption doesn't help you.
Re: (Score:2)
It would be tricky, but should be possible to mount a hidden volume as root -- or, failing that, a loopback file in that hidden volume.
It wouldn't encrypt the entire disk, and it might be tricky to maintain a dummy root or two, but it could be done.
Re:And this is exactly why.. (Score:5, Insightful)
you run at least full disk encryption. If one needs further plausible deniability, THEN you can run truecrypt. Also, cleaning out temp files should be a regular occurrence, as should running on an encrypted swap file/partition.
This is why secutiry needs to be left to the professionals and requires scrutiny. It is very hard to get right and very easy to leave holes. You run full disk encryption, but in many parts of the world, you can be compelled to disclose your keys. So, since your keys are disclosed, you now may as well assume that you never had the encryption in the first place. That puts you right back to square 1 and there is now evidence that you have a hidden volume.
Full disk encryption protects you against the consequences of theft, and for this, deniability has no utility. Deniability protects you against certain governments, and for this, full disk encryption often provides little utility.
Re: (Score:3, Informative)
Re: (Score:3, Informative)
Ding, ding, ding!
In many totalitarian regimes the simple existence of crypto or secure delete software is evidence enough to lock you up.
Re: (Score:2)
By "cleaning out" you mean wipe, of course, not delete.
Let me get this straight (Score:4, Funny)
Re:Let me get this straight (Score:5, Interesting)
Anyway, now Im rambling, but I use truecrypt only on my secure linux box, which doesnt have these problems
Are you sure? Have you checked your ~/.bash_history file? Are you sure your editor isn't leaving autosaves in /tmp? There could even be plain text in your swap partition. It's hard to really know.
If I needed plausible deniability I'd put a virtualbox image in the deniable container. Then I'd turn off swap and link ~/.bash_history to /dev/null. And I'm sure I've forgotten something.
Re: (Score:2)
in virtualbox you create a "profile/shortcut" that will point to this image. those are saved and they should contain path to the image.
and remember to clear the RAM after you have shutdown virtualbox dont want them to come and freeze you RAM or use a firewire cable
Re: (Score:2)
Re:Let me get this straight (Score:4, Insightful)
If you want _plausible_ deniability, which is what this is about, then having no history file is only going to arouse suspicion. Open a shell with HISTFILE=/dev/null only when you're running the secret VM, and run the shell command using a GUI+script or some other method that doesn't keep tracks.
Re: (Score:2)
Those are all easy fixes. Symlink your .bash_history to /dev/zero or /dev/random, have your tmp partition encrypted and deleted upon reboot, turn off all autosave features, encrypt your swap partition, turn off indexing on your encrypted mountpoint.
Re: (Score:2, Insightful)
Use 'unset HISTFILE' every terminal that uses the secret volume.
Mount /tmp as a ramdisk.
Encrypt your swap with cryptmount*.
Agreed. You failed to mention things like ~/.thumbnails/ or ~/.gimp/tmp/, to name a few. All-in-all, this is exactly why the only safe thing to do is be paranoid and encrypt the whole thing. Even then, thoug
Re:Let me get this straight (Score:5, Interesting)
It seems to me that the best way to get this done would be for a bunch of guys (ideally with the paranoia of the OpenBSD guys) set about creating a Linux distro with all these things built in. It would obviously not be one built for performance, but it would be fully secured out of the box with encrypted swap, /tmp set as a ramdisk (optionally for users with enough ram or encrypted for those who don't), all installed apps (from vim to OpenOffice) configured to use secure areas for temp files etc etc.
Such a distro would mean having that level of paranoia would not arouse as much suspicion, as you could just say "Meh, I run Paranoia Linux coz I heard it was secure" and not look like you put much effort into it.
So, any takers on this project? I would, but I'm sucky at this kind of thing.
Re:Let me get this straight (Score:4, Informative)
http://paranoidlinux.org/ [paranoidlinux.org]
inspired by Little Brother by Cory Doctorow
Re: (Score:2, Funny)
You could do it by trolling Theo on the OpenBSD mailing lists. Propose lots of stuff and implement the bits that make him least angry. If you make him so angry he murders his wife, at least she died for something worthwhile.
Hell if that happens name the Linux distro after her.
Re: (Score:2, Interesting)
Re: (Score:2, Informative)
Re: (Score:3, Interesting)
So Vista, Word, and Google Desktop make truecrypt less viable? Im Shocked I tell you! Shocked. Please..If you are serious about using truecrypt please tell me that you are savy enough to know how to get around some of these holes. Googledesktop?-aka, I spy on everyone and read your brain desktop? Its like saying my iron has a security hole if someone installs a hardware keylogger on my system. Duh!
When you've wiped the flecks of foam away from your mouth... the whole point of TrueCrypt is it makes encryption easy to use. If the first thing you have to do is go around disabling a whole bunch of things and basically getting very intimate with what applications may be saving things in plaintext, then the authors have failed.
The general thrust of the article is that without an OS (and very possibly hardware) which provides a mechanism for the application to say "I'm security-sensitive, don't let anyth
Word and what? (Score:5, Informative)
If you're like me (meaning that you pay attention to what you read), you may be wondering what in the world "Word and auto-saves" means. I wondered so much I even followed the link, and saw that the omitted term was Google Desktop, omitted because of very sloppy cut and paste of the article.
Re:Word and what? (Score:4, Funny)
Re: (Score:2)
I wondered so much I even followed the link
What? You RTFA? Turn in your /. account this instant!
About Bruce Schneier (Score:5, Funny)
Some of you may not be aware of the stature of Bruce Schneier in the field of computer security, so here is some background information:
http://geekz.co.uk/schneierfacts/facts/top [geekz.co.uk]
Bruce Schneier once decrypted a box of AlphaBits.
Most people use passwords. Some people use passphrases. Bruce Schneier uses an epic passpoem, detailing the life and works of seven mythical Norse heroes.
Bruce Schneier knows Alice and Bob's shared secret.
Vs lbh nfxrq Oehpr Fpuarvre gb qrpelcg guvf, ur'q pehfu lbhe fxhyy jvgu uvf ynhtu.
Bruce Schneier's secure handshake is so strong, you won't be able to exchange keys with anyone else for days.
Bruce Schneier knows the state of schroedinger's cat
Bruce Schneier writes his books and essays by generating random alphanumeric text of an appropriate length and then decrypting it.
When Bruce Schneier observes a quantum particle, it remains in the same state until he has finished observing it.
If we built a Dyson sphere around Bruce Schneier and captured all of his energy for 2 months, without any loss, we could power an ideal computer running at 3.2 degrees K to count up to 2^256. This strongly implies that not only can Bruce Schneier brute-force attack 256-bit keys, but that he is built of something other than matter and occupies something other than space.
Though a superhero, Bruce Schneier disdanes the use of a mask or secret identity as 'security through obscurity'.
Re:About Bruce Schneier (Score:5, Funny)
Personally, I like "Bruce Schneier already has a backup plan for when the second person discovers P=NP."
Re:About Bruce Schneier (Score:5, Funny)
I ran into Bruce Schneier at an airport once. While we were waiting for a plane, I asked him if he would show me a "cool computer trick". He popped the RAM out of my laptop and quickly tasted the edge with the gold leads. He then told me that at 11:23pm the previous night I had visited ideepthroat.com with Firefox. Damn he's good.
Re: (Score:2)
Re: (Score:3, Funny)
Re: (Score:2)
I once ran into Bruce in ladies garment store (he likes to cross-dress, and so do I). I took out my laptop and asked him if he could crack it. I hadn't even finished opening the lid when he told me that there was a bug in my .bashrc file, either on line 57 or on 92, depending on which one I actually meant.
I stole his wallet while he was trying on a strapless evening gown, though.
Re: (Score:3, Funny)
Vs lbh nfxrq Oehpr Fpuarvre gb qrpelcg guvf, ur'q pehfu lbhe fxhyy jvgu uvf ynhtu.
With his what? It could probably cause a cave-in as everything oozes out, with the right frequency of course, but physically crushing?
Re: (Score:2, Informative)
if you asked Bruce Schneier to decript this, he'd crush your skull with his laugh.
He decripted it for me, and I still have my skull. On the other hand, he did take my soul. :( not really a fair trade in retrospect.
Re: (Score:2)
Bruce Schneier once proved the infinitude of twin primes -- by enumeration.
Bruce Schneier generated his RSA key with the two largest prime numbers.
As a way to hide recreational substances, Bruce Schneier invented a method to encrypt matter.
Re: (Score:2)
Bruce Schneier generated his RSA key with the two largest prime numbers.
good, then we now what they are, wait, what is the two largest prime numbers?
Re: (Score:2)
Welcome to /.
Re: (Score:2, Funny)
And you're a captain in the obvious army!
Summary is inaccurate (Score:5, Informative)
Schneier et al don't break TrueCrypt's deniability, per se. They simply show that Word, Google Desktop, and other automatically-indexing programs may reveal a hidden partition's possible existence.
This is a concern, of course, but can be avoided by careful use of the software invoked when using a TrueCrypt partition (i.e. killing processes except for TrueCrypt, etc).
I believe there's also a portable version of TrueCrypt that can be used that leaves no traces on the OS install once you're finished.
Re: (Score:2)
Your OS, however, will happily record that it ran a program called truecrypt and cached any DLLs it needed, log any changes in available drives and make a note that it accessed documents on the recently mounted 'F:' drive. Those are very definitely traces, and the documentation for TrueCrypt traveler mode [truecrypt.org] is very clear about their existence.
They do suggest using BartPE [nu2.nu] to lo
Re: (Score:2)
HW Encryption - the only way (Score:2)
A little more on topic - can you recover old autosaves from disc after a save? can you recover old autosaves after the program is quit? what about after
Comment removed (Score:4, Interesting)
Re: (Score:2)
The "hackers" used in the article are a red herring.
By the book, Mr RT:
Regulation Forty-six-A: "If transmissions are being monitored during battle..."
"...no uncoded messages on an open channel..."
"Red Herring" is actually a code phrase meaning there's an upgrade available for Firefox.
Then again, it could mean you don't get the shrubbery until you cut down the largest tree in the forest.
One of those two, I'm sure of it.
Turtles all the way down. (Score:4, Interesting)
Depends, but then you can do turtles all the way down.
So, have an encrypted (obviously visible volume) that has "boring" stuff in it, like your basic groceries accounting and letters to grandma. Have a hidden volume that has embarassing but non-incriminating stuff (porn folders). Have a hidden volume inside THAT that contains embarassing stuff that you'd pretend people shouldn't really want to find out (eg. gay porn). Have a hidden volume inside that that contains your master plan of converting all WoW players into your army of midgets to take over the world...add as many layers as you want.
That's the idea with the deniability, They can never know if there actually is a hidden volume in there. So assuming torture, you are probably so lost yourself that you cannot even remember the scheme yourself anymore...Even if they go with the assumption that since you are using Truecrypt there MUST be a hidden volume - but there's no way to know how many nested hidden volumes there are.
Re: (Score:3, Funny)
This algorithm takes care of that:
do {
NextVolumePassword = EnhancedInterrogation.output;
if ( Subject.dead ) throw EndInterrogationException;
NewVolume = MountNextVolume( NextVolumePassword );
cd NewVolume;
VolumeSize = GetVolumeSize;
} while ( VolumeSize > 0 )
Re: (Score:2, Funny)
*ouch!* Give it to me *ow!* not that hard! damn...
PM
This is what prompts Linus' comments... (Score:2, Insightful)
I like Bruce, I think he's got a lot of good insight, but when he spins up a "white paper" that basically says that applications are doing what they're supposed to be doing, and TrueCrypt isn't changing their native behavior, it does everyone in the "Security" community a disservice.
Bruce, if you're trying to make a point - make it. Don't sit there and *publish* nitpicky crap that basically is a bug (or lacking feature) of the software. You'd be far better to say that security applications do not provide
Deniability on SSD? (Score:5, Interesting)
This has been bugging me and I wonder if anyone out there can answer this: would the write-leveling used by flash drives defeat deniability as well? After all, if the most recently written-to portions of the drive are in a supposedly unused block, isn't that a bit of a giveaway?
Re:Deniability on SSD? (Score:5, Informative)
the Truecrypt documentation mentions the possible implications of this.
Wear-Leveling
Some storage devices (e.g., some USB flash drives) and some file systems utilize so-called wear-leveling mechanisms to extend the lifetime of the storage device or medium. These mechanisms ensure that even if an application repeatedly writes data to the same logical sector, the data is distributed evenly across the medium (logical sectors are remapped to different physical sectors). Therefore, multiple "versions" of a single sector may be available to an attacker. This may have various security implications. For instance, when you change a volume password/keyfile(s), the volume header is, under normal conditions, overwritten with a re-encrypted version of the header. However, when the volume resides on a device that utilizes a wear-leveling mechanism, TrueCrypt cannot ensure that the older header is really overwritten. If an adversary found the old volume header (which was to be overwritten) on the device, he could use it to mount the volume using an old compromised password (and/or using compromised keyfiles that were necessary to mount the volume before the volume header was re-encrypted). Due to security reasons, we recommend that TrueCrypt volumes are not stored on devices (or in file systems) that utilize a wear-leveling mechanism. If you decide not to follow this recommendation and you intend to use system encryption when the system drive utilizes wear-leveling mechanisms, make sure the system partition/drive does not contain any sensitive data before you fully encrypt it (TrueCrypt cannot reliably perform secure in-place encryption of existing data on such a drive; however, after the system partition/drive has been fully encrypted, any new data that will be saved to it will be reliably encrypted on the fly). To find out whether a device utilizes a wear-leveling mechanism, please refer to documentation supplied with the device or contact the vendor/manufacturer.
Re: (Score:2)
No because the logical explanation is files were there that were deleted. Plus if you think about it, leveling means physical sectors and disk addresses don't match the virtual ones the OS sees... the drive is constantly shuffling the physical data around (or rather just moving it every write) while it maintains the same virtual position unless it would otherwise change... that's how I understand it at least. It seems a bit messy but the only way to optimize it would be to create a dedicated file system t
Don't forget Windows Explorer, too (Score:4, Insightful)
And Finder (Score:2)
Not Truecrypt's fault, it appears (Score:2)
FTA:
The researchers found that Windows Vista shortcuts can give away the existence of a hidden file. Vista, which automatically creates shortcuts to files that get used, then stores the shortcuts in the Recent Items folder. And the auto-save feature in Word, meanwhile, saved versions of the hidden files.
"An attacker can use information gleamed from these files - as well as other information leakage from the primary application - to not only infer that a hidden volume exists, but also recover some of its contents," the researchers wrote in their report.
Google Desktop is another culprit that exposes hidden files in TrueCrypt versions below 6.0, according to the report. The Google app's lists of recently changed documents and logs of recent file actions can reveal the existence of a hidden file.
In other words, it's the applications that exposed Truecrypt, when the hidden files were VISIBLE.
The moral of the story: If you have something to hide, turn off the damn logs or put them where they'll be destroyed (encrypted temporary partitions, for example). And don't depend on closed source, proprietary software.
Re: (Score:3, Interesting)
A more sane conclusion (without that stupid "propritary software" nag at the end) would be:
If you want _deniability_, you have to encrypt _everything_ belonging to the system you want to deny knowledge of.
Have another OS, and page file/partition around. But keep _everything_ that can be accessed by the other OS encrypted.
Otherwise, usage statistics, paged out memory, crash dumps, index files, any of a million different items could give you away.
Re: (Score:2)
You're right. I only mentioned proprietary software because it can't be modified to protect your privacy. And it's not like it benefits them, anyway.
Since I've got Office 2007 on my machine... (Score:2)
leakage (Score:2)
Isn't it pretty well-known that you have to be careful about leakage? An example of that would be that most (all?) encryption HOWTOs tell you that you should encrypt your swap, because you just never know when some of your data might end up in there. If there's a lesson here, it's just that swap might not be enough; you need to think bigger.
I can think of plenty of other ways that something, at least a hint of the existence of the data (if not the data itself) can leak around. Suppose /home/sloppy/ isn'
I said it before, I'll say it again (Score:5, Informative)
Windows caches all types of stuff about filesystems it touches in the registry. Open regedit some time and search for "OpenSaveMRU" and you'll see that pretty much every file you click to open in Windows is in there.
Not that Linux is any better, at least Gnome systems - check out ".nautilus" in your home folder. Same thing going on there with the directory structure, you name it. The first thing I do on a new Ubuntu box is remove ".recently-used.xbel" and create a directory with the same name, and make ".nautilus" owned by root and not world-writable. /tmp is obviously a problem on Unix-type systems as well, along with the swap partition.
Of course if your whole system is encrypted these are not problems, but then you don't exactly have a deniably-encrypted filesystem.
A single from a home-run hitter (Score:2)
Sorry, couldn't come up with the traditional car analogy, so I had to resort to sports. We (that is, those of us who may or may not be using deniable file systems) didn't need Bruce Schneier to tell us that information can leak from a mounted encrypted volume to the system volume, nor that the same is true for the existence of a deniable volume. Which doesn't mean he isn't right. Neither Windows nor Linux is intended as a secure compartmented workstation, which is the minimum you'd need to pull this off
Why is... (Score:2)
The summary ciphertext?
Culprit? (Score:2)
FTA:
Google Desktop is another culprit that exposes hidden files in TrueCrypt versions below 6.0, according to the report. The Google app's lists of recently changed documents and logs of recent file actions can reveal the existence of a hidden file.
Really poor phrasing. It makes Google Desktop look like the offender, when in actuality it ended up being a useful tool in pointing out a vulnerability (and perhaps correcting it).
Just use a VM (Score:3, Interesting)
Fortunately, there's an easy way around this problem.
Instead of having just your "sensitive" data in a DFS, just use put an entire OS in there, which you can use with for example VMWare. So, you boot up your machine, type in your encryption password and end up in your safe and clean "nothing to see here" OS, with some decoy applications and VMWare. Then when you want to actually do something with your system, decrypt the DFS, start the VMWare image found there and do your normal work.
All they could prove in this case is that you use VMWare. Just make sure VMWare has no leaks pointing to the image in DFS, but that's trivial compared to cleaning up behind Vista and it's myriad of ways it keeps track of whatever you do (for your benefit usually, but not always).
No shit, Schneierlock? (Score:2)
So if you open files from an encrypted drive and let your software auto-save backups to a non-encrypted drive, those files can be found?
So if you store a shortcut to a file in your hidden volume, that shortcut can indicate that a hidden volume exists?
So if you let your search application create an index of files in a drive, that index can indicate that the drive exists, and contains those files?
So if your paging file isn't on an encrypted volume, any memory contents swapped out to it are stored unencrypted?
Re: (Score:2)
Windows should build in a encryption program like on Mac OS X
You mean like Bitlocker [wikipedia.org]?
Re: (Score:3, Interesting)
True Crypt has a problem eh... Windows should build in a encryption program like on Mac OS X. It would stop a lot problems and it would be Microsoft managed and it would work better because they have all the code for the OS and can provide a better service. In the Mac OS, there are no bugs that I have discovered yet on the built in encryption program. I would hope that True Crypt fixes this bug because it is a great program.
I know there's often mindless maclove on /., but please try to think before posting.
Re:Get A Mac (Score:5, Funny)
So, just to play along, what software do you propose to use on the mac to provide deniable encryption?
You could try this program called TrueCrypt [truecrypt.org]. It seems to work okay.
Re:Get A Mac (Score:4, Funny)
So, just to play along, what software do you propose to use on the mac to provide deniable encryption?
You could try this program called TrueCrypt [truecrypt.org]. It seems to work okay.
yup, ...until some folks showed flaws in TrueCrypt deniability [slashdot.org]
Now that's an attempt for infinite mod points!
Re: (Score:3, Funny)
yup, ...until some folks showed flaws in TrueCrypt deniability [slashdot.org]
You should just use a Mac. I've never experienced any bugs with its built-in encryption options.
Re:Get A Mac (Score:5, Funny)
And what about deniability, then?
You could try TrueCrypt [truecrypt.org]. I think it works on Macs.
Re: (Score:3, Interesting)
The address for Apple H.Q. is "1 Infinite Loop." So this conversation is kind of appropriate....
Re:Get A Mac (Score:5, Informative)
Windows should build in a encryption program like on Mac OS X
Uh... they did... 8 years ago.
They've had EFS (encrypting file system) since Windows 2000.
http://en.wikipedia.org/wiki/Encrypting_File_System [wikipedia.org]
They've added BitLocker Drive Encryption with Vista (Ultimate & Enterprise).
http://en.wikipedia.org/wiki/BitLocker_Drive_Encryption [wikipedia.org]
Re: (Score:3, Interesting)
I prefer Axcrypt [axantum.com] over Windows Compressed Folders password protection. AxCrypt is free and open-source.
From their FAQ:
Why is AxCrypt better than Windows Compressed Folders password protection?
In the July 2003 issue of PC World magazine, there is a description of how to password protect files using the built-in Windows Compressed Folders of Windows XP and ME. This is a WinZip compatible extension of the Windows Shell (Windows Explorer). The problem is that since it's WinZip-compatible it suffers from the sa
Re: (Score:2)
FUD. Dual_EC-DRBG is optional and off by default.
Opps (Score:2, Funny)
You lost me after the first "M$".
Re: (Score:2)
Tell me, how long does it take you to read through the source of every program you compile? Do you ever actually get around to compiling anything, at this rate? Do you have time for a real job?
Re:Get A Mac (Score:5, Informative)
They're not trying to decrypt files here, but just prove that files exist. TrueCrypt lets you put an encrypted volume inside an encrypted volume, such that if you mount the "outer" volume, you can't show evidence that there even exists an "inner" volume. However, if you mount that "inner" volume and use the files in it, Windows will make a Recent Documents shortcut to its location, thus disclosing the fact that there are files there.
I'm a TrueCrypt user, but not a DFS user, since I care more about the encryption than I do about plausible deniability, but I'm interested in trying this out. The test case might be along the lines of:
Since Spotlights also does a full-text search, does it cache any of that full-text data to make the next search faster?
Re:Get A Mac (Score:5, Informative)
Spotlight's index is stored in the root of the volume it's indexing. Encrypted filesystems are independent volumes, so their indexes are stored in their volume root. The index of the primary filesystem isn't altered.
I'm not sure it leaks zero information -- there have been some bugs with Spotlight indexes and FileVault-encrypted home directories.
Re: (Score:2)
It's good food for thought if nothing else.
Re: (Score:2)
Me too. For now, encryption is enough. I don't really expect at this point that if the NSA really wanted to get my data I could somehow prevent them. I just want to make it really hard, and more important, I don't want my correspondence and data to be wide open to them. I don't particularly care if they know I'm trying to thwart their ability to snoop in my business. I just want them to know that if they're going to get all up in my
Re:Get A Mac (Score:5, Informative)
User Key: [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\ Explorer]
System Key: [HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\ Explorer]
Value Name: NoRecentDocsHistory
Data Type: REG_DWORD (DWORD Value)
Value Data: (0 = disable restriction, 1 = enable restriction)
Re:Get A Mac (Score:5, Informative)
Really?
All of Mac OS X encryption operates on user-managed encrypted disk images (volumes) or "encrypted home directories" (FileVault), which is really an OS-managed encrypted disk image.
FileVault home directories are no stronger than your login password. As this password is stored hashed only once (albeit salted, as of 10.4), it had better be immune to brute-force-guessing. They're also only as strong as your system-wide FileVault recovery keychain, as a copy of the key is stored in that, too.
Non-FileVault encrypted images at least use 1000-round PBKDF rather than a single hash and don't, by default, use a recovery keychain. At only 1k rounds, though, it had still better be immune to brute-force guessing.
None of this addresses the fact that using a Mac OS X system with an encrypted directory still leaks information about the contents of that directory onto the unencrypted parts of the drive. In fact, if anything, TrueCrypt is better about not doing this than the Mac, though neither of them hide their tracks all that well. The best approach is to have TrueCrypt running full-disk encryption so that there's nowhere for data to leak to.
Re: BitLocker Backdoor- Source? (Score:5, Interesting)
[...] it captures live data on the computer, which is why it's important for agents not to shut down the computer first, Fung said. A law enforcement agent connects the USB drive to a computer at the scene of a crime and it takes a snapshot of important information on the computer. It can save information such as what user was logged on and for how long and what files were running at that time, Fung said. It can be used on a computer using any type of encryption software, not just BitLocker.
So it looks like COFEE is a USB device that performs monitoring once Vista has been booted and logged in. Not having your BitLocker USB drive plugged in and not leaving your PC on would seem to defeat an attack by COFEE.
Re: (Score:3, Informative)
Yes; some of the tools it has perform live evidence acquisition to powered-on systems. It's not safe to assume a powered-on system where the encrypted drive has been disconnected is safe, as keys may remain in memory. But if the PC is off (and especially if free disk blocks, virtual memory and sleep files, etc. are scrubbed), this doesn't do anything.
Re: (Score:2)
Of course, it's closed source, so you have to take Microsoft at their word for it,
Not really. Contrary to what people seem to think, Microsoft releases source code to some customers. If it means a $10 million sale, MS is more than happy to hand out source for Windows. Of course, it really wouldn't do much good since there's no way you can know FOR SURE, if the code you were given matches the compiled binary you're using. This is a problem with any software you don't code-review and compile yourself. To that end TrueCrypt is really only safer (in terms of backdoors) than Bitlocker if you
Re: (Score:3, Informative)
Be careful you don't use slocate if you're on Linux either. (Hint: you probably do without knowing it.)
The point of this paper is that any automatically indexing software could reveal a hidden partition's existence; they were simply giving a few hard examples.
Re:No Problem Here (Score:5, Funny)
"Keep in mind, though, that you can simply add exceptions to your updatedb.conf file, such that the directories/partitions you list will not be indexed (and hence will not be locatable by slocate)."
yes, put your hidden directories/partitions in /etc/slocate then slocate will not reveal their existence.
It seems to me there is something wrong with this sheme but I cannot put my finger on it. Hum ... but then again I'm not a security specialist.
Re: (Score:2)
Re:My Iron (Score:4, Funny)
I was wondering about that, I was thinking your security flaw was as simple as someone saying: "Hey, you left your iron on!" then they just rummage through your shit while yer distracted.
"It's ok, im completely secure as long as my iron is off"
Re: (Score:2, Informative)
you're not a fool per se. everything has deficiencies of one sort or another. but have you looked to see whether there is any configuration guidance for your particular choice?
I know NSA IAD has a security configuration guide for MacOS X. It may include a section on FileVault. If so, it ought to be at least a good place to start from and provide you with good search terms.
http://www.nsa.gov/snac/downloads_macOSX10_4Server.cfm?MenuID=scg10.3.1.1 [nsa.gov]
Re: (Score:2)
Well, this is all within the context of a user that wants to have deniability. You can't really have deniability with full-disk encryption. ;-) At a minimum, they're going to get the key to the outermost layer. This is really about information accidently getting stored in a less-hidden layer than the user intended.