Page 9 of 18 FirstFirst ... 5678910111213 ... LastLast
Results 161 to 180 of 353

Thread: Truecrypt 5.0 Released (now with system partition encryption)

  1. #161
    nemo_outis
    Guest

    Re: Truecrypt 5.0 Released (now with system partition encryption)

    Nomen Nescio <nobody@dizum.com> wrote in
    news:0c1c7bde2e1352bf6ab6f2bb1ddf5e1e@dizum.com:

    Are you still blithering on?

    Regards,


  2. #162
    nemo_outis
    Guest

    Re: Truecrypt 5.0 Released (now with system partition encryption)

    George Orwell <nobody@mixmaster.it> wrote in
    news:c55c038c9722894a88f01af8c6244801@mixmaster.it:

    If you have something to say, then say it.

    Until then (and probably even after) you're just noise on the channel.

    Regards,

  3. #163
    Nomen Nescio
    Guest

    Re: Truecrypt 5.0 Released (now with system partition encryption)

    Sebastian G. wrote:

    > Cyberiade.it Anonymous Remailer wrote:
    >
    > > it spotlights why OTP is considered
    > > the only truly unbreakable form of encryption. If a ciphertext can
    > > potentially be "anything", it's impossible to even know if you've
    > > successfully decrypted it or not. ;)

    >
    >
    > OTP's security comes from the fact that knowing the message doesn't change
    > the a priory probability of the plaintext. It never claimed that all
    > plaintexts are equally likely.


    No, that's EXACTLY what H(M) = H(M | C) means, if you actually
    understand it. Since a priory probability and a posteriori probability
    are equal a given ciphertext could in fact decrypt to... anything.
    Given the appropriate pad of course.

    For someone who tries to paint themselves as possessing some level of
    understanding with respect to crypto and general security by slinging
    around terms, you really don't grasp much any of it with any REAL
    understanding, do you?


  4. #164
    Cyberiade.it Anonymous Remailer
    Guest

    Re: Truecrypt 5.0 Released (now with system partition encryption)

    nemo_outis wrote:

    > Keep rereading it until you understand it - eventually you may get it.


    Read what, coward? This?

    "The chapter explains why BestCrypt Volume Encryption (a line in
    BestCrypt family of encryption software products) has got Volume
    Encryption name. Many people may think that Volume Encryption is the
    same as Partition Encryption or even Whole Disk Encryption. Sometimes
    it is really so, but not always, and it is worth to learn about the
    difference."

    *snicker*


  5. #165
    Cyberiade.it Anonymous Remailer
    Guest

    Re: Truecrypt 5.0 Released (now with system partition encryption)

    Sebastian G. wrote:

    > nemo_outis wrote:
    >
    > > Cyberiade.it Anonymous Remailer <anonymous@remailer.cyberiade.it> wrote
    > > in news:24250861f8cfd5a440460111e28b78d8@remailer.cyberiade.it:
    > >
    > > Windows cannot boot from a completely encrypted disk because there's
    > > nothing to decrypt those first bytes to even get the process started.

    >
    > This decryption can be provided by an additional, removal media. The media


    Nope. Not even close.


  6. #166
    Anonymous
    Guest

    Re: Truecrypt 5.0 Released (now with system partition encryption)

    nemo_outis wrote:

    <snip a'la nemo>

    "The chapter explains why BestCrypt Volume Encryption (a line in
    BestCrypt family of encryption software products) has got Volume
    Encryption name. Many people may think that Volume Encryption is the
    same as Partition Encryption or even Whole Disk Encryption. Sometimes
    it is really so, but not always, and it is worth to learn about the
    difference."

    *snicker*


  7. #167
    nemo_outis
    Guest

    Re: Truecrypt 5.0 Released (now with system partition encryption)

    Cyberiade.it Anonymous Remailer <anonymous@remailer.cyberiade.it> wrote in
    news:a964c9301e9397099e2bddc3bb6136cd@remailer.cyberiade.it:

    > "The chapter explains why BestCrypt Volume Encryption (a line in
    > BestCrypt family of encryption software products) has got Volume
    > Encryption name. Many people may think that Volume Encryption is the
    > same as Partition Encryption or even Whole Disk Encryption. Sometimes
    > it is really so, but not always, and it is worth to learn about the
    > difference."


    You continue not to understand what Bestcrypt says. Now, if it were only a
    question of your continued lack of understanding I would allow you to
    wallow in your ignorance forever, since you're not worth the sweat off my
    balls.

    However, in case anyone else is taken in by your foolishness, let me point
    out to them that Bestcrypt talks about - hell, brags about! - providing
    "volume encryption" because Bestcrypt uses volume in the "Microsoft sense"
    to refer to a storage entity (a volume) that can (inter alia) be stored
    across (i.e., span) multiple partitions and even *MULTIPLE hard drives*
    including the volume as a mirror, stripe or RAID 5.

    Regards,

  8. #168
    nemo_outis
    Guest

    Re: Truecrypt 5.0 Released (now with system partition encryption)

    Anonymous <xor@hermetix.org> wrote in news:d904e9efeb6af2a0cce14df80011c913
    @hermetix.org:

    Reread it again - you still don't understand it.

    Regards,

  9. #169
    George Orwell
    Guest

    Re: Truecrypt 5.0 Released (now with system partition encryption)

    nemo_outis wrote:

    > George Orwell <nobody@mixmaster.it> wrote in
    > news:69260f18808f2e54180e245439fe6696@mixmaster.it:
    >
    > If you have something to say, say it.


    No, you have to ask nicely first. Shouldn't be necessary because it's
    so obvious, but hey... if you're just to stupid to figure it out you're
    just to stupid. Guess there's nothing we can do about your genetics.

    *shrug*

    We can try to train some manners into you though. So sit up straight
    and pretend you're really not the emotional equivalent of a seven year
    old, and ask.

    Have that nose ready.

    >
    > Then, if it's not utter nonsence, I may reply.


    You must be getting a bit flustered. Not only are you running away from
    posts, your spelling and grammar are really starting to suck hind tit.

    Il mittente di questo messaggio|The sender address of this
    non corrisponde ad un utente |message is not related to a real
    reale ma all'indirizzo fittizio|person but to a fake address of an
    di un sistema anonimizzatore |anonymous system
    Per maggiori informazioni |For more info
    https://www.mixmaster.it


  10. #170
    anonymous@remailer.hastio.org
    Guest

    Re: Truecrypt 5.0 Released (now with system partition encryption)

    In article <9add438392ef222c5502081bb6856eac@dizum.com>
    Nomen Nescio <nobody@dizum.com> wrote:
    >
    > Sebastian G. wrote:
    >
    > > Cyberiade.it Anonymous Remailer wrote:
    > >
    > > > it spotlights why OTP is considered
    > > > the only truly unbreakable form of encryption. If a ciphertext can
    > > > potentially be "anything", it's impossible to even know if you've
    > > > successfully decrypted it or not. ;)

    > >
    > >
    > > OTP's security comes from the fact that knowing the message doesn't change
    > > the a priory probability of the plaintext. It never claimed that all
    > > plaintexts are equally likely.

    >
    > No, that's EXACTLY what H(M) = H(M | C) means, if you actually
    > understand it. Since a priory probability and a posteriori probability
    > are equal a given ciphertext could in fact decrypt to... anything.
    > Given the appropriate pad of course.
    >
    > For someone who tries to paint themselves as possessing some level of
    > understanding with respect to crypto and general security by slinging
    > around terms, you really don't grasp much any of it with any REAL
    > understanding, do you?


    The British merchant navy used OTP (maybe still do) for GBMS and GACQ
    messages. The pads were stored in the Captain's safe with a copy
    in the radio officer's safe. Despite the restrictions on radio officer's
    having to be of British nationality and requiring screening before being
    issued with their PMG Certificates, the British authorities always made
    an exception for Irish (Eire) nationals. Even during the darkest days of
    the troubles in Northern Ireland (Ulster), Irish qualified radio officers
    were still recruited and therefore given access to these pads. It is
    inconceivable that not one single Irish national radio officer did not
    copy these pads.

    This suggests that OTP's are only as secure as the methodology of
    securing them against being compromised. Arguments of their security
    are of no avail against allowing an attacker access to them.

    ~~~~~~~~~~~~~~~~~~~~~
    This message was posted via one or more anonymous remailing services.
    The original sender is unknown. Any address shown in the From header
    is unverified.



  11. #171
    Anonymous
    Guest

    Re: Truecrypt 5.0 Released (now with system partition encryption)

    nemo_outis wrote:

    <snip a'la nemo>

    "The chapter explains why BestCrypt Volume Encryption (a line in
    BestCrypt family of encryption software products) has got Volume
    Encryption name. Many people may think that Volume Encryption is the
    same as Partition Encryption or even Whole Disk Encryption. Sometimes
    it is really so, but not always, and it is worth to learn about the
    difference."

    *snicker*


  12. #172
    Nomen Nescio
    Guest

    Re: Truecrypt 5.0 Released (now with system partition encryption)

    nemo_outis wrote:

    > "Sebastian G." <seppi@seppig.de> wrote in
    > news:616neqF1thrluU2@mid.dfncis.de:
    >
    > >> It's not the unintended setup that's unsupported ny Microsoft, but
    > >> setup to a removable drive (e.g., USB)

    > >
    > > Unsupported, not crippled.

    >
    > More quibbling and caviling, Sebastian. Microsoft does NOT support
    > Windows configured in such ways. In short, it's a hack, Sebastian.


    Actually Microsoft does in deed support such Windows configurations,
    openly and officially.

    >
    > Regards,



  13. #173
    nemo_outis
    Guest

    Re: Truecrypt 5.0 Released (now with system partition encryption)

    George Orwell <nobody@mixmaster.it> wrote in
    news:7274f8b17fa7ca9e23b39b9220e17cbb@mixmaster.it:

    If you have something to say, say it.

    Regards,



  14. #174
    Nomen Nescio
    Guest

    Re: Truecrypt 5.0 Released (now with system partition encryption)

    nemo_outis wrote:

    You've already been given a cite explaining exactly how and why
    unencrypted partition tables are a risk. How they can in FACT aid
    in the cryptanalysis of an encrypted volume, and you damned well
    know it or you wouldn't have made a pathetic attempt to twist
    things into some discussion of absolutes.


  15. #175
    Anonymous
    Guest

    Re: Truecrypt 5.0 Released (now with system partition encryption)

    nemo_outis wrote:

    > You continue not to understand what Bestcrypt says. Now, if it
    > were only a question of your continued lack of understanding I
    > would allow you to wallow in your ignorance forever, since you're
    > not worth the sweat off my balls.
    >
    > However, in case anyone else is taken in by your foolishness, let
    > me point out to them that Bestcrypt talks about - hell, brags
    > about! - providing "volume encryption" because Bestcrypt uses
    > volume in the "Microsoft sense" to refer to a storage entity (a
    > volume) that can (inter alia) be stored across (i.e., span)
    > multiple partitions and even *MULTIPLE hard drives* including the
    > volume as a mirror, stripe or RAID 5.


    Which all means absolutely nothing except you're desperately trying
    to cloud the issue to avoid having to admit you're FOS, because
    none of that defines Bestcrypt as whole disk encryption. None of it.

    Jetico doesn't claim Bestcrypt to be WD encryption, in fact they
    call it something else completely and go out of their way to make
    readers aware that the differences should be considered.

    Bestcrypt isn't even mistakenly listed on any independent site that
    categorizes or reviews encryption software, as whole disk. Nowhere.

    The only one running around like their head is on fire screaming IS
    TO! IS TO! IS TO! in between hiding from the aforementioned
    description is you

    Has it even crossed your mind yet why that might be? Why you think
    your interpretation is "right" and the entire rest of the world is
    wrong?

    There's a medical term for that state of mind, nemo_outis.


  16. #176
    George Orwell
    Guest

    Re: Truecrypt 5.0 Released (now with system partition encryption)

    nemo_outis wrote:

    > You continue not to understand what Bestcrypt says.


    You mean this...

    "The chapter explains why BestCrypt Volume Encryption (a line in
    BestCrypt family of encryption software products) has got Volume
    Encryption name. Many people may think that Volume Encryption is the
    same as Partition Encryption or even Whole Disk Encryption. Sometimes
    it is really so, but not always, and it is worth to learn about the
    difference."

    *snicker*

    Il mittente di questo messaggio|The sender address of this
    non corrisponde ad un utente |message is not related to a real
    reale ma all'indirizzo fittizio|person but to a fake address of an
    di un sistema anonimizzatore |anonymous system
    Per maggiori informazioni |For more info
    https://www.mixmaster.it


  17. #177
    Nomen Nescio
    Guest

    Re: Truecrypt 5.0 Released (now with system partition encryption)

    nemo_outis wrote:

    > Nomen Nescio <nobody@dizum.com> wrote in
    > news:0c1c7bde2e1352bf6ab6f2bb1ddf5e1e@dizum.com:
    >
    > Are you still blithering on?


    Are you still running like a coward from cites?

    Of course you are. :)

    >
    > Regards,
    >



  18. #178
    Cyberiade.it Anonymous Remailer
    Guest

    Re: Truecrypt 5.0 Released (now with system partition encryption)

    nemo_outis wrote:

    > George Orwell <nobody@mixmaster.it> wrote in
    > news:7274f8b17fa7ca9e23b39b9220e17cbb@mixmaster.it:
    >
    > If you have something to say, say it.


    No, you have to ask nicely first. Shouldn't be necessary because it's
    so obvious, but hey... if you're just to stupid to figure it out you're
    just to stupid. Guess there's nothing we can do about your genetics.

    *shrug*

    We can try to train some manners into you though. So sit up straight
    and pretend you're really not the emotional equivalent of a seven year
    old, and ask.

    Have that nose ready.


  19. #179
    bealoid
    Guest

    Re: Truecrypt 5.0 Released (now with system partition encryption)

    George Orwell <nobody@mixmaster.it> wrote in
    news:c55c038c9722894a88f01af8c6244801@mixmaster.it:

    > nemo_outis wrote:
    >
    >> Cyberiade.it Anonymous Remailer <anonymous@remailer.cyberiade.it> wrote
    >> in news:24250861f8cfd5a440460111e28b78d8@remailer.cyberiade.it:
    >>
    >> Windows cannot boot from a completely encrypted disk because there's
    >> nothing to decrypt those first bytes to even get the process started.

    >
    > Wanna bet? If I post a link that proves Windows can boot
    > from a 100% encrypted device, including the MBR, WITHOUT
    > using any other software or copying any information at
    > all to or from anywhere, will you put on your clown suit
    > and dance for us, then leave?


    I'm not that person, but I'd be interested to see the link please.

    How secure is ATA Disk encryption? There seem to be many tools to unlock
    discs.

  20. #180
    Sebastian G.
    Guest

    Re: Truecrypt 5.0 Released (now with system partition encryption)

    Anonymous wrote:

    > Sebastian G. wrote:
    >
    >> Cyberiade.it Anonymous Remailer wrote:
    >>
    >>> nemo_outis wrote:
    >>>
    >>>> George Orwell <nobody@mixmaster.it> wrote in
    >>>> news:cfba7ec8f8b207e0a1bd089fe3255024@mixmaster.it:
    >>>>
    >>>>> nemo_outis wrote:
    >>>>>
    >>>>>> There must - necessarily! - be a small amount of unencrypted code on
    >>>>>> the boot/system volume. This is invariably located on track 0.
    >>>>> Nope! I fact with *true* whole disk encryption there is absolutely no
    >>>>> unencrypted information on a device at all.
    >>>> Uhh, doofus, Windows cannot boot from a completely encrypted disk because
    >>>> there's nothing to decrypt those first bytes to even get the process
    >>> Wrong!
    >>>
    >>> Windows can trivially boot from a completely, 100% end to end including
    >>> sector 0, encrypted drive without modifying Windows at all, without
    >>> using any external bootstrapping at all, and without using any stupid
    >>> "boot sector copying" scheme.

    >>
    >> OK, now I'm interested: How is this supposed to work? If everything is
    >> encrypted, where's the code for the decryption?

    >
    > Come on, you can figure it out before Nemo I'll bet. ;)



    Some people have been discussing using LinuxBIOS or a BIOS modification for
    implementing the decryption routine in the BIOS, however I would count this
    as external bootstrapping scheme. (And it's obviously detectable.)

Similar Threads

  1. Replies: 0
    Last Post: 03-15-07, 08:48 AM
  2. Were can I find what slot I have for vid card
    By agustintorre in forum Hardware & Overclocking
    Replies: 51
    Last Post: 02-10-07, 04:59 AM
  3. system partition full
    By zeffer111 in forum Software Forum
    Replies: 16
    Last Post: 12-27-05, 06:12 AM
  4. aČ System Editor PlugIn Released
    By hayc59 in forum Network Security
    Replies: 0
    Last Post: 01-15-05, 08:50 PM

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •