Is it truecrypt already portable?
Under the Traveller Mode in The User Guide.pdf section it says that "after examining the registry file, it may be possible to tell that TrueCrypt was run on a Windows system even if it is run in traveller mode" (not sure if I should use it).
('.')?? Hey John, is your write-up on truecrypt set to be released soon?
It is portable... it just leaves a trace behind that it was run. By default, Portable Firefox does this as well on a system without FF installed locally (specifically, it leaves behing a pluginregistry of the locally-installed plugins like Quicktime, etc) That doesn't mean any personal data is left behind, of course.
I'm getting to the write-up. I'm just a bit swamped at the moment.
Sometimes, the impossible can become possible, if you're awesome!
If Truecrypt leaves tracks then they can be found and erased.
Is it possible a tool that found and erased those tracks could be created. Either that or the truecrypt could be patched so that is erased those tracks after unmounting a drive.
True crypt is only portable where you have access to an administator priveleged login.
Unless a "truecrypt browser" version in existance or in the works that would allow you to view and extract files from the container or partition?
Jestre
Don't kick the monster!
Program a robot to smash it, Shoot it, Spear it or even Throw something at it (preferably a grenade), but NEVER kick the monster!
NOTE: does not apply to BLACK BELTS.
Movie Wisdom: Don't kick the monster!
Build mechanized armored assault suit to annihilate it, program robots to smash it, Shoot, Spear or even Throw something at it (preferably a grenade), but NEVER kick the monster!
NOTE: Doesn't apply to Black Belts
Yes, it does require admin privs, which is quite unfortunate... as it isn't as portable.
A tool could be created. I haven't gotten around to it yet. But it isn't that big a deal for most people. It's no personal data or passwords, etc. It's just a couple keys that indicate TrueCrypt was run.
Regards,
John
Sometimes, the impossible can become possible, if you're awesome!
Is this true that using TC increases wear on the flash drive because of encryption?
And are all the settings portable?
Is the tutorial on http://juand.ca/?page_id=3 ok for flash drives (even without the batch files)?
-
There are only 10 types of people in the world: Those who understand binary, and those who don't. - Anonymous
Sorry to speak out of line, but TC uses a transparent encryption driver to mount the encrypted volume, so at least it won't be rewriting to encrypt any files in the volume. At least that is my understanding. instead of encrypting the files that are already on the disk, it encrypts and decrypts in ram, and only reads/writes encrypted information to the flash memory. There isn't an additional write for encryption. I hope this makes sense (as an american, I don't speak english).
I have tried this tutorial, just recently, and have had no ill effects. It uses autorun.inf with interesting results. The batch files from the tutorial you mentioned are handy on systems where autorun is disabled.
Thanks for the reply and the link to the tutorial!
-
There are only 10 types of people in the world: Those who understand binary, and those who don't. - Anonymous
Just saw this follow-up post at the above blog, seems Remora is smaller & just as effective an encrypter as TrueCrypt, but doesn't require admin access : http://www.richskills.com/products/7/freeversion.asp
Other cool portable apps at this website.
Perhaps this is the answer to my unanswered post 'Security' in the requested apps forum...
What about it John? And how's the Linux version of the Portable Apps suite coming?
--
macadavy