← Home ← Back to /g/

Thread 106204150

17 posts 4 images /g/
Anonymous No.106204150 [Report] >>106204322 >>106205079 >>106206394 >>106206763
what is /g/'s preferred method for Full Disk Encryption?
is BitLocker botnet?
how about VeraCrypt?
Anonymous No.106204159 [Report]
LUKS
Anonymous No.106204160 [Report] >>106205565
cryptsetup
Anonymous No.106204322 [Report]
>>106204150 (OP)
No encryption, Nothing to hide.
Anonymous No.106205079 [Report]
>>106204150 (OP)
my encrypted hard drive is set to Kids Mode
Anonymous No.106205565 [Report]
>>106204160
fpbp
Anonymous No.106206131 [Report] >>106206238 >>106206241
remember the part when they lock you up in a cell with that big black carreer criminal
if you have REALLY forgotten your password you're in deep trouble
plausible deniability is important
Anonymous No.106206238 [Report] >>106206322
>>106206131
>plausible deniability is important
and how is this achieved?
Anonymous No.106206241 [Report]
Veracrypt is all you need. Also, any closed source encryption technology must be assumed by default to be backdoored. Therefore, BitLocker cannot be trusted.

>>106206131
Which is why Veracrypt has hidden volumes.
Anonymous No.106206322 [Report] >>106206372
>>106206238
In Veracrypt, we have what are called hidden volumes. The way this works is, when you create an encrypted volume, you have the option to create two -- an inner volume and an outer volume. Each volume has a different password. The inner volume is created inside the encrypted storage of the outer volume, and therefore, is indistinguishable from free storage. At the time of creating the encrypted volume, it is advised that you place as many files as possible onto the outer volume, that you would consider embarassing enough to want to encrypt, but not especially damning. Maybe you'd use this for storing financial documents, which should probably be kept secret anyways. Or it contains porn that is not illegal but makes you look like a weirdo. Either way, it doesn't contain anything you don't want your attacker to have, but it gives you an excuse as to why you have up until now refused to give up your password.

Meanwhile, if they do not have the second password, they cannot access the real hidden files. They cannot prove that there is such a password, and moreover, if they accidentally write to the volume while the first password is in use, it is possible that the hidden/inner volume will be overwritten, and the data they want to crack out of you will be destroyed.
Anonymous No.106206372 [Report] >>106206489
>>106206322
why doesn't everyone use this?
Anonymous No.106206394 [Report] >>106206750
>>106204150 (OP)
What exactly are you encrypting?
Anonymous No.106206457 [Report]
FileVault.
Anonymous No.106206489 [Report]
>>106206372
Many people do use this.
Many people also just don't encrypt any of their files out of either laziness or ignorance.
Anonymous No.106206750 [Report]
>>106206394
Christian Prophecies
Anonymous No.106206763 [Report]
>>106204150 (OP)
luks
Anonymous No.106206784 [Report]
Imma just leave this here