Runescape Bits & Bytes
https://www.rsbandb.com/forums/

Is this *******?
https://www.rsbandb.com/forums/viewtopic.php?f=38&t=83035
Page 1 of 1

Author:  Ring [ April 8th, 2012, 9:57 am ]
Post subject:  Is this *******?

Cracking truecrypt?

http://www.lostpassword.com/hdd-decryption.htm



Steve Gibson said truecrypt is bulletproof, and I trust him more than these assholes.

Author:  Adbot [ April 8th, 2012, 9:57 am ]
Post subject:  Register and login to get these in-post ads to disappear


Author:  Pfkninenines [ April 8th, 2012, 12:00 pm ]
Post subject:  Re: Is this *******?

No, this is possible.

This doesn't "crack" anything, it simply extracts passwords from memory or hibernation files. They detail the process they go through, so read up before saying it's bull. They even talk about one of the security weaknesses of Firewire having direct memory access - a weakness shared by Thunderbolt. While it provides faster access, physical security is lowered as a result.

Steve Gibson has talked on numerous instances about extracting information from memory, and specifically citing a study that shows this is possible. The same goes for the hibernation and/or pagefile, as they too may have cached the password for the TrueCrypt volume.

However, the encryption itself is so far known and proven to be solid. It would take years (decades, millenia, etc) to brute force a complex password even on powerful super-computing clusters. But if the information for decrypting the data is already stored in a decrypted state, it becomes comparatively simple to extract the passwords, or potentially even parts of the decrypted data.

Page 1 of 1 All times are UTC - 7 hours
Powered by phpBB® Forum Software © phpBB Group
http://www.phpbb.com/