Jump to content

Storing A LOT on email


gawguy

Recommended Posts

One of Gawguy's questions hasn't been dealt with--i.e. if he has some large files around (they're easy to find) that seem to have no purpose, people will be suspicious.

 

He's right. One possible way to avoid this is use the *hidden volume* option of Truecrypt. This adds 'plausible deniability'--the stuff you're really interested in keeping secret is hidden in a secret volume contained within the main volume. This secret volume requires a different password for access.

Link to comment
Share on other sites

  • Replies 25
  • Created
  • Last Reply
While tc might not be crackable, I'd still feel better if there weren't 10 - 30 gb files on the drive causing those little hackers to wonder, "What is Uncle GG hiding?"

TC doesn't use/need a specific file extension to be open-able by TC. So name the container file something that could be program with a .exe or .dll extension in the logical location for a file of that type (e.g., %root%/Common Files//.dll).

 

The best place to hide something is in plain sight.

 

You seem very paranoid for just a few financials or whatever. But hey, not my business, just an advice offer.

 

PS, another good way to make strong passwords is to use the first letter of a sentence (maybe from a saying, or speech, or song, or Bible passage, or joke, or pull sentences from a book on your book shelf), but the source should familiar enough to you that you can easily remember it. I like to throw a special character in at the first or last to make it even stronger. Numbers are good too, but this sample quote lended itself to that. Using this rule, something like 47yaofbfotcannciL# would literally be an uncrackable password, unless you are the NSA or MI5 or something with resources like that.

 

It is of course derived from the first few words of the Gettysburg Address (Four score and seven years ago our fathers brought forth on this continent, a new nation, conceived in Liberty...).

Link to comment
Share on other sites

One of Gawguy's questions hasn't been dealt with--i.e. if he has some large files around (they're easy to find) that seem to have no purpose, people will be suspicious.

 

He's right. One possible way to avoid this is use the *hidden volume* option of Truecrypt. This adds 'plausible deniability'--the stuff you're really interested in keeping secret is hidden in a secret volume contained within the main volume. This secret volume requires a different password for access.

 

In my experience and understanding the hidden volume inside another volume leaves you open to making a mistake working with the two volumes and you can easily damage the "outer" container by putting a little too much in it besides your hidden container and then you lose the data inside the "hidden volume." You still have a huge file or unaccounted-for hd space to attract attention. The plausible deniability stuff has to do with being challenged in person by a thief or authorities and that's not my concern.

 

Ever since I stopped using the "hidden volume" option with tc I've been a lot more confident.

 

GG

Link to comment
Share on other sites

TC doesn't use/need a specific file extension to be open-able by TC. So name the container file something that could be program with a .exe or .dll extension in the logical location for a file of that type (e.g., %root%/Common Files//.dll).

 

The best place to hide something is in plain sight.

 

It will be obvious to anyone with any experience that large files are suspicious. A simple, quick search of the computer for large files will turn them up--a 10 GB .exe will be *very* suspicious, I've certainly never come across one. A simple double click on the file with nothing happening as a result would confirm the suspicion. Similarly, the biggest .dll in my computer right now is 35 MB. Having a large one would be very suspicious.

 

About passwords--I use Password Safe. It generates and saves large passwords for you (you have to learn how to use it, of course) and all you have to remember is a single password for the program itself. It's open source and extremely useful in my opinion.

 

http://passwordsafe.sourceforge.net/

 

 

Link to comment
Share on other sites

You still have a huge file or unaccounted-for hd space to attract attention. The plausible deniability stuff has to do with being challenged in person by a thief or authorities and that's not my concern.

 

I agree to a certain extent--however, consider this scenario.

 

You make a 20 gig volume with a very weak password, with an 18 gig hidden volume inside, the hidden volume having a very strong password. Then you place some mildly embarrassing stuff in the outer volume (a bunch of nudie photos or something like that), and just never touch that volume again. If someone tries to crack the volume, they will hit the weak password much earlier than the strong one, and they'll think they have found your secret porn stash.

 

It's all rather moot, though. For your purposes, a simple volume with a strong password will be more than sufficient.

 

Link to comment
Share on other sites

 

You seem very paranoid for just a few financials or whatever. But hey, not my business, just an advice offer.

 

First, the financials are more than just a few.

 

Second, this is kind of a mission. About a month ago I decided I wanted better security for everything and went about getting it. For one thing I have a very committed long-term life partner and I most strongly prefer that if anything were to happen to me she not see things that would hurt her. She's very curious. That might happen through her technically trained sons who would likely receive my computers from her. Therefore these files are coming off of the drives on my computers.

 

I had the plan in process and you fellows have helped me refine it.

 

Thanks,

GG

Link to comment
Share on other sites

About passwords--I use Password Safe. It generates and saves large passwords for you (you have to learn how to use it, of course) and all you have to remember is a single password for the program itself. It's open source and extremely useful in my opinion.

 

http://passwordsafe.sourceforge.net/

 

 

Is the "master password" feature on Firefox similar to this, and if so what are the advantages / disadvantages?

 

GG

 

Link to comment
Share on other sites

I regard to passwords, I use

Passpack.com

 

Passwords are stored online - and can be stored offline as well. Online they are secured with two passwords: Access to your online account and than secured with a the pw for to access to the container with the passwords (which means that neither the provider nor a hacker will get access to the data).

 

 

Link to comment
Share on other sites

Archived

This topic is now archived and is closed to further replies.


×
×
  • Create New...