📜 ⬆️ ⬇️

Can software data destruction be better than a powerful magnet?


Hi,% username%, I'm sure yes. And with our power to make it a reality.
This post is inspired by this discussion, where it sometimes reached xenomorphs. With us, everything will be easier and more reliable (will they suddenly forget to feed the xenomorph?)


Likbez




')
Thus, under the condition that the disc encryption protocols and algorithms are invulnerable, you are guaranteed enough to destroy the container header and all header backups to say goodbye to any amount of encrypted data.

Truecrypt


Despite the fact that the project is dead, his business lives.
Update Apr 2, 2015: Phase II complete. TrueCrypt has been audited.

And so everyone guessed, and there’s no particular place to take a pre-planned hole, it’s painful to realize all the algorithms used in it for a long time. This is not OpenSSL which thread.

So, Truecrypt is an example of an open source program that can be more or less trusted to encrypt large amounts of data with a small (physically) key. Even so: Most likely, you are not so steep that even if you are caught, you will use hypothetical holes in the script to get information from your container.

Veracrypt


This is an OpenSource fork of the script, to which new features are carefully added so as not to embarrass the newcomers. For example, after the audit of the trumpet, they increased the number of rounds of password hashing many times so that it now takes a few seconds to wait for the mount. Brutess password, respectively, more difficult as many times + -.

So, these comrades can be asked to make a feature of the safe quick removal of the container header (and its backup) and such a request even already has
You just need to go in and vote.

And we will have a practical, free, fast way to permanently delete data. Really, really good?
So, we vote , do not hesitate.

Source: https://habr.com/ru/post/256613/


All Articles