https://learn.equalit.ie/mw/index.php?title=Disk_Encryption/TrueCrypt&feed=atom&action=historyDisk Encryption/TrueCrypt - Revision history2024-03-29T10:41:04ZRevision history for this page on the wikiMediaWiki 1.23.1https://learn.equalit.ie/mw/index.php?title=Disk_Encryption/TrueCrypt&diff=590&oldid=prevGerard at 20:59, 18 July 20142014-07-18T20:59:07Z<p></p>
<table class='diff diff-contentalign-left'>
<col class='diff-marker' />
<col class='diff-content' />
<col class='diff-marker' />
<col class='diff-content' />
<tr style='vertical-align: top;'>
<td colspan='2' style="background-color: white; color:black; text-align: center;">← Older revision</td>
<td colspan='2' style="background-color: white; color:black; text-align: center;">Revision as of 20:59, 18 July 2014</td>
</tr><tr><td colspan="2" class="diff-lineno">Line 37:</td>
<td colspan="2" class="diff-lineno">Line 37:</td></tr>
<tr><td class='diff-marker'> </td><td style="background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;"><div>'''Trainer's notes: '''Make sure to explain the difference between the software and the volume file - you need one to access the other with. Emphasise that when dismounted, the file can easily be deleted.</div></td><td class='diff-marker'> </td><td style="background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;"><div>'''Trainer's notes: '''Make sure to explain the difference between the software and the volume file - you need one to access the other with. Emphasise that when dismounted, the file can easily be deleted.</div></td></tr>
<tr><td class='diff-marker'> </td><td style="background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;"></td><td class='diff-marker'> </td><td style="background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;"></td></tr>
<tr><td class='diff-marker'>−</td><td style="color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>'''Editorial note: '''In May of 2014 the TrueCrypt website announced the project was ceasing development following the <del class="diffchange diffchange-inline">discovered </del>of a serious security vulnerability in the code. Users were recommended to find an alternative solution. However since that time, an independent, open source project to audit the software has been undertaken <del class="diffchange diffchange-inline">[https://opencryptoaudit.org/.] </del>and the <del class="diffchange diffchange-inline">subsequent review of this audit </del>[https://wiki.ciphershed.org/Audit] concludes:</div></td><td class='diff-marker'>+</td><td style="color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>'''Editorial note: '''In May of 2014 the <ins class="diffchange diffchange-inline">[http://truecrypt.sourceforge.net/ </ins>TrueCrypt website<ins class="diffchange diffchange-inline">] </ins>announced the project was ceasing development following the <ins class="diffchange diffchange-inline">discovery </ins>of a serious security vulnerability in the code. Users were recommended to find an alternative solution. However since that time, an <ins class="diffchange diffchange-inline">[https://opencryptoaudit.org/ </ins>independent, open source project<ins class="diffchange diffchange-inline">] </ins>to audit the software has been undertaken <ins class="diffchange diffchange-inline"> </ins>and the [https://wiki.ciphershed.org/Audit <ins class="diffchange diffchange-inline">subsequent review</ins>] <ins class="diffchange diffchange-inline">of this audit  </ins>concludes:</div></td></tr>
<tr><td class='diff-marker'> </td><td style="background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;"></td><td class='diff-marker'> </td><td style="background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;"></td></tr>
<tr><td class='diff-marker'> </td><td style="background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;"><div>"The remaining issues are less severe, but still important enough to at least do the "short term fix" in Phase 1. They are issues like integer overflows and errors in the kernel driver checking file permissions and names. They are real security holes, but assuming there is only one user on the machine and no malware to exploit the holes (big IF), then they should not cause problems.</div></td><td class='diff-marker'> </td><td style="background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;"><div>"The remaining issues are less severe, but still important enough to at least do the "short term fix" in Phase 1. They are issues like integer overflows and errors in the kernel driver checking file permissions and names. They are real security holes, but assuming there is only one user on the machine and no malware to exploit the holes (big IF), then they should not cause problems.</div></td></tr>
<tr><td class='diff-marker'> </td><td style="background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;"></td><td class='diff-marker'> </td><td style="background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;"></td></tr>
<tr><td class='diff-marker'> </td><td style="background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;"><div>After reading this audit, we would recommend that TrueCrypt 7.1a remains safe for use"</div></td><td class='diff-marker'> </td><td style="background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;"><div>After reading this audit, we would recommend that TrueCrypt 7.1a remains safe for use"</div></td></tr>
</table>Gerardhttps://learn.equalit.ie/mw/index.php?title=Disk_Encryption/TrueCrypt&diff=589&oldid=prevGerard at 20:54, 18 July 20142014-07-18T20:54:21Z<p></p>
<table class='diff diff-contentalign-left'>
<col class='diff-marker' />
<col class='diff-content' />
<col class='diff-marker' />
<col class='diff-content' />
<tr style='vertical-align: top;'>
<td colspan='2' style="background-color: white; color:black; text-align: center;">← Older revision</td>
<td colspan='2' style="background-color: white; color:black; text-align: center;">Revision as of 20:54, 18 July 2014</td>
</tr><tr><td colspan="2" class="diff-lineno">Line 35:</td>
<td colspan="2" class="diff-lineno">Line 35:</td></tr>
<tr><td class='diff-marker'> </td><td style="background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;"><div># Organise a competition where participants swap USB memory sticks and try to guess which file is the one containing the Truecrypt volume.</div></td><td class='diff-marker'> </td><td style="background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;"><div># Organise a competition where participants swap USB memory sticks and try to guess which file is the one containing the Truecrypt volume.</div></td></tr>
<tr><td class='diff-marker'> </td><td style="background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;"></td><td class='diff-marker'> </td><td style="background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;"></td></tr>
<tr><td class='diff-marker'>−</td><td style="color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>'''Trainer's notes: '''Make sure to explain the difference between the <del class="diffchange diffchange-inline">softwareand </del>the volume file - you need one to access the other with. Emphasise that when dismounted, the file can easily be deleted.</div></td><td class='diff-marker'>+</td><td style="color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>'''Trainer's notes: '''Make sure to explain the difference between the <ins class="diffchange diffchange-inline">software and </ins>the volume file - you need one to access the other with. Emphasise that when dismounted, the file can easily be deleted.</div></td></tr>
<tr><td colspan="2"> </td><td class='diff-marker'>+</td><td style="color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div> </div></td></tr>
<tr><td colspan="2"> </td><td class='diff-marker'>+</td><td style="color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div><ins class="diffchange diffchange-inline">'''Editorial note: '''In May of 2014 the TrueCrypt website announced the project was ceasing development following the discovered of a serious security vulnerability in the code. Users were recommended to find an alternative solution. However since that time, an independent, open source project to audit the software has been undertaken [https://opencryptoaudit.org/.] and the subsequent review of this audit [https://wiki.ciphershed.org/Audit] concludes:</ins></div></td></tr>
<tr><td colspan="2"> </td><td class='diff-marker'>+</td><td style="color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div> </div></td></tr>
<tr><td colspan="2"> </td><td class='diff-marker'>+</td><td style="color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div><ins class="diffchange diffchange-inline">"The remaining issues are less severe, but still important enough to at least do the "short term fix" in Phase 1. They are issues like integer overflows and errors in the kernel driver checking file permissions and names. They are real security holes, but assuming there is only one user on the machine and no malware to exploit the holes (big IF), then they should not cause problems.</ins></div></td></tr>
<tr><td colspan="2"> </td><td class='diff-marker'>+</td><td style="color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div> </div></td></tr>
<tr><td colspan="2"> </td><td class='diff-marker'>+</td><td style="color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div><ins class="diffchange diffchange-inline">After reading this audit, we would recommend that TrueCrypt 7.1a remains safe for use"</ins></div></td></tr>
</table>Gerardhttps://learn.equalit.ie/mw/index.php?title=Disk_Encryption/TrueCrypt&diff=41&oldid=prevDmitri: 1 revision2013-08-06T17:18:20Z<p>1 revision</p>
<table class='diff diff-contentalign-left'>
<tr style='vertical-align: top;'>
<td colspan='1' style="background-color: white; color:black; text-align: center;">← Older revision</td>
<td colspan='1' style="background-color: white; color:black; text-align: center;">Revision as of 17:18, 6 August 2013</td>
</tr><tr><td colspan='2' style='text-align: center;'><div class="mw-diff-empty">(No difference)</div>
</td></tr></table>Dmitrihttps://learn.equalit.ie/mw/index.php?title=Disk_Encryption/TrueCrypt&diff=40&oldid=prevDavidM: 1 revision2013-02-07T21:26:06Z<p>1 revision</p>
<p><b>New page</b></p><div>{{Section<br />
|Title=TrueCrypt<br />
|Type=Lesson<br />
|Position=4/2<br />
|Section of=Disk Encryption<br />
|Lang=En<br />
|Goal=<br />
|Dependencies=<br />
|Technical requirements=<br />
|Minimum time=60<br />
|Maximum time=90<br />
|Difficulty=<br />
|Minimum time=60<br />
|Maximum time=90<br />
}}<br />
=== Installation ===<br />
TrueCrypt: Install on computer. Re-launch the package file and Extract the files to a USB stick to create a 'traveller disk'. Explain the difference between using an installed and portable version. Open the software folder and upload the necessary localisation.<br />
<br />
'''Trainer's notes: ''' Localisations depend on the Windows ability to handle the language locale. Both installations requires admin privileges on Windows.<br />
<br />
=== Creating a volume ===<br />
Follow the hands-on guides to create an encrypted volume. Explain the options for selecting the location to store the volume file. Explain obfuscation possibilities for the file extension (Truecrypt only). Mount and dismount the volume. <br />
<br />
'''Trainer's notes: '''For ease of session, a 100 MB volume size is recommended. Don't get stuck on explaining algorithms and the random number generator. For Truecrypt, draw up a list of common large file extensions, e.g. .mp3, .mpeg, .avi, .iso and so on. Encourage people to use KeePass to create a strong password.<br />
<br />
=== Exercises ===<br />
# Ask the participants to create a document and to save it inside the encrypted volume.<br />
# Create a backup of the dismounted volume (file) on the USB memory disk. <br />
# Change computers and ask participants to open the newly created document. <br />
# Rename the Volume file. Change its extension. <br />
<br />
<br />
# Create a new volume (any size) <br />
# Rename the volume file<br />
# Organise a competition where participants swap USB memory sticks and try to guess which file is the one containing the Truecrypt volume.<br />
<br />
'''Trainer's notes: '''Make sure to explain the difference between the softwareand the volume file - you need one to access the other with. Emphasise that when dismounted, the file can easily be deleted.</div>DavidM