Keyfiles are just regular files that, when you enter the password to access your vault, you have to point TrueCrypt to as well. In addition to a password, you can use keyfiles. If you are storing text files in a small volume, lower read/write speeds will not be as inconvenient as if you are storing high-resolution spyplane video in a multi-gigabyte vault. To see the speed differences between the different algorithm options and combinations, click on Benchmark to run TrueCrypt’s Encryption Algorithm Benchmark on your system. This, however, significantly affects the read/write times of the volume. The different encryption algorithms offered by TrueCrypt. The resulting encrypted file is almost impossible to bruteforce. ![]() It then takes this, already encrypted data, and passes it back through a different algorithm. TrueCrypt takes the volume and runs each block of data through one algorithm to create an encrypted result. This is the best way to really lock down the volume. Instead of just using one encryption algorithm, TrueCrypt can stack multiple algorithms on top of each other. As this, however, is a tutorial for super-spies, we need to take things further. For most people that is the best balance of convenience and security. In the earlier TrueCrypt tutorial, I advised you to stick with the default encryption settings. Even better, because there are a number of different media encodings, it is not uncommon for video files to be un-openable. Your vault is a 700MB+ “movie” with the genuine trappings, in a folder filled with other movies. For maximum security, leave those files intact and create your TrueCrypt volume to replace the main video file. Generally these films come with additional files, such as descriptions, subtitles or movie covers. For a large TrueCrypt volume, you can use one of them. A lot of people have a folder on their computer filled with movie files from questionable sources. If a 20 megabyte vault isn’t going to be enough, it’s time to go big. Occasionally open a few of your camouflage files without touching your vault to generate a natural use pattern for the files. Tip: When you’re accessing your TrueCrypt volume, open a few of your camouflage files too so that someone can’t find your volume by just sorting by most recently opened. One of these files is a TrueCrypt volume. Make sure that when you create your volume, that its size also fits in with the camouflage files. Make a random image file somewhere in the middle your TrueCrypt volume. To use RAW files for camouflage, have a folder containing 100 or more images with a sequential naming system such as IMG_1200 through to IMG_1300. If you are storing a few small images, text files or PDF documents, 20 megabytes is more than large enough. RAW Image FilesĪ RAW image from my Canon 650D is anywhere between 17 and 24 megabytes when converted to Adobe’s. I find the the two best kinds of camouflage are RAW image files and movie files. What volume size you require determines what kind of files you hide it among. Hiding a TrueCrypt VolumeĪ TrueCrypt volume has a fixed size, and can have any filename and extension, so it can easily be camouflaged among genuine files. If you have not, please read it before continuing as I will not be retreading the basics. ![]() ![]() Prerequisitesįor this tutorial, I assume you have read the previous tutorial which goes through, step by step, how to install and setup a basic TrueCrypt volume. The difference is only apparent when you decrypt the volume. While the volume remains encrypted, it is impossible to tell what is real data and what is random data it all just appears as garbage. As you add files to the volume, the random data is replaced with real data. When you create a new volume, that data is just random ones and zeroes. They take up a fixed size and are always filled with data. TrueCrypt volumes are encrypted disk images. I’ll also show you how to use hidden TrueCrypt volumes to give yourself plausible deniability if you are subjected to extortion or torture. I'll show you how to use TrueCrypt to store files as securely and secretly as possible. In this tutorial, I am assuming you are a secret agent and need those extreme levels of security. In that tutorial I mentioned that TrueCrypt was capable of levels of security far in excess of what most Mac users need. ![]() In a previous tutorial, I showed you how to set up password protected vaults on your Mac.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |