T60 & Truecrypt
T60 & Truecrypt
Hi,
Has anyone installed Truecrypt with full system drive encryption on their T60?
I have a T60 with pretty much all of the IBM/Lenovo software installed (via System Update).
- Fingerprint software applied for bootup and login
- ThinkVantage button enabled on bootup to access hidden partition
Have any of these caused any problems or am I safe to proceed?
Thanks!
Has anyone installed Truecrypt with full system drive encryption on their T60?
I have a T60 with pretty much all of the IBM/Lenovo software installed (via System Update).
- Fingerprint software applied for bootup and login
- ThinkVantage button enabled on bootup to access hidden partition
Have any of these caused any problems or am I safe to proceed?
Thanks!
I haven't tried it yet, however, from reviewing the Truecrypt user guide, I came away with the impression that the TC's boot loader would kick in after the hardware stuff and before windows boots.
HP DV8t | Intel i7-Q 720 | 6GB (DDR3 1333) RAM | 1 TB (500GB Seagate 7200 rpm x2)| GeForce GT 230M (1GB) | 18.4" FHD | SuperMulti 8X w Lightscribe | FP Reader | Bluetooth | HDTV Tuner | Win 7 Ultimate x64. Backup: T61p (8891-CTO)
FYI TrueCrypt is totally FREE, and does a heck of a lot more in the security department than 7zip.
HP DV8t | Intel i7-Q 720 | 6GB (DDR3 1333) RAM | 1 TB (500GB Seagate 7200 rpm x2)| GeForce GT 230M (1GB) | 18.4" FHD | SuperMulti 8X w Lightscribe | FP Reader | Bluetooth | HDTV Tuner | Win 7 Ultimate x64. Backup: T61p (8891-CTO)
i do understand it is opensource and automatic.
but it is subject to cold boot attacks. which easily defeats the scheme.
http://en.wikipedia.org/wiki/TrueCrypt
7zip with 256 aes is on demand, which only encrypts the file he needs, and if you use passphrases, it will probably be your best bet,
do undestand that nothing is absolute secure. it is all about how badly someone wants your files. nsa probably already cracked aes.
but it is subject to cold boot attacks. which easily defeats the scheme.
http://en.wikipedia.org/wiki/TrueCrypt
7zip with 256 aes is on demand, which only encrypts the file he needs, and if you use passphrases, it will probably be your best bet,
do undestand that nothing is absolute secure. it is all about how badly someone wants your files. nsa probably already cracked aes.
Thinkpad T60 2613-HDU
1.66 Core 2 2gb x1400-128 Fujitsu 60 14" sxga Chicony TP a/b/g BT
Thinkpad T42 2373-N1U
1.8 p-m 2gb 9600-64 Fujitsu 80 LG 15" Flexview Chicony TP a/b/g BT
1.66 Core 2 2gb x1400-128 Fujitsu 60 14" sxga Chicony TP a/b/g BT
Thinkpad T42 2373-N1U
1.8 p-m 2gb 9600-64 Fujitsu 80 LG 15" Flexview Chicony TP a/b/g BT
I was aware of the cold boot vulnerability due to recent tech news reports on it. Nevertheless, I don't agree that the scheme is defeated "easily." From what I understand, a "cold boot" attack is not something just anyone can do. And even if one is concerned about a technically sophisticated attacker who might have the ability to exploit that particular vulnerability, all one has to do is use a TrueCrypt container for particularly sensitive material (in addition to or rather than encrypting the entire system) and 5 minutes after it's been dismounted, that kind of attack won't work, if I'm understanding how it works correctly. And even on an encrypted system volume, there is only a 5 minute window of vulnerability after shut down, so long as the system is not placed on standby.
So for me personally, that means I will continue to use a TrueCrypt container for any very confidential material even if I decide to use TrueCrypt to encrypt the entire system volume and when I am particularly concerned about the security of my system, for example, when I'm traveling, I won't be using standby as much.
So while it is important to be aware of that particular vulnerability, I really don't think it is that big of a deal, as there are simple ways to protect against it and therefore I don't think it is a valid reason to abandon TrueCrypt. Jmo.
From the above referenced Wikepedia article:
"Truecrypt, alongside with all other programs tested by Princeton University, is susceptible to cold boot attacks. These allow the encryption/decryption keys (used to secure data) to be determined without the password, by reading this information directly from memory after rebooting the computer[4]
However, preventing physical access to the DRAM memory during ~5 minutes after shutdown or hibernation will prevent this attack, assuming you hibernate to an encrypted volume. On the other hand, 'sleeping' the computer leaves the memory accessible and thus vulnerable[5].
It should be noted that when properly dismounting a TrueCrypt volume, it securely erases[6] the master keys to the volume. This prevents an attacker from gaining access to the master keys if the encrypted volume has been properly dismounted. The cold boot attack is only used if the machine has a mounted TrueCrypt volume currently accessible, and the machine itself is unsecured. [7]"
So for me personally, that means I will continue to use a TrueCrypt container for any very confidential material even if I decide to use TrueCrypt to encrypt the entire system volume and when I am particularly concerned about the security of my system, for example, when I'm traveling, I won't be using standby as much.
So while it is important to be aware of that particular vulnerability, I really don't think it is that big of a deal, as there are simple ways to protect against it and therefore I don't think it is a valid reason to abandon TrueCrypt. Jmo.
From the above referenced Wikepedia article:
"Truecrypt, alongside with all other programs tested by Princeton University, is susceptible to cold boot attacks. These allow the encryption/decryption keys (used to secure data) to be determined without the password, by reading this information directly from memory after rebooting the computer[4]
However, preventing physical access to the DRAM memory during ~5 minutes after shutdown or hibernation will prevent this attack, assuming you hibernate to an encrypted volume. On the other hand, 'sleeping' the computer leaves the memory accessible and thus vulnerable[5].
It should be noted that when properly dismounting a TrueCrypt volume, it securely erases[6] the master keys to the volume. This prevents an attacker from gaining access to the master keys if the encrypted volume has been properly dismounted. The cold boot attack is only used if the machine has a mounted TrueCrypt volume currently accessible, and the machine itself is unsecured. [7]"
HP DV8t | Intel i7-Q 720 | 6GB (DDR3 1333) RAM | 1 TB (500GB Seagate 7200 rpm x2)| GeForce GT 230M (1GB) | 18.4" FHD | SuperMulti 8X w Lightscribe | FP Reader | Bluetooth | HDTV Tuner | Win 7 Ultimate x64. Backup: T61p (8891-CTO)
-
- Similar Topics
- Replies
- Views
- Last post
-
-
Intel GMA 950 T60 15" vs x1300 T60 15"
by Sokre2000 » Sun Feb 05, 2017 2:27 pm » in ThinkPad T6x Series - 4 Replies
- 986 Views
-
Last post by dr_st
Mon Feb 06, 2017 12:11 am
-
-
-
Can I simply swap out my T5500 CPU in my 1953CTO T60 with a T5600? Or my T2400 core duo in my 2623D6U T60?
by Muse » Mon Apr 24, 2017 12:37 pm » in ThinkPad T6x Series - 4 Replies
- 681 Views
-
Last post by Muse
Mon Apr 24, 2017 7:22 pm
-
-
-
FS T60 - $100 + shipping
by moosport2 » Thu Dec 29, 2016 11:50 am » in Marketplace - Forum Members only - 5 Replies
- 702 Views
-
Last post by paul d
Mon Jan 23, 2017 1:43 pm
-
-
- 3 Replies
- 1301 Views
-
Last post by Muse
Mon Jan 02, 2017 5:47 pm
Who is online
Users browsing this forum: No registered users and 26 guests




