Teddy Rogers Posted January 15, 2014 Posted January 15, 2014 TrueCrypt Master Key Extraction And Volume Identification One of the disclosed pitfalls of TrueCrypt disk encryption is that the master keys must remain in RAM in order to provide fully transparent encryption. In other words, if master keys were allowed to be flushed to disk, the design would suffer in terms of security (writing plain-text keys to more permanent storage) and performance. This is a risk that suspects have to live with, and one that law enforcement and government investigators can capitalize on. http://volatility-labs.blogspot.fr/2014/01/truecrypt-master-key-extraction-and.html Ted.
Artic Posted January 15, 2014 Posted January 15, 2014 very intresting, so if somebody finds the master key in the memory, truecrypt is totally unsafe, i guess this will be improved to make it harder?
Aguila Posted January 15, 2014 Posted January 15, 2014 very intresting, so if somebody finds the master key in the memory, truecrypt is totally unsafe, i guess this will be improved to make it harder? No this is a known vuln and there will be no fix. This is why you should always use full disk system encryption. Only using a container is not safe. And always shutdown your system, never leave the house with a running system.
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now