Posted January 15, 201411 yr TrueCrypt Master Key Extraction And Volume Identification One of the disclosed pitfalls of TrueCrypt disk encryption is that the master keys must remain in RAM in order to provide fully transparent encryption. In other words, if master keys were allowed to be flushed to disk, the design would suffer in terms of security (writing plain-text keys to more permanent storage) and performance. This is a risk that suspects have to live with, and one that law enforcement and government investigators can capitalize on. http://volatility-labs.blogspot.fr/2014/01/truecrypt-master-key-extraction-and.html Ted.
January 15, 201411 yr very intresting, so if somebody finds the master key in the memory, truecrypt is totally unsafe, i guess this will be improved to make it harder?
January 15, 201411 yr very intresting, so if somebody finds the master key in the memory, truecrypt is totally unsafe, i guess this will be improved to make it harder? No this is a known vuln and there will be no fix. This is why you should always use full disk system encryption. Only using a container is not safe. And always shutdown your system, never leave the house with a running system.
Create an account or sign in to comment