Jump to content

lets just pretend...


CaveMan

Recommended Posts

lets pretend i was an interesting guy who had something huge to hide

would doing this work/do anything

using truecypt to encrypt a file

putting the encrypted file into a folder

and ecrypting the folder

would this work? or am i missing some of the theory behind encryption?

Link to comment
Share on other sites

lets pretend i was an interesting guy who had something huge to hide

Porn spam! :twisted:

would doing this work/do anything

using truecypt to encrypt a file

putting the encrypted file into a folder

and ecrypting the folder

would this work? or am i missing some of the theory behind encryption?

What's the point of the encrypted folder?

Link to comment
Share on other sites

Unlike compression, encrypting an encrypted file would work. Assuming that you didn't use encryption methods and keys that by some freak accident the second one reversed the first one.

Although, if you used a strong encryption method, and a good key, the need for this is pretty much non-existant (unless you are a REALLY interesting guy, but honestly, your porn isn't that good :P).

Link to comment
Share on other sites

if i were interesting i wouldn't be asking it on forums i would write it memorise it and clean format my drive

than bend the discs

and throw them in the fire

how ever... i respect all my hdd's even if my music one is only 20 gig and a good 5-7 years old (cant remember)

Link to comment
Share on other sites

Think of encryption as a safe, if you want to keep something safe you'd put it in a safe, and if you wanted it to be really safe, you'd put the first safe in another safe so it's more safe. But remember something about safes people keep important things in safes so it might not really be safe in a safe... safety speaking.

Link to comment
Share on other sites

To stick with the analogy, you're indeed placing a safe in a safe. However, the point being made is that rather than using 2 safes, you get one and this time make sure it's a good one, so you don't have to account for the eventuality that 'they' get into the first one.

Link to comment
Share on other sites

yes but in my eyes, encryption software shouldn't be open source, it makes it easier to find security holes, exploits

but that could just be my logic

Not quite. Encryption apps should be based on a strong algorithm, not on security though obscurity. If the algorithm is good and implemented right, then seeing the source does not help an attacker any.

Link to comment
Share on other sites

TrueCrypt can do lots of neat things, like create a hidden encrypted volume inside another encrypted volume. Each with seperate keys and multiple encryption algoritms protecting the data inside each.

Here's a tutorial I found on it:

http://element14.wordpress.com/2006/10/15/...pt-for-windows/

Just don't forget the passwords to the volumes or your data is gone for good!

Link to comment
Share on other sites

encrypt the shit out of it with whatever tried and true cyphers are available to you

hide it using stenagoraphy

use truecrypt to put it in a hidden partition

chop the file in half, put one in on a usb key, put the other on an audio cd

keep the audio cd in your car

put your car in an air tight cargo container and sink it in a lake

remove the IC from the usb key and implant it in your right butt cheak

tell your parents that you've joined a cult and move to montana

Link to comment
Share on other sites

encrypt the shit out of it with whatever tried and true cyphers are available to you

hide it using stenagoraphy

use truecrypt to put it in a hidden partition

chop the file in half, put one in on a usb key, put the other on an audio cd

keep the audio cd in your car

put your car in an air tight cargo container and sink it in a lake

remove the IC from the usb key and implant it in your right butt cheak

tell your parents that you've joined a cult and move to montana

^that's just crazy enough to work

Link to comment
Share on other sites

encrypt the shit out of it with whatever tried and true cyphers are available to you

hide it using stenagoraphy

use truecrypt to put it in a hidden partition

chop the file in half, put one in on a usb key, put the other on an audio cd

keep the audio cd in your car

put your car in an air tight cargo container and sink it in a lake

remove the IC from the usb key and implant it in your right butt cheak

tell your parents that you've joined a cult and move to montana

Do all this then forget to dban your hard drive so they just pull it all back prior to the initial encrypt.

I was about to mention the hidden volumes in Truecrypt, however, you did already.

So, with that said, this is your best bet. Im one of the most paranoid people I know, so I have an initial Truecrypt volume wrapped around hidden volumes. This way if I was ever tortured to open my truecrypt volume, the person will not know that there are more volumes inside. They will just see the files within the first volume which is just fluff.

Just remember that encryption is useless if you do not "shred" the original files that are not encrypted. Doesnt matter how strong your "safe" is. If you leave the document sitting on your desk, the thief will not go for the safe unless out of curiosity. I guess that makes the difference between a good thief and a bad one.

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...