Comments on: Creating Encrypted USB Drives with TrueCrypt http://www.terminally-incoherent.com/blog/2008/03/14/creating-encrypted-usb-drives-with-truecrypt/ I will not fix your computer. Tue, 04 Aug 2020 22:34:33 +0000 hourly 1 https://wordpress.org/?v=4.7.26 By: Luke Maciak http://www.terminally-incoherent.com/blog/2008/03/14/creating-encrypted-usb-drives-with-truecrypt/#comment-11951 Thu, 09 Apr 2009 13:43:05 +0000 http://www.terminally-incoherent.com/blog/2008/03/14/creating-encrypted-usb-drives-with-truecrypt/#comment-11951

@Rich: Yeah, that’s precisely what it is. Only it’s not a TC volume but a TC encrypted file.

It works like this – your disk in unencrypted and it contains two things:

1. an encrypted data file that fills 98-99% of the space on the drive
2. TC binaries + autorun config files

When you plug it in, Windows will mount it pop up the usual message asking you what you want to do – you know, open in explorer, import images, etc… Only because of the autorun file, the top option is now “Mount TrueCrypt Volume”.

You hit that and it runs the TC binary (included on the drive) which mounts the encrypted file as a regular volume on your system.

Yes, from best practices standpoint it would probably be better to encrypt the whole drive. But then it would be impossible to mount it without TC already installed. This way you take TC with you wherever you go and you can use your encrypted media on any computer.

Also, this is actually the preferred method of doing USB media encryption in the industry. We use expensive commercial PointSec disk encryption software at work and it does the same exact thing. It puts some binaries and an encrypted file on the drive.

Reply  |  Quote
]]>
By: Rich http://www.terminally-incoherent.com/blog/2008/03/14/creating-encrypted-usb-drives-with-truecrypt/#comment-11949 Thu, 09 Apr 2009 09:59:29 +0000 http://www.terminally-incoherent.com/blog/2008/03/14/creating-encrypted-usb-drives-with-truecrypt/#comment-11949

Unless I’m being dim, it looks like this method requires a TC volume on the portable disk, rather than being able to automagically mount a disk which has been completely TC’d. Best practice might mean have an encrypted & an unencrypted volume on the portable disk then?

Reply  |  Quote
]]>
By: le http://www.terminally-incoherent.com/blog/2008/03/14/creating-encrypted-usb-drives-with-truecrypt/#comment-9978 Wed, 27 Aug 2008 21:20:48 +0000 http://www.terminally-incoherent.com/blog/2008/03/14/creating-encrypted-usb-drives-with-truecrypt/#comment-9978

Experience the write protection problem?

As you describe above, unmounting TC files by removing the stick causes trouble. I got some. Vista chrashed, the container was dismounted and .. is now perfectly write protected.

It seems to be no fuqqing way to get the write protection flag off the volume.
I tried to change attributes (write protection = off .. and so on). I also changed the access rights to ensure anybody could change anything. Just to avoid any kind of a problem setting the write protection = off.

So did anybody experience the same problem with a perfectly write protected volume and knows how to remove it?

THX for reading this :)

Reply  |  Quote
]]>
By: Patrik Koppanen http://www.terminally-incoherent.com/blog/2008/03/14/creating-encrypted-usb-drives-with-truecrypt/#comment-9617 Wed, 16 Jul 2008 16:34:14 +0000 http://www.terminally-incoherent.com/blog/2008/03/14/creating-encrypted-usb-drives-with-truecrypt/#comment-9617

Please note the reason for Disk Encryption (Note, not file encryption which is different), either on harddisk or on external USB based drives is to proctect the data if lost or stolen (This is what the industry calls Data Secured At Rest). As soon as a drive is opened up the data is available to the end user and any potential virus attacks. To make sure data is not attacked when the drive is decrypted (opened) is to make sure the files themself are encrypted as well, individually.

Basically, use the drive encryption to protect the complete drive and then encrypt required files that requires further protection.

Reply  |  Quote
]]>
By: Intime http://www.terminally-incoherent.com/blog/2008/03/14/creating-encrypted-usb-drives-with-truecrypt/#comment-9600 Sun, 13 Jul 2008 19:42:59 +0000 http://www.terminally-incoherent.com/blog/2008/03/14/creating-encrypted-usb-drives-with-truecrypt/#comment-9600

I think his point was, that if you use an ext3 file system and only the static file manager can access it, the virus can’t get in the container. but problem is, either the file manager has to be installed on the machine you use the stick (while the file manager could get infected as well), or you put it in the unencrypted part of the volume and write-protect it.
The only solution would be file manager on unencrypted part, which is somehow write protected (would probably have to be hardware based). then you would lose easy operation via windows drag & drop, but theres no direct access to volume (without file manager) and so no way for the virus.

Reply  |  Quote
]]>
By: Luke Maciak http://www.terminally-incoherent.com/blog/2008/03/14/creating-encrypted-usb-drives-with-truecrypt/#comment-8537 Tue, 18 Mar 2008 02:54:10 +0000 http://www.terminally-incoherent.com/blog/2008/03/14/creating-encrypted-usb-drives-with-truecrypt/#comment-8537

I think Fr3d’s point was that if you format it as ext3 Windows won’t be able to access it without special drivers – and thus no threat of getting infected. Of course you also won’t be able to access your files on a susceptible windows machine :P

Also I linked to the windows ext3 driver above – once you install it, you can get infected normally. ;)

Reply  |  Quote
]]>
By: vacri http://www.terminally-incoherent.com/blog/2008/03/14/creating-encrypted-usb-drives-with-truecrypt/#comment-8536 Tue, 18 Mar 2008 02:30:08 +0000 http://www.terminally-incoherent.com/blog/2008/03/14/creating-encrypted-usb-drives-with-truecrypt/#comment-8536

hrm… I may be missing that by using ext3 it’s implied that you’re using linux instead… but you can get ext3 drivers for Windows.

Reply  |  Quote
]]>
By: vacri http://www.terminally-incoherent.com/blog/2008/03/14/creating-encrypted-usb-drives-with-truecrypt/#comment-8535 Tue, 18 Mar 2008 02:28:22 +0000 http://www.terminally-incoherent.com/blog/2008/03/14/creating-encrypted-usb-drives-with-truecrypt/#comment-8535

Why would the way the files are stored on disk affect the way the Windows operating system uses them? I may be missing something fundamental, but I don’t see how the file is stored as having any affect on how it’s used – if Windows can read it and run it, then Windows can be infected by it.

Reply  |  Quote
]]>
By: ell http://www.terminally-incoherent.com/blog/2008/03/14/creating-encrypted-usb-drives-with-truecrypt/#comment-8503 Sat, 15 Mar 2008 22:35:01 +0000 http://www.terminally-incoherent.com/blog/2008/03/14/creating-encrypted-usb-drives-with-truecrypt/#comment-8503

yeah, here in the philippines its rampant, or atleast in the southern part, some local douche wrote it. he had his graffiti on the script as i can see it in my ubuntu, then I get to clean my younger brothers USB drive and also the USB drives of his dozen friends and schoolmates.

it has already spread widely, that any net cafes and computer shops in the region, had this type of virus :(

so anyway, as i was saying maybe theres an foss lightweight filemanager that can be compiled statically , and that has a truecrypt extension and decode it on the fly.. heheh, wishful thinking :)

Reply  |  Quote
]]>
By: Luke Maciak http://www.terminally-incoherent.com/blog/2008/03/14/creating-encrypted-usb-drives-with-truecrypt/#comment-8502 Sat, 15 Mar 2008 22:09:35 +0000 http://www.terminally-incoherent.com/blog/2008/03/14/creating-encrypted-usb-drives-with-truecrypt/#comment-8502

That seems like way to much work. And I think that to write/read ext3 you need something at the kernel level (I mean it’s a file system) so a mobile app probably won’t do any good.

Also, if you can write to the USB then the virus can write to it too. I don’t think there is a foolproof way of protecting yourself against these things other than not sticking the flash drive into a potentially compromised machine.

Btw, I don’t think I ever even saw a USB drive based virus in the wild? Is this an actual concern (ie. somewhere where you often go has rampart flash drive viri) or is this just a precautionary thing?

Reply  |  Quote
]]>