Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - astor

Pages: 1 ... 168 169 [170] 171 172 ... 208
2536
I've been encountering some confusion about signing. Just want to point out that there are 3 kinds of signatures. Your PGP program may automatically handle them for you, but in gpg,the reference standard, these are 3 separate commands.

You can sign a file, a plaintext message, or a key. When we talk about signing on the forum, we are almost always talking about signing plaintext messages. Key signing is useful for establishing a web of trust, but you're supposed to do that after verifying a person's identity. Obviously, we're anonymous to each other, so we have no use for key signing. File signing, or at least verifying file signatures, is useful when downloading the Tor Browser Bundle, the Tails ISO, etc. It would be nice if more people did that.

BTW, I like Key Master. :)

2537
@Nightcrawler

-----BEGIN PGP MESSAGE-----

hQIMA/+n5QPMklrXAQ//Yu8U1w6oium1DXHmn1iNqFlzMk8AUekgWFCIDC7EFxW0
Y2jCHiffsa1+csBA6qkpgwBM4lCiHLG7oLdObaHnDCtMvVdRli6+c1C2V+5/cQAE
qGPiW1EiK95fxn5L7bFCk6WvwMt9PDVQQNYtJpf/lD52ypRYI6myMorbEtzZib7C
wbAdCzqEAoXvlaQ3P8ZTREhoEkPvmKAPgqxkRXh7XGve0hQ3A4iQ4n5969+a/BGk
bNtukA9C7YylPyXsgTf8x2gRZ6Q1/1nePnyHXdI30uui08cRP4WG9E86nFOPoZRS
SeLZJoQ5aVYjs5lX6G9PlsJFRBty9i1aQQksPQy8hAxKm/TRIWXzqpX/QFZjoDFy
Y51epVQb74Zai1wL+zk6PVu6HeCNP/8iMMixBm9v+2TzOhk2aPtQAg6bPGcjydKA
isuaADKZ330lLpW40vulPHl08Lldq4L+E4yHmpvOc+JXsOzdkRcd9oqEybORWAWB
1Hrl7Nk3vd3pTtZlaB1EJ4KjSSWHeZ4iTodMv00zSRPRQRx5Jqcj7MfmSAtETpuV
hWDUYq+ixshlr2IylRbk2NpB7jMrWxHw59ovWGQwzyrQf/OhvQ3E6CGyr1AnFJrn
3zsW4Vx72gvBIQCfpsEaGZfsjOEmJCXdHnWs5OoQb2WbVyRMWWg7Qarp/GoTj+OF
AgwD/KN8OP+Yw+oBEACKWCOObQpHcKCPEEbn+Cr3rsCS2jK1x5mpyPVdZKAouqQ2
Mf6IoIkJCFmAQbJIVSWJpEBOmFNmP13s4FWXQX5GYU1tZ5LsT+P+XuNYWX0k+PWl
MQeJEneL20QDI2uwFkNZqpyxSk6Ejrn5J0mO5QeYyzhmpzIox9ICYJyIGGxbDkLz
HWI5WmJvsbLeWss1vT3dDf06RMlHQNM/extsSZi9VkKSBzvWLOvVFDAljX5pvEpP
taj+v9Ur3NsL79b9QK4TXIaivW9dHiKP2IqKKTIc5Ttg9K+JjhvzPYOVyHxYazhv
QBw98DSdIkelnJDEnbZ6RkQ4sW0dPKhgx/shTOxHK3oG37qxFx3Qk6vy8gy9VnZ+
VX4+VSebyXEV9CbLVpjLC5F8KJfilWexrRXuALqjtgvDjHMDV3R/o163W7dkbk9P
dpqS/o1D0OqndVMjS0O70hGLuWLM6qVl7r53/xhYkQe+xwkNaXRL3fMksNkaCYcy
ep0RGLs7nJFasGntH7uuUn6Gz2CEwBS2ba9/zpnXPGNz1yEO5doD2Jdi0eQXBqS4
3R9mkPOQTrMH9h2ozhiECHSjbbHNm0FBIElUEnE+m7Li4ytClFfFS/pqwn4J35dW
P4SRE0L6ZKF3O6yv8fwwbjeL1E0GZ7mOF6rSKeLnVgkQGDnmFRSItmd2yQ765NJo
AZ4tQK5vDBrtCBOSpKdtS7A+ho4iJ6Od3HdbwXeAfg3gY1By+nnaPYHScPhlCp4d
39+VJ5C4FqQbilHoAtOpuecC8ZpCW06zTMXa2MriZ2PQXLpYWLivuP/rsNOJHYW4
uVfquloX1yI=
=gjrB
-----END PGP MESSAGE-----

2538
@mikezolinski

-----BEGIN PGP MESSAGE-----
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=dQsH
-----END PGP MESSAGE-----

2539
Security / Re: Destroying computer evidence.
« on: January 03, 2013, 03:40 am »
Hey xblackbladex, I posted some info in a new thread because it's a lot of text

http://dkn255hz262ypmii.onion/index.php?topic=99520.0

2540
@Fallkniven -- LOL


@user1333 -- Your key size is only 1024 bits. That's too weak. You need to create a bigger key, preferably 4096 bits. Please do that and post your new public key.

2541
Security / Re: Secure data erasure, a professional analysis
« on: January 03, 2013, 03:29 am »
The Secure Erase (SE) command was added to the open ANSI standards that control disk drives, at the request of CMRR at UCSD. The ANSI T13.org committee oversees the ATA interface specification (also called IDE) and the ANSI T10.org committee governs the SCSI interface specification.

Secure erase is built into the hard disk drive itself and thus is far less susceptible to malicious software attack than external software utilities. The SE command is implemented in all ATA interface drives manufactured after 2001 (drives with capacities greater than 15 GB), according to testing by CMRR. A standardized internal secure erase command also exists for SCSI drives, but is optional and not currently implemented in SCSI drives tested.

Secure erase is a positive easy-to-use data destroy command, amounting to "electronic data shredding." Executing the command causes a drive to internally completely erase all possible user data record areas by overwriting, including g-list records that could contain readable data in reallocated disk sectors (sectors that the drive no longer uses because they have hard errors). SE is a simple addition to the existing "format drive" command present in computer operating systems and storage system software, and adds no cost to hard disk drives. Because the Secure Erase command is carried out within hard disk drives, no additional software is required either.

Secure erase does a single on-track erasure of the data on the disk drive. The U.S. NATIONAL SECURITY AGENCY PUBLISHED AN INFORMATION ASSURANCE APPROVAL OF SINGLE PASS OVERWRITE, AFTER TECHNICAL TESTING AT CMRR SHOWED THAT MULTIPLE ON-TRACK OVERWRITE PASSES GAVE NO ADDITIONAL ERASURE. Secure erase has been approved by the U.S. National Institute for Standards and Technology (NIST), Computer Security Resource Center. NIST document 800-88 approves SE at a higher security level than external software block overwrite utilities like as Norton Government Wipe, and it meets the legal requirements of HIPAA, PIPEDA, GLBA, and Sarbanes-Oxley.

Software overwrite utilities running in protected execution environments (e.g. running inside file system hardware like RAID arrays or inside secure computers) could be verified secure under NIST 800-88. For the most sensitive data, the government requires physical destruction of drives. Drive manufacturers today are pursuing higher security secure erase (including secret data), via in-drive data encryption (see below).

Data Encryption Secure Erase

Recently, 2.5-inch hard disk drives for laptop computers have been introduced which encrypt user data before recording -- internal full data encryption. Such drives provide protection of data should the laptop or drive be lost or stolen, and even provide high protection from forensic data recovery. These drives also offer a new, instantaneous way to sanitize data on a hard disk drive -- by securely discarding the encryption key.

Why encrypt data at rest in drives instead of in computers, such as by user application programs that access the data? Because computer level data encryption defeats the purpose of many important data management functions, such as incremental backup, continuous data protection, data compression, de-duplication, virtualization, archiving, content addressable storage, advanced routing, and thin provisioning. Defeating these operations causes significant penalties to enterprise storage companies in data access speed and cost. Each of these operations exploits the structure of user data, and needs to inspect the data. They become inefficient or nonfunctional if the data has been randomized by encryption. For example, data compression ratios may fall from more than 2:1 to less than 1:1, because compressing random data can expand it instead. De-duplication won't find identical data sets if they are encrypted by different users.

Computer level encryption could be employed with in-drive encryption as well, the double encryption does no harm and provides additional security. In-drive encryption can relieve encryption key management problems inherent in removable storage, like laptop disk drives or tape backups. In fact, hardware-based tape drive encryption may become widespread 11 by 2007 due to widely publicized losses of backup tape reels containing identity theft data on millions of people.

Full Disk Encryption (FDE) Enhanced Secure Erase (FDE-SE), securely changes the internal drive encryption key, to render encrypted user data on disk indecipherable. This is enabled via the Enhanced SE command in the present ATA ANSI specs. FDE SE encryption needs to be tested for protection against advanced forensic analysis. The results will determine the erasure security data level -- Confidential, Secret, Top Secret, or higher. The US Commerce Department prohibits most 256-bit and higher encryption export overseas, limiting FDE E-SE to AES-128-bit encryption (since disk
drives are a global industry).

AES-256 bit encryption in FDE drives could allow FDE SE at a somewhat higher security level. Note that a FDE E-SE operation amounts to double AES-128, because the data encrypted by the discarded key is decrypted by the new key, and AES is a symmetric encryption scheme. It would appear that a brute force attack on double AES-128 requires
the same computational effort as single AES-256. For paranoid-level security, the cypt-text in an FDE disk drive could be eliminated by a Normal OW SE done after the FDE E-SE.

An open industry standard for FDE is being worked on by the Trusted Computing Group overall specification (the Storage Working Group in trustedcomputinggroup.org). Drive members of the TCG include Seagate, HGST, Fujitsu and WD. SE via encryption may be included, consistent with the ANSI open standards for ATA drives (t13.org). CMRR has begun testing FDE-SE drives. They take less than 15 milliseconds to complete an Enhanced SE; while a 750 GB ATA-interface HDD can take over an hour to erase using conventional Secure Erase (or many hours using external overwrite software).

Computer Forensics Data Recovery

Forensics recovery uses exotic data recovery techniques by experts with advanced equipment. Its normal purpose is to recover data from failed hard disk drives, and for legal discovery. Forensic companies can successfully recover unerased but protected data in a disk drive using electronic instrumentation. However, the secure erase commands discussed above erase all user data on the disk drive beyond physical disk drive forensic recovery. Drives old enough to permit such attack are too old to have the Secure Erase built-in command.

Paranoid-level recovery concerns based on hypothetical schemes are sometimes proposed by people not experienced in actual magnetic disk recording, claiming the possibility of data recovery even after physical destruction. One computer forensics data recovery company claims to be able to read user data from a magnetic image of recorded bits on a disc, without using normal drive electronics. Reading back tracks from a disk taken out of a drive and tested on a spin stand was practical decades ago, but no longer with today's microinch-size tracks.

The time required by exotic technologies is itself a barrier to data recovery and increases data security. Also, accessing data from magnetic images requires overcoming almost a dozen successive magnetic recording technology hurdles. Even if these hurdles were overcome, about an hour would be required to recover a single user data block out of millions on a disk. Recovering substantial amounts of data in less than months requires that the disk be intact and undamaged, so that heads can be flown over it to obtain data playback signals; then overcoming these technology hurdles. Simply bending a disk makes this nearly impossible, so physical damaging drives to warp their disks makes recovery practically impossible.

Other "experts" claim that limited information can be recovered from unerased track edges. But this has been shown to be false by tests at CMRR. Such recovery also presumes detailed technical knowledge of the drive's magnetic recording design. Charles Sobey at ChannelScience.com wrote an illuminating article on drive-independent data recovery, showing how difficult these hurdles are.

2542
Security / Secure data erasure, a professional analysis
« on: January 03, 2013, 03:29 am »
This is a professional analysis of secure data erasure. It comes from the Center for Magnetic Recording Research. It clearly sates that multiple writes are no more effective than a single write (I highlight the comments in the text). Full analysis is here: http://cmrr.ucsd.edu/people/Hughes/DataSanitizationTutorial.pdf

TL;DR  Physical destruction is the most secure data erasure method, but surprisingly, "simply bending a disk makes  [data recovery] nearly impossible."

Data Sanitization in Hard Disk Drives

Four basic sanitization security levels can be defined: weak erase (deleting files), block erase (overwrite by external software), normal secure erase (current drives), and enhanced secure erase (see below). The CMRR at UCSD has established test protocols for software secure erase.

Block erase is most commonly used. While it is significantly better than no erase, or file deletion, or drive formatting, it is vulnerable to malware and incomplete erasure of all data blocks. Examples are data blocks reassigned by drives, multiple drive partitions, host protected areas, device configuration overlays, and drive faults.

Normal secure erase is approved by NIST 800-88 for legal sanitization of user data up to Confidential, and enhanced secure erase for higher levels. Enhanced level has only recently been implemented, initially in Seagate drives, and these drives are under evaluation by the CMRR.

These four erasure protocols exist because users make tradeoffs between sanitization security level and the time required. A high security protocol that requires special software and days to accomplish will be avoided by most users, making it little used and of limited practical value. For example, the old data overwrite document DoD 5220 calls for multiple block overwrites of Confidential data, which can take more than a day to complete in today's large capacity drives. So users make tradeoffs between the time required to erase data and the risk that the next drive user may know and use recovery techniques which can access weakly erased data.

For all but top-secret information, users will usually turn to erasure methods that take minutes rather than hours or days. They will select a method that gives them an acceptable level of security in a reasonable time window.

Physical Drive Destruction

To positively prevent data from recovery, disks can be removed from disk drives and broken up, or even ground to microscopic pieces. (Actually, simple disk bending is highly effective, particularly in emergency situations.) Obsolete government document DoD 5220 required physical destruction of the storage medium (the magnetic disks) for data classified higher than Secret. Even such physical destruction is not absolute if any remaining disk pieces are larger than a single 512-byte record block in size, about 1/125" in today's drives. As linear and track densities increases, the maximum allowable size of disk fragments become ever smaller. Destroyed disk fragments of this size have been studied by the CMRR. Magnetic microscopy is used to image stored recorded media bits.

Some storage products are more easily destroyed than hard disk drives, such as magnetic disk data cartridges, tape cartridges, secure USB drives, and optical media.

Disk Drive Degaussing

Degaussers are used to erase magnetic data on disk drives. They create high intensity magnetic fields that erase all magnetic recordings in a hard disk drive, including the sector header information on drive data tracks (information necessary for drive head positioning and data error recovery). In addition, track and disk motor magnets are often also erased by degausser magnetic fields. Like physical destruction, when a disk drive has been successfully degaussed it is no longer useable.

Drive designers continually increase the linear density of magnetic recording to create higher data storage capacity per disk. This raises the disk magnetic coercivity, the field required to write bits on the magnetic media. As the magnetic coercivity increases, the fields required to erase the data on recorded disks increases. Thus an older degausser may not fully erase data on a newer hard disk drive. New perpendicular recording drives may not be erasable by present degaussers designed for past longitudinal recording drives.

Future generations of magnetic recording media may use very high magnetic coercivity disks to achieve areal densities greater than 500 gigabits per square inch. These drives may have technology using laser light in the magnetic write element of the disk drive, to raise the temperature of a spot on the magnetic medium in order to lower the magnetic coercivity to the point where the write element can record a bit on the very high coercivity magnetic media. For disk drives using this Heat or Thermally Assisted Magnetic Recording (HAMR/TAMR) technology the degausser field required to erase the disk drive at room temperatures may be impossible or impractical to achieve. In this case the drive may have to be physically destroyed.

"Hybrid drives" are now being introduced for notebook or laptop computers that have flash memory write cache on hard disk drive circuit boards. Magnetic degaussing would not affect any resident data on such semiconductor memory chips. Data on these non-volatile semiconductors would have to be sanitized using some other technique. For all these reasons degaussing of all the data on hard disk drives will become increasingly impractical.

Nondestructive Data Erasure

Sanitization of data on a hard disk drive is not a simple task. Deleting a file merely removes its name from the directory structure's special disk sectors. The user data remains in the drive data storage sectors where it can be retrieved until the sectors are overwritten by new data. Reformatting a hard disk drive clears the file directory and severs the links between storage sectors, but the user data remains and can be recovered until the sectors are overwritten. Software utilities that overwrite individual data files or an entire hard drive are susceptible to error or malicious virus attack, and require constant modifications to accommodate new hardware and evolving computer operating systems. It is difficult for external software to reliably sanitize user data stored on a hard disk drive.

Many commercial software packages are available using variations of DoD 5220, making as many as 35 overwrite passes. But in today's drives, MULTIPLE OVERWRITES ARE NO MORE EFFECTIVE THAN A SINGLE OVERWRITE. Off-track overwrites could be effective in some drives, but there is no such drive external command for a software utility to move heads offtrack. And even three overwrites can take more than a day to erase a large capacity hard disk drive. In busy IT facilities, such time is often not available and IT personnel are likely to take short cuts.

DoD 5220 overwriting has other vulnerabilities, such as erasing only to a drive's Maximum Address, which can be set lower than its native capacity; not erasing reallocated (error) blocks; or miss extra partitions. External overwrites cannot access the reallocated sectors on most drives, and any data once recorded is left on these sectors. These sectors could conceivably be recovered and decoded by exotic forensics. While enterprise-class drives and drive systems (SCSI/FC/SAS/iSCSI) allow software commands to test all the user blocks for write and read ability, mass market drives (PATA/SATA) cannot read, write, or detect reassigned blocks since they have no logical block address for a user to access.

2543
@Fallkniven

Your key looks good now.

-----BEGIN PGP MESSAGE-----
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=iVcI
-----END PGP MESSAGE-----

2544
Security / Re: Destroying computer evidence.
« on: January 03, 2013, 12:52 am »
Is it true though that if you put a magnet to your harddrive that i'll break the access arm and render it unreadable? Say in a situation where they do kick in the door?

It'll do more than that. A hard disk is a magnetic platter. The "bits" are defined by the magnetic orientation of tiny portions of the platter. Running a strong magnet over it will flip all the bits in the same direction, like doing a write of all zeroes or ones. It's certainly the fastest form of data wiping if you do it right, so that may be your best option when the door is getting kicked in. DBAN takes 5-10 hours on an average hard drive to do 3 writes. A magnet takes a few seconds.

Well, say they get on your computer and you never cleaned it. Tor doesn't save any cache/history or any temp files right? Therefore no evidence of ever being on SR right? So is having tor on your system enough evidence to use against you in court?

Correct. It would be a huge privacy leak if it saved your browsing history to disk. If you save bookmarks or passwords, those will be saved to disk, though.

Tor isn't illegal. I don't think you could be convicted of a specific crime like attempting to purchase a controlled substance, just by having Tor on your computer.

2545
Security / Re: Destroying computer evidence.
« on: January 03, 2013, 12:33 am »
I learned in my IT class that if they are really hardcore searching your hdd, one write of zeros may not be enough.

As I said, it writes over the entire hard disk TWICE with random data, followed by one write of zeroes, so that's three writes total.

Are there any utilities that you guys know of that can write over it multiple times, I'm thinking like 16x at least!

Yes, DBAN. 16 times is overkill. NIST seems to believe that medical records are securely erased after a single write.

Look at this: https://en.wikipedia.org/wiki/Data_erasure#Number_of_overwrites_needed

Even ATA disk wipes, widely considered to be the most secure, do a single write.

But if you really want 16 writes, you could run DBAN 5 or 6 times. :)

2546
Security / Re: Destroying computer evidence.
« on: January 03, 2013, 12:11 am »
The National Institute of Standards and Technology approves of only one way to securely erase data like hospital records and sensitive government documents, and that's a full random write over the entire hard disk. Writing over individual files is unsafe on a journaled filesystem, and doubly so the way Windows defragments and moves files around. An individual file can be written to multiple locations on a hard disk, and a program that "securely erases" individual files will only write over the last location.

An boot disk like DBAN is your best option. It does two random writes followed by one write of zeroes to make it look like no data erasure / cover up happened. That's may seem extreme, because you have reinstall your OS, but anything less is mirage of security.

2547
@Fallkniven

You need to remove the extra blank lines from your key. The top of your key looks like this:

-----BEGIN PGP PUBLIC KEY BLOCK-----

Version: GnuPG v1.4.12 (MingW32)



mQINBFDkr54BEADQIDi3PlzERYpYVhrwmNIXWqsn26ktKonxS+z5Ptc/IXcQljQ/




It should look like this:

-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v1.4.12 (MingW32)

mQINBFDkr54BEADQIDi3PlzERYpYVhrwmNIXWqsn26ktKonxS+z5Ptc/IXcQljQ/




Likewise, there's an extra blank line at the bottom of your key, right before the END line, although the key imports successfully when I only fix the top.


Another thing is that the usual way to combine signing and encryption is to first sign a plaintext message, then encrypt the entire signature block. Here's what I mean:

-----BEGIN PGP MESSAGE-----
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=CsLk
-----END PGP MESSAGE-----

2548
@mikezolinski

-----BEGIN PGP MESSAGE-----
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=T6kB
-----END PGP MESSAGE-----

2549
@Fallkniven

-----BEGIN PGP MESSAGE-----
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=5E41
-----END PGP MESSAGE-----

2550
Off topic / Re: + KARMA
« on: January 02, 2013, 07:59 pm »
Ringing in the New Year with some karma for the people I could get.

+1

KandyKidd
PrincessHIGH
chil
blueveil
Printro
Ballzinator
GUS
TorGod
PizzaBrain
thelorax
anonman88
FBI
shakedown street
jnemonic
CrazyBart
BenJesuit
typtap
kitkat82
xl4
TheDevilsSon13
wetdog
Wadozo
tedrux
betaraybob
kingdedede
zapatista36

Pages: 1 ... 168 169 [170] 171 172 ... 208