DeathAxe   10 #13 Posted May 1, 2014 Honestly with encryption stuff, I wouldn't trust open source so much. Just about anyone can edit and look at the code.  I would go for big name software for that sort of thing, such as becrypt and symantec encryption desktop (for example).  I'm not disrespecting truecrypt though, it is a good bit of software, and free at that. It is just.... you need to be wary of it is all. Share this post Link to post Share on other sites Share this content via...
andysm   18 #14 Posted May 1, 2014 The Truecrypt source code is currently being audited by a group of security professionals. So far they have checked the boot loader and are now starting on the basic cryptographic functions. They have found some bugs but nothing serious so far. Once the audit is completed I would trust Truecrypt far more than any closed source product. Share this post Link to post Share on other sites Share this content via...
swarfendor437 Â Â 14 #15 Posted May 9, 2014 Are steganography tools as secure as True Crypt? Â http://www.softpedia.com/hubs/Steganography-Tools Share this post Link to post Share on other sites Share this content via...
Cyclone   10 #16 Posted May 9, 2014 OpenSSL ?  A software bug. That was fixed very quickly. (Assuming you are referring to heartbleed).  Unlike blackbox software that probably has NSA/MI5 backdoors in it on purpose.  ---------- Post added 10-05-2014 at 00:06 ----------  Honestly with encryption stuff, I wouldn't trust open source so much. Just about anyone can edit and look at the code. I would go for big name software for that sort of thing, such as becrypt and symantec encryption desktop (for example).  I'm not disrespecting truecrypt though, it is a good bit of software, and free at that. It is just.... you need to be wary of it is all.  I'd say exactly the opposite.  BTW - have a go at editing the code, see if your changes are accepted.  ---------- Post added 10-05-2014 at 00:07 ----------  Nobody can continue to use the "it's open source, therefore anyone can check it, so it's safer" line after the heartbleed issue though. That entirely relies on people actually wanting to do the checking, and if OpenSSL is anything to go by, a lot less people than we expect with a lot less knowledge than we expect, are actually doing the checking.  It's hardly earth shattering news that some software had a bug. It has no bearing on the claim you say nobody can use anymore. Share this post Link to post Share on other sites Share this content via...
megalithic   10 #17 Posted May 10, 2014 To be honest i only encrypted my slave drive and password protected it due to the likes of Cryptolocker. I've nothing sensitive to protect, in real terms. I've important files on C: D: and DVD. I've also a system image.  I guess personal PC users have little to fear if they pre-empt a "strike" ? Share this post Link to post Share on other sites Share this content via...
anywebsite   10 #18 Posted May 10, 2014 It's not going to protect you against that, megalithic. It can still encrypt the files again with it's own key.  Drive/file encryption is to protect you against somebody else reading your files if they find your drive, or if you decide to store your information on somebody else's hardware on the internet. Share this post Link to post Share on other sites Share this content via...
megalithic   10 #19 Posted May 10, 2014 It's not going to protect you against that, megalithic. It can still encrypt the files again with it's own key. Drive/file encryption is to protect you against somebody else reading your files if they find your drive, or if you decide to store your information on somebody else's hardware on the internet.  Cryptolocker can infect a drive encrypted and password protected by Bitlocker ? Share this post Link to post Share on other sites Share this content via...
anywebsite   10 #20 Posted May 10, 2014 (edited) Cryptolocker can infect a drive encrypted and password protected by Bitlocker ?  Yes, if/when you unlock it on an infected PC. No drive or file encryption will save you from cryptolocker or other malware, it's not intended to. Edited May 10, 2014 by anywebsite Share this post Link to post Share on other sites Share this content via...
megalithic   10 #21 Posted May 10, 2014 Yes, if/when you unlock it on an infected PC. No drive or file encryption will save you from cryptolocker or other malware, it's not intended to.  Ah, as i thought then. I access my files from the C: drive, D: is back up, so i rarely input the password, maybe one a month if that, and CL would have reared it's head by then i guess. The last thing i'd be doing is trying to access that drive if i knew my C: drive was compromised. I can see how some people would though, to check if all is lost. Share this post Link to post Share on other sites Share this content via...
anywebsite   10 #22 Posted May 10, 2014 Cryptolocker doesn't announce it's presence until after it's encrypted your files. Share this post Link to post Share on other sites Share this content via...
swarfendor437 Â Â 14 #23 Posted May 10, 2014 And now an even greater threat - Prison/Power Locker: Â http://readwrite.com/2014/01/07/how-to-protect-against-prisonlocker-the-next-major-malware-threat#awesm=~oDRYIF4BokUIlN Share this post Link to post Share on other sites Share this content via...
lookleft   10 #24 Posted May 10, 2014 And now an even greater threat - Prison/Power Locker: http://readwrite.com/2014/01/07/how-to-protect-against-prisonlocker-the-next-major-malware-threat#awesm=~oDRYIF4BokUIlN  If you have a proper backup there is little to worry about. Share this post Link to post Share on other sites Share this content via...