?
Solved

Hard Disk Encryption using PGP Desktop

Posted on 2009-05-04
4
Medium Priority
?
406 Views
Last Modified: 2012-05-06
I have a primary master hard disk partitioned into 5 partitions (C E G H and K). It is a dual boot system. I have two separate installations of Windows XP installed on partition C and E. I have encrypted partition H only using PGP Desktop. Now when I boot my computer I get asked to enter my pass phrase before the system will boot up. I wish to know whether I can now safely assume that no one can access the data I have on partition H of this hard disk, even if some one takes this hard disk out of my computer and try to access data on its partition H using this hard disk as an external USB hard disk. Thanks for your help.
0
Comment
Question by:FaheemAhmadGul
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
4 Comments
 
LVL 63

Accepted Solution

by:
☠ MASQ ☠ earned 800 total points
ID: 24294070
Yes

PGP encrypts your true partition and creates a tiny bootable partition which is the bit you see when you try to boot to the drive. Boot.ini now points to this. PGP then unecrypts the Windows partiton "on the fly".

I suppose it would be true to say it's not 100% foolproof but without your login credentials and password for PGP it is not economical in terms of time needed to crack the encryption on the drive so your data is safe.
 
In the US with a court order the drive could be unncerypted by the federal authorities as all encryption products must allow a backdoor via the system publisher.
0
 
LVL 1

Author Comment

by:FaheemAhmadGul
ID: 24294363
Many thanks for your response to my request for help. Your answer is comprehensive and I will accept it as solution. I would be grateful, however, if for my peace of mind, you could also explain what will happen if some body stole my PC, took the hard drive out of it, put it in external USB drive and tried to access the data on its partition H using a different PC. Would they then be asked to enter the passphrase or password. I am increasing the point count to 200 for this extra clarification. Thanks
0
 
LVL 63

Expert Comment

by:☠ MASQ ☠
ID: 24295021
If the drive was stolen and an attmpt was made to boot from it PGP would launch and request your passphrase, the PGP boot partition is on the drive you selectd to protect not on the C: drive.

Initially the theif wouldn't even find the main partition on H but if they used more sophisticated tools they would find there is a large partition but it is gibberish without the PGP passphrase.
0
 
LVL 1

Author Closing Comment

by:FaheemAhmadGul
ID: 31577496
Many thanks. I am very grateful. Regards, Faheem
0

Featured Post

Does Your Cloud Backup Use Blockchain Technology?

Blockchain technology has already revolutionized finance thanks to Bitcoin. Now it's disrupting other areas, including the realm of data protection. Learn how blockchain is now being used to authenticate backup files and keep them safe from hackers.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article was originally published on Monitis Blog, you can check it here . If you have responsibility for software in production, I bet you’d like to know more about it. I don’t mean that you’d like an extra peek into the bowels of the sourc…
The well known Cerber ransomware continues to spread this summer through spear phishing email campaigns targeting enterprises. Learn how it easily bypasses traditional defenses - and what you can do to protect your data.
The viewer will learn how to successfully create a multiboot device using the SARDU utility on Windows 7. Start the SARDU utility: Change the image directory to wherever you store your ISOs, this will prevent you from having 2 copies of an ISO wit…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…
Suggested Courses
Course of the Month9 days, 22 hours left to enroll

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question