[cryptome] Re: TrueCrypt compromised

  • From: Shaun O'Connor <capricorn8159@xxxxxxxxx>
  • To: cryptome@xxxxxxxxxxxxx
  • Date: Tue, 03 Jun 2014 09:50:20 +0100

I take your point about the encryption dilemma(did I spell that
correctly). I think the Jury is out on that particular issue though...

Personally I think we are in a perpetual game of cat and mouse with
those who make it their business to know everything about everyone..
On 02/06/2014 18:52, In Harms Way wrote:
> Well, Shaun, that's known, but what is wanted is still an answer to
> the question which encryption program to use (we understand that
> truecrypt cam under pressure from TPTB and played the canary song.
>
> Also in 3 here it is compulsory to have
> 3) have full disk encryption by default.
>
> Question is how, in a reliable way.?
>
> Shaun O'Connor wrote, On 02/06/2014 10:24:
>> Tor a computer to be truly air gapped the following conditions must
>> be satisfied.
>> 1) the computer must at no time have been connected to the internet.
>> 2) be devoid of any means of wirelessly connecting to the internet.
>> 3) have full disk encryption by default.
>> 4) be devoid of any monitoring capability( no microphone , no built
>> in camera.
>> remember blue tooth is vulnerable so it should not be present either.).
>> However , since the air gap methodology is now widely known computer
>> manufacturers are likely to be put under pressure to"net test" their
>> products prior to dispatch.
>> in other words, learn to build a computer from scratch or find
>> someone who can.. ideally someone you can trust implicitly.
>>
>> I think that satisfies the question as to what an airgappe computer is..
>>
>> On 02/06/2014 06:45, In Harms Way wrote:
>>> Please, Ryan Carboni, kindly explain, what you mean by "Airgap
>>> encryption".
>>>
>>> Airgap as method to keep certain data on computers safe by keeping
>>> them off the net *is broken;*
>>> <http://www.slate.com/blogs/future_tense/2013/12/03/researchers_michael_hanspach_michael_goetz_prove_malware_can_jump_air_gap.html>
>>>
>>> the "airgap browser" is not (yet?) available for consumers and an
>>> encryption algorithm called "airgap" is not existing to my knowledge.
>>>
>>> Did I miss something?
>>>
>>> Ryan Carboni wrote, On 31/05/2014 11:17:
>>>> Airgap encryption.
>>>>
>>>>
>>>> On Fri, May 30, 2014 at 11:13 PM, In Harms Way
>>>> <11414150173@xxxxxxxxxx <mailto:11414150173@xxxxxxxxxx>> wrote:
>>>>
>>>>
>>>>     Now serious: Which open-source programme for
>>>>     container-encryption of all files and disks the professionals
>>>>     like medical doctors, lawyers, priests et. al. still can use to
>>>>     fulfil their legal obligation to store patient or client data
>>>>     100% secure ????
>>>>
>>>>     To my understanding PGP encryption with UCE (only user has the
>>>>     private key - private key not grabbed by any webmail etc.) for
>>>>     e-mails (e.g. via Thunderbird and enigmail) is still not broken
>>>>     (if user disabled hibernation on his/her machine to avert
>>>>     pass-phrase stealing from the hibernation dump).
>>>>
>>>>     But which other truecrypt-like open-source programme still
>>>>     stands strong for file/disk-encryption.?
>>>>
>>>>     Any suggestions?
>>>>
>>>>     Shaun O'Connor wrote, On 30/05/2014 12:06:
>>>>>     got to agree on that point and tails 1.0 was only released
>>>>>     recently too!!
>>>>>     On 30/05/2014 00:14, tpb-crypto@xxxxxxxxxxx
>>>>>     <mailto:tpb-crypto@xxxxxxxxxxx> wrote:
>>>>>>>     Message du 29/05/14 19:49
>>>>>>>     De : "Jean-Philippe Décarie-Mathieu" 
>>>>>>>
>>>>>>>     Oh, I'm nowhere near giving up. I'm aware of the alternatives; it's 
>>>>>>> just
>>>>>>>     that this whole TC story is obscure as hell. Still no words from the
>>>>>>>     developer(s)... It's gotta suck for Tails and other projects that 
>>>>>>> have
>>>>>>>     integrated TC also.
>>>>>>>
>>>>>>     Other projects will not be affected. That's the nature of open 
>>>>>> source, you close a door, a window opens.
>>>>>>
>>>>>>     Those interested will keep truecrypt alive, it just takes interest.
>>>>>>
>>>>>>     .
>>>>>>
>>>>>
>>>>>     -- 
>>>>>     https://www.resetthenet.org/ *On June 5 2014, this email
>>>>>     addrfess will NOT be accepting any mails....are you in?*
>>>>
>>>>
>>>>     -- 
>>>>     We have nothing to hide, but something to protect: 
>>>>     LIBERTY, PRIVACY & FREEDOM
>>>>     - and the people, whose human rights these are.
>>>>
>>>>
>>>
>>>
>>> -- 
>>> We have nothing to hide, but something to protect: 
>>> LIBERTY, PRIVACY & FREEDOM
>>> - and the people, whose human rights these are.
>>
>> -- 
>> https://www.resetthenet.org/ *On June 5 2014, this email addrfess
>> will NOT be accepting any mails....are you in?*
>
>
> -- 
> We have nothing to hide, but something to protect: 
> LIBERTY, PRIVACY & FREEDOM
> - and the people, whose human rights these are.

-- 
https://www.resetthenet.org/ *On June 5 2014, this email addrfess will
NOT be accepting any mails....are you in?*

Other related posts: