veracrypt is the most secure encryption software
>post-install encryptionnope. backdoored
>>106780853>live in uk>key disclosure lawshmm do I show the police all my source code, passwords, personal pictures of my asshole, &&... or do I go to prison for 3 years.
truecrypt is safer.The takeover glows to shit.
>>106781064>takeoverliterally just a fork after truecrypt development stopped>truecrypt is saferliterally the sourceforge page for truecrypt (https://truecrypt.sourceforge.net/) states in red bold letters: WARNING: Using TrueCrypt is not secure as it may contain unfixed security issuesthis is going on your performance review, agent
>>106780853
>>106781093Seems you were not there when it happened.>literally the sourceforge page for truecrypt (https://truecrypt.sourceforge.net/) states in red bold letters: WARNING: Using TrueCrypt is not secureYes, that's why it's very suspicious.>after truecrypt development stoppedStopped suddenly, for no reason.>Truecrypt is going strong, regular commits and code is audited and found to be pretty much perfect>Suddenly, truecrypt development is cancelled, false "not secure" messages added, site replaced with instructions to enable BITLOCKER of all things (known to be insecure and useless)>Veracrypt appearsTo this day there is no vulnerability found in TC 7.1a. 10+ Years of auditing, but we need "security fixes"? It's much more likely there is some backdoor or vurn introduced. Even so veracrypt might okay, but you shouldn't update it quickly. What is undeniable though is that the end of TC glows brighter than a newly fucked dogs glans in the moonlight. Maybe they were threatened and told to recommend Bitlocker and this is there malicious compliance, or maybe they were just threatened and this was their way of putting out a ridiculous ending message to warn everyone, who knows.>>106780863>dont trust the OS>so let's rely on the OS for encryptionhaha
>>106780971In the US spending 10 years in prison is better than spending 1 year in prison but life on the Megan's Law listIronically, they claim Megan's Law list isn't a punishment, even though they- publicly defame you to the world- prevents you from getting almost any job- makes it illegal to exist within certain distances of many things, sometimes it's illegal to live in entire cities- Stop you from using a computer or internet for life, at least without tracking malware installed (Windows only, of course)- All kinds of other bullshit rules that you're almost certainly going to fail and go back to prison anywayAll for (accidentally) clicking on illegal 1s and 0s on the internet. How the fuck is this constitutional? How is it considered not a punishment?
>>106781330fuck off pedo retard
>>106781330>(accidentally)
>>106781330What has this got to do with what I said? I do agree that US punishments are disproportionate, and I disagree with existing laws regarding "illegal 1s and 0s" (just say child porn) but you are overblowing things a little. You can avoid prison, you can get your record expunged if it wasn't a severe offense, you can become wealthy, you can move on and live a good life. A few decades ago we didn't even accept gay people as human, they were treated like dogshit. A few decades before, tens of millions of people were dying horrible in war, a few decades before we were proto human nigger monkeys. Things change.
>>106781795Every single political indication points to treating people on the Megan's Law EVEN WORSE, not better.We are getting more authoritarian, tyrannical, fascist, and dystopian, not less.
>leaks key on ram>most secure LOL, LMAO
>>106782033So does LUKS/dm-cryptYour passwords/keys are literally just sitting in RAM or TPM chip and can be physically extracted by attackersThe only actual secure place to keep encryption keys is inside the CPU like Pluton does, which can't be physically extracted even by glowniggersUnlike RAM and TPM cold boot attacks (taking the RAM out and reading it), DMA hotplug, or other physical sniffingSecure encryption relies on no device with the encryption keys being powered on when fascist glownigger pigs break into your house
>>106782104fTPM 2.0 don't leak to ram
>>106781330Holy shit this is such pedo cope. Also spending any time in prison as a sex offender is not good. You will get raped once other inmates find out, especially if it's for child exploitation.
>>106782118Doesn't need to be it's vulnerable to other physical hardware sniffing attacksThe reason Pluton/storing keys inside the CPU isn't because what the fuck are you going to do, de-lid the CPU while it's running and attach something to nanometer scale shit?
>>106782104Take your meds pedoOr neck yourself which is a better option
>>106781108never going to happen, you'll go to prison in the worst case scenario
>>106782134You can't sniff ftpm keys
>>106782002Progress isn't linear. Self-pity is self-destructive. Perception harbors immense power over the way people feel and behave, and think, and the way that you do these things determines the paths you take in life. Maybe you've taken a bad path, maybe you need to stop and re-evaluate. Maybe spamming self-pity 4chan posts isn't making you happy, or doing the world any good.
>>106781108>what would actually happen>some stupid faggot's imagination
>>106781108
If you're a criminal hiding stuff from the government on your computer you're already a lost cause. Especially if it's to the point where you feel they are surveilling you. There are countless other ways they can bust you. Stop being a pedophile. It's really simple, and if you live in a shithole like Iran that will execute you for opposing opinion then move to a better country.
>>106780971depends on your opsec, I would give up encryption keys to glowies but atleast when (not if, I life in europoor commiestan) jamal can't enjoy my neet collection of curated hentai and movies.also hidden volumes exist, are invisible and plausible deniability is a thing, just saying.
>>106782267Hidden volumes are a tricky thing. I'm no expert, but it seems to be a better idea to have a long-running system in extremely volatile memory, such that it could be destroyed in a millisecond without leaving any trace that there was such a system in the first place, would be a better idea in hostile countries. UK and Europe is funny and yeah yeah yeah muh data protection, but this can be a life or death thing for spies or whistleblowers like Edward Baseden; although he was doomed to be caught like many whistleblowers.
>>106781330you know you can just leave the country after 1 year... oh wait you're a mutt KEK
>>106782364>Hidden volumes are a tricky thingnot really, unless you have TBs of data to hide they're pretty effective.>I'm no expert, but it seems to be a better idea to have a long-running system in extremely volatile memory, such that it could be destroyed in a millisecond without leaving any trace that there was such a system in the first placebut you lose everything when the hardware fails or if the power is cut, the tradeoffs depend on your needs
>>106782267You really think they can't find a hidden volume?
>>106782235>There are countless other ways they can bust youName 7
>>106782453the theory looks pretty sound, bugs in software can always happen though, it's better to not store things you don't want the glowies to find and only store what you absolutely can't host elsewhere and even then you probably needs to have a rock solid opsec
>>106782438>not really, unless you have TBs of data to hide they're pretty effective.It's going to be obvious that you've got a hidden volume if not done at the OS level, because everybody knows about VeraCrypt and some blob of data conveniently sitting there never being touched is highly suspicious (exceeding the threshold) and will get you in trouble. In some places, just the fact that there's random looking data is enough to get you into trouble. Then you have to worry about physical forensic analysis, you're not safe just because you know about the basic wear leveling and TRIM operations, and blah blah blah. It's a minefield out there, I hope you trust VeraCrypt with your life. Again for you and me it's not that important, but for some it's a matter of life or death (folder containing insults and AI generated videos of monarchy, not that but see https://www.bbc.co.uk/news/world-asia-68020494).>but you lose everything when the hardware fails or if the power is cut, the tradeoffs depend on your needsIf you work for an agency, your data doesn't need to exist only locally if you have an internet connection. If you don't, then you can mitigate this by mirroring using more hardware, just make sure to legitimately use this hardware or it WILL be suspicious. I hope the tyrants in the world all drop dead. Imagine having your life flushed away by some rich prick who is buttmad at you making fun of him.
>>106782486raid your home while your pc is on and your likely jerking it to pedoshit.
I had a schizo moment a few months ago where I smashed every ssd I had. Disposed of old phones and laptops, smashed my current phone, smashed my external HDDs and bought new ones
why not use both at the same time?
>>106780853You're forced to give up all your passwords anyway so what's the point
>>106782537But don't they arrive in the morning
>go on vacation for 2 weeks>Come back to an empty house Whats the solution?
>>106782554I have this constant never going away feeling like this.
>>106781305you can trust leenox
>>106782609tannerite filled kentucky fried chicken, buy a bunch of expensive shit and leave your curtains open
>>106782621nvm tannerite won't work, needs to be more sensitive
>>106782525>exceeding the thresholdyou can override the hidden volume just fine, you'll lose it though and if I was part of glowies taht what I would do to every veracrypt volume just to fuck wit hte pedos that hide stuff here.>In some places, just the fact that there's random looking data is enough to get you into trouble.but that's the case for every storage devices, memset to 0 is too expensive to be done all the time.>Then you have to worry about physical forensic analysisthis is why you don't use hardware encryption, we know backdoors and debug modes exist taht make it worthless.>you're not safe just because you know about the basic wear leveling and TRIM operationsthis does not mean much, you could repurpose an old ssd, they can't know the disk entire life just by looking at smart data.>I hope you trust VeraCrypt with your lifeno because I don't have anything to hide from glowies, a "normal" volume hides my data from jamal and that's all that matter to me right now>but for some it's a matter of life or deathI would use micro sd hidden somewhere safe so they can't find the volume in the first place, that'sthe first line of defense.>If you don't, then you can mitigate this by mirroring using more hardwareyeah I'd rather host my things in a country hostile to 14 eyes countries, seems less an hassle.> Imagine having your life flushed away by some rich prick who is buttmad at you making fun of him.not your entire life need to be secure inside an hidden volume.I have all my data on encrypted drives and the most important stuff is inside a veracrypt container, I don't use hidden volumes right now, nothing get on the internet without an encryption pass first with cryptomator (can't upload big volumes so that's the next best thing)I don't really have anything to hide but privacy is a basic human right so...
>>106782611EVERYTHING in your cache can be recovered
>>106782609Are you Chris Watts?
>>106782104> What is AMD's full memory encryption?
>>106782233>The officer saw a huge bulge in the left sock. When confronted, Ding removed a piece of paper that he had surreptitiously ferreted from the opened safe.
>>106780853use case???
>>106782811thisintel too
>>106780971>sure here's the key>opens the volume for feds. Absolutely no way to tell there's another hidden volumeGet fucked.
>>106781108>okay here's the password stop hitting me>opens volume for feds with generic ass datalol get fucked
>>106782611>>106782554You are retarded.
Full disk encryption is just a industrial espionage counter measure, nothing more. VeraCrypt and frenchies have recently shown what will they do to your anus if you decide not to cooperate. Microsoft casually unlocks bitlock encrypted devices, Linux is compromised anyway. Intel/AMD processors will read your cache, their co processors will send data to the CIA hq through proxy if required.>>106782811And how does data magically appear on your screen? Reading RAM is a valid attack vector, as well as reading EMI from your screen.>>106785924>all the files have previous year modification dates>the hdd cache is filled with data that does not match any from the memory region you unlockeduh-oh, want to get into jail on CP charges, kid?
>>106785489Storing child porn.I live somewhere where it's not illegal to keep (but illegal to share). But even I have a use case in that my parents would freak the fuck out if they knew what I was keeping on my PC (which they have to use from time to time).
>>106786250There is no such place where it is legal to store (in other terms own) csam. And if so other agencies can still prosecute you if they want and local authorities cooperate. Doesn't matter you stupid ass location even if its dprk. If you don't actually live in a 3rd world country with no powerful agencies you might be on a list already. It's just a matter of time and resource by then.
>>106787776>There is no such place where it is legal to store (in other terms own) csam.In Russia and India it's legalThere's also many othersMost countries that aren't aligned with the USA don't make it illegal to simply (accidentally) possess or see illegal 1s and 0s.
>>106787983No theres not, even tho these countries might not actively ban it in their laws there is still the uncrc. In fact the US is the only country not to sign that international agreement.
>Have an encrypted drive>Want to format 2 other normal drives in a RAID because of old age>Phisically disconnect encrypted drive so I don't accidentaly fuck up>Disable the RAID, all goes well>Encrypted drive won't open anymoreI still don't know what the hell happened. Was the volume header somehow attached to the dynamic drive stuff?
>>106788019You know what's funny about "possession" laws?There's no way for you to prosecute them without committing the same exact crime.NCMEC and FBI are guilty of possessing massive amounts of cpwhenever they transfer it they're guilty of distributionThe American corporations are guilty of possessing it and distributing it tooWhy aren't everyone involved here in prison and on the sex offender registry for life? They broke the same exact law.Perhaps having laws where "click on wrong link and see illegal 1s and 0s online = life ruined" is fucking retarded?
>>106788043Devices can change /dev/sdX names when new devices are addedMaybe it's that, unless you're sure it's not or already using UUID for the RAID/mounts.
>>106788087Not sure if it applies. Its just an old windows pc that I use as a lab/backupI tried the tools/Restore volume header but i'm unsure if that's even the problem. Drive reports as healthy in crystaldisk
>>106787983>IndiaNo wonder there's been so much more CP on this site the past few years>>106788045>NCMEC and FBI are guilty of possessing massive amounts of cpPedo projection
>>106787776>And if so other agencies can still prosecute you if they want and local authorities cooperate. Uh, no they can't? If your crime is entirely confined within a country where it's legal, another country can't just come along and extradite you.You are retarded.
>>106782033The keys need to be stored somewhere to decrypt the data, genius. RAM is one of the safest places usually because it's temporary. TPM like objects are actually weaker since if they store the key it needs to be moved from TPM to CPU directly (to skip ram) and someone can probe the pins of the TPM to grab the key right from the circuitry if they have physical access. Physical access is endgame in ANY scenario.
>>106788045When you find out the police are allowed to shoot and imprison people you're going to go wild man
>>106786250>I live somewhere where it's not illegal to keep (but illegal to share).so russia?
Encryption actually working is a big factor in corporate secret keeping. They're very paranoid about their devices actually not being crackable since they know that some unnamed asian country would definitely rip the data out of a stolen laptop if they could. In any situation where the person or organization wishing to decrypt the information has legal leverage over the person who is able to, the story changes completely. For example, if unnamed country also kidnapped the owner of the laptop. Anti-coercion encryption is a really untapped field in my view.
>>106788741china can already crack any western encryption
You can completely demonise someone for having illegal ones and zeros. It's actually made effective. Insane how much access you get into someone's devices and data just by having suspicion. They're the easiest to sign up on
>>106788913You're extremely stupid.