Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

truecrypt hidden volume

Posted on 2010-11-23
7
Medium Priority
?
664 Views
Last Modified: 2012-05-10
Dear Expert,

 If I use true crypt software hidden volume in my flash drive, there is a way to know it is hidden, someone realize there is hidden data.
0
Comment
Question by:G55
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
  • 2
  • +1
7 Comments
 
LVL 3

Expert Comment

by:msimn
ID: 34202878
I am answering this as I've never used a TrueCrypt product before, but yes, if you hide something in a separated partition,
  1) The free disc space left will not make sense.
  2) The hidden partition will show up in the disk management (diskmgmt.msc - windows) or disk utility (mac).

So someone with your flash drive with some knowledge of computer storage will figure out that there are something they couldn't see (yet) inside that flash drive.
0
 
LVL 27

Accepted Solution

by:
Tolomir earned 1000 total points
ID: 34204365
Well, we should bring is some facts here. Let's assume the makes of truecrypt invested some time to identify the major flaws...


Please take a look at:
http://www.truecrypt.org/docs/?s=hidden-volume

As you can see the hidden volume is "stored" in the free data area of a truecrypt partition.

There are also some security precautions that you have to consider, also already worked out:

http://www.truecrypt.org/docs/?s=hidden-volume-precautions

---

If you want hardware based security you should consider to use an ironkey instead.

https://www.ironkey.com/personal

If will physically disable (a chip will self-destruct...) itself if someone enters 10 times in a row the wrong password.

With the personal edition you can use a portable firefox edition, that stores all of it's data only on the stick: usersettings, cache, bookmarks.

Tolomir
0
 
LVL 3

Expert Comment

by:msimn
ID: 34204968
According to comment 2, I'd probably be wrong.
0
Three Reasons Why Backup is Strategic

Backup is strategic to your business because your data is strategic to your business. Without backup, your business will fail. This white paper explains why it is vital for you to design and immediately execute a backup strategy to protect 100 percent of your data.

 

Author Comment

by:G55
ID: 34224098
msimn:  
so you are saying there is an idea to prove there are hidden volume in the flash drive. If yes how because am writing research paper..
0
 
LVL 27

Expert Comment

by:Tolomir
ID: 34224423
I suggest you start reading with these precautions: http://www.truecrypt.org/docs/?s=hidden-volume-precautions this gives you a lot of suggestions where to start to identify a hidden volume.

Also keep this in mind:  http://xkcd.com/538/
0
 

Author Comment

by:G55
ID: 34342305
hi there are procedure that i can follow to detect the hidden file.
0
 
LVL 4

Expert Comment

by:BMPTS
ID: 34877358
G55,

it is very difficult to detect a hidden volume, you have to basically have access to the initial non hidden file, and then write the data to fill up the supposed free space,  the links above explain the flaws with nesting an encrypted file (as a volume) in another.  

I have seen TC take a beating from major forensic software, and finding the exact point of where one starts and the other ends is hard enough, let alone once its detected you still have to get into it!
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Many businesses neglect disaster recovery and treat it as an after-thought. I can tell you first hand that data will be lost, hard drives die, servers will be hacked, and careless (or malicious) employees can ruin your data.
The well known Cerber ransomware continues to spread this summer through spear phishing email campaigns targeting enterprises. Learn how it easily bypasses traditional defenses - and what you can do to protect your data.
This Micro Tutorial will teach you how to reformat your flash drive. Sometimes your flash drive may have issues carrying files so this will completely restore it to manufacturing settings. Make sure to backup all files before reformatting. This w…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
Suggested Courses

721 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question