reply to post by tothetenthpower
I use sha 512 hash with AES+Twofish+Serpent for encryption:
Three ciphers in a cascade operating in XTS mod, Each block is first encrypted with Serpent (256-bit key), then with Twofish (256-bit key) and finally
with AES (256-bit key) each cipher has its own keys. All keys are mutually independent.
^ that is what the encrytion options I use say. My passwords are completely random and VERY long consisting of numbers/letters/uppercase/lowercase.
When I encrypt things I encrypt the hard drive completely using the above with one password and anything I put inside it I put into encrypted file
container. So I encrypt the entire drive then I make a file container the size of the drive with a seperate password.
If you can get into my system you can keep everything I have and I will give you $1000 but you never would so I am not worried..
They have tried cracking with much more powerful computers then what you are talking about above and if a super computer can't crack it then IDK why
you people think that its so easy.
Also I read your 3 links the 1st 2, the guy was trying to crack his own drive and knew somewhat what the password was and which symbols/letters to
include in the dictionary he has a huge change at getting in compared to some random trying to hack in.
The second is just a tool used to run dictionary on truecypt it gives you no special advantages to crack truecrypt in any way its just another
dictionary tool you could run it FOREVER and still never get in..
the 3rd link has been known for a while its how you can get into anything that is encrypted, the problem with it though if you read the article it
even says if you rely on bruteforce and you use a good passphrase you will likely never get in. BUT if the computer is turned on and the truecrypt
drive is mounted then can find out the key because it will be in memory or also if people save in their truecrypt key..
I NEVER save my key I type it in anytime I need to access anything. I have a program that dumps my memory also every 15 minutes to keep my ram freed
As well as if I am not on my computer I shut it down so they could not access my keys or my truecrypt because the computer would never be on for them
to do that.
On top of it not being on, they would have 1 bios password they would need to know (easily hacked just replace bios chip but still) I have a startup
pasword, I have passwords on both had drives the from what I understand you are not able to hack hard drive passwords but I am sure you can since its
dell... so if they can get past all of that, they would need to know my truecrypt startup password that would get them into my fake windows install,
then they would need to know my password for my real windows.. and even if they got through all of that and got onto windows they wouldn't find much
interestign things on there since I keep very little installed only standard programs, they would have to get through 2 truecrypt containers with 2
different passwords to actually look at any of my files.
Its not gonna happen.
edit on 30-1-2013 by dc4lifeskater because: (no reason given)