Jump to content
Tuts 4 You

TrueCrypt Master Key Extraction And Volume Identification...


Recommended Posts

Posted

TrueCrypt Master Key Extraction And Volume Identification


 


One of the disclosed pitfalls of TrueCrypt disk encryption is that the master keys must remain in RAM in order to provide fully transparent encryption. In other words, if master keys were allowed to be flushed to disk, the design would suffer in terms of security (writing plain-text keys to more permanent storage) and performance. This is a risk that suspects have to live with, and one that law enforcement and government investigators can capitalize on.

 


http://volatility-labs.blogspot.fr/2014/01/truecrypt-master-key-extraction-and.html


 


Ted.


Posted

very intresting, so if somebody finds the master key in the memory, truecrypt is totally unsafe, i guess this will be improved to make it harder?


Posted

very intresting, so if somebody finds the master key in the memory, truecrypt is totally unsafe, i guess this will be improved to make it harder?

No this is a known vuln and there will be no fix.

 

This is why you should always use full disk system encryption. Only using a container is not safe.

And always shutdown your system, never leave the house with a running system.

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
×
×
  • Create New...