Harddiskkryptering med VeraCrypt

Informasjon,guider og tips relatert til PC og Teknologi
Post Reply
Spesialisten
Godkjente Selgere
Godkjente Selgere
Posts: 12
Joined: Tue Sep 10, 2019 6:39 pm

Harddiskkryptering med VeraCrypt

Post by Spesialisten » Fri Oct 04, 2019 10:42 pm

Image

- Hypotetisk scenario ; Du sitter hjemme på laptopen/stasjonære pc'en din og du har nylig bestilt varer , åpnet protonmail og hatt kommunikasjon med en annen part , en selger , kunde eller en bekjent. Du har også kanskje den eller de siste dagene ikke brukt noe programvare for å fjerne historikk , cache , thumbnails , cookies , nylige brukte og åpnede filer eller bilder etc. Eller i verste tilfelle er dette en rutine du ikke har eller aldri har hatt. Du aner fred og ingen fare da plutselig politiet hamrer eller slår inn døren din hvor du i full panikk fryser og rekker ikke fjerne noe av sporene du har liggende på pcen din. Det du imidlertidig har tid til er å dra ut strømkabel , slå av datamaskinen. Merk at dette forutsetter at du ikke har noe form for dvalemodus/hibernation aktivert. Politiet har av en eller annen årsak grunnlag for å foreta en razzia/husransakelse og tar kanskje beslag i både pc og datamaskin.

1. For å unngå denne eventyrlige og ugunstige situasjonen så krypterer du harddisken din idag , ikke i morgen eller at du sitter å tenker at dette skjer ikke meg, før dagen oppstår og du står der som ett esel "hello realitycheck , fuck..onck onck."

VeraCrypt is a free open source disk encryption software for Windows, Mac OSX and Linux. Brought to you by IDRIX (https://www.idrix.fr) and based on TrueCrypt 7.1a.


VeraCrypt main features:


- Creates a virtual encrypted disk within a file and mounts it as a real disk.
- Encrypts an entire partition or storage device such as USB flash drive or hard drive.
- Encrypts a partition or drive where Windows is installed (pre-boot authentication).
- Encryption is automatic, real-time(on-the-fly) and transparent.
- Parallelization and pipelining allow data to be read and written as fast as if the drive was not encrypted.
- Encryption can be hardware-accelerated on modern processors.
- Provides plausible deniability, in case an adversary forces you to reveal the password: Hidden volume (steganography) and hidden operating system.

Supported Operating Systems
VeraCrypt currently supports the following operating systems:


Windows 10
Windows 8 and 8.1
Windows 7
Windows Vista
Windows XP
Windows Server 2012
Windows Server 2008 R2 (64-bit)
Windows Server 2008
Windows Server 2003
Mac OS X 10.13 High Sierra
Mac OS X 10.12 Sierra
Mac OS X 10.11 El Capitan
Mac OS X 10.10 Yosemite
Mac OS X 10.9 Mavericks
Mac OS X 10.8 Mountain Lion
Mac OS X 10.7 Lion
Linux x86 (32-bit and 64-bit versions, kernel 2.6 or compatible)
FreeBSD x86 (32-bit and 64-bit versions, starting from version 11)

Operating Systems Supported for System Encryption

VeraCrypt can currently encrypt the following operating systems:


Windows 10
Windows 8 and 8.1
Windows 7
Windows Vista (SP1 or later)
Windows XP
Windows Server 2012
Windows Server 2008 and Windows Server 2008 R2 (64-bit)
Windows Server 2003

Kanskje det eneste plusset med Windows ifh. VeraCrypt og generelt....

Dokumentasjon ; https://www.veracrypt.fr/en/Documentation.html


Downloads ; https://www.veracrypt.fr/en/Downloads.html


Installasjon wizard til VeraCrypt er relativt straight forward , men du skal kryptere med AES (AES-256) og bruke SHA-512 hashing.

Litt info om Advanced Encryption Standard ;

AES

The Advanced Encryption Standard (AES) specifies a FIPS-approved cryptographic algorithm (Rijndael, designed by Joan Daemen and Vincent Rijmen, published in 1998) that may be used by US federal departments and agencies to cryptographically protect sensitive information [3]. VeraCrypt uses AES with 14 rounds and a 256-bit key (i.e., AES-256, published in 2001) operating in XTS mode (see the section Modes of Operation).
In June 2003, after the NSA (US National Security Agency) conducted a review and analysis of AES, the U.S. CNSS (Committee on National Security Systems) announced in [1] that the design and strength of AES-256 (and AES-192) are sufficient to protect classified information up to the Top Secret level. This is applicable to all U.S. Government Departments or Agencies that are considering the acquisition or use of products incorporating the Advanced Encryption Standard (AES) to satisfy Information Assurance requirements associated with the protection of national security systems and/or national security information [1].

Litt info om SHA-512 ;


SHA-512

SHA-512 is a hash algorithm designed by the NSA and published by NIST in FIPS PUB 180-2 [14] in 2002 (the first draft was published in 2001). The size of the output of this algorithm is 512 bits.



Warrant Canary ; https://www.idrix.fr/VeraCrypt/canary.txt

Kilde ; https://www.veracrypt.fr/

Source code ; https://github.com/veracrypt/VeraCrypt , https://www.veracrypt.fr/code/VeraCrypt/

Post Reply