Silk Road forums

Discussion => Security => Topic started by: kittenfluff on April 29, 2013, 10:00 am

Title: Elcomsoft Forensic Disk Decryptor - Encryption broken?! No...
Post by: kittenfluff on April 29, 2013, 10:00 am
Someone in this thread:

http://dkn255hz262ypmii.onion/index.php?topic=153092.0

Dropped a bomb:

Quote
I want you people to realize something. There is software on the market that can crack PGP. Some of you already know of it. LE has it. If Atlantis is a DEA honeypot, then even if you use PGP when transferring your personal information, they could still be saving and decrypting every single one of your messages.

I believe that Atlantis is a DEA honeypot and that the DDOS attacks are being made in order to drive users to Atlantis, where the DEA will have access to all of their communications due to the fact that they can crack your PGP.

http://www.elcomsoft.com/efdd.html

That's the software. If you put in an order over Atlantis, then they can store your PGP message and decrypt it at their leisure using this software.

By Overjoyed
:o :'(

And I shit my knickers. I had never heard of this and was ever so slightly worried someone had gotten round the P vs NP problem or some other such thing. Maybe some kind of statistical analysis... dunno... anyhow, I had a quick nose around and thought I'd post this here - there's no need to worry, but some need to alter behavior!

First, good news - public key encryption is still totally safe! You can send PGP encrypted msgs to each other without worrying about others reading it; this software does not even claim to be able to do this!

 ;D ;D ;D ;D ;D ;D ;D ;D

Now the bad news - apparently there are IT based hacks to obtain encryption keys from PCs running encrypted volumes/drives. AFAIK from what I've just read (links at bottom of post) their software obtains the encryption keys from memory sources in the computer; hibernation memory, memory dumps, RAM etc. Biggest weakness seems to be having your computer running or in hibernation/sleep mode. I'm going to scout about for a definitive list of how to prevent having your discs read, but it seems that LE would actually have to have your PC in their physical possession and have it running and logged in - probably if you're in that situation it's already too late  :-\

Like I say, I will be looking to post better, more detailed info ASAP. But TBH I suspect that most encryption software that's effected and is open source will have new versions released that plug the loopholes.

Let me re-iterate - LE CANNOT CRACK PGP MESSAGES THAT WE SEND. THE SOFTWARE IS ONLY USEFUL FOR DECRYPTING VOLUMES/DRIVES UNDER SPECIFIC SETS OF CIRCUMSTANCES.

Check out these pages:

https://mocana.com/blog/tag/elcomsoft-forensic-disk-decryptor/
Quote
There are caveats. For example, the computer must already be running and must be able to provide a memory dump. Thus the real danger might be when the laptop is left in hibernation, when both conditions are true.

The workaround, therefore, is to not put your encrypted hard drive into hibernation, or at least unmount the encrypted drives before it slips into hibernation mode if using any of the encryption packages mentioned above.

http://it.slashdot.org/story/12/12/20/1850201/elcomsoft-tool-cracks-bitlocker-pgp-truecrypt-in-real-time
Quote
Yeah, this is really just exploiting retarded key control. The encryption standards themselves are still secure

http://community.spiceworks.com/topic/285302-would-anyone-take-this-threat-seriously-enough-to-switch-encryption-software
Quote
It says it pulls the key from a ram dump. So yes it could [work] but not in a real world environment.

https://www.informationweek.com/security/encryption/forensic-tool-cracks-bitlocker-pgp-truec/240145127
Quote
"BitLocker, PGP and TrueCrypt set [an] industry standard in the area of whole-disk and partition encryption," said ElcomSoft CEO Vladimir Katalov in a blog post. "All three tools provide strong, reliable protection, and offer a perfect implementation of strong crypto." As a result, he said that if a user of those tools picks a long, complex password, cracking the encryption container outright would likely be impossible.
Title: Re: Elcomsoft Forensic Disk Decryptor - Encryption broken?! No...
Post by: kmfkewm on April 29, 2013, 02:59 pm
Somebody claiming that RAM dumps are == to breaking encryption?! It must be a day ending in y.

ALL encryption systems are weak to this sort of attack. If your private keys are compromised, so is the encryption. There are techniques you can use to make this sort of attack harder to pull off, but an attacker who can do this has already severely pwnt you. Either they have gained remote access to your OS, meaning you have been hacked and pwnt, or they have physical access to your computer, meaning the police kicked your door down and they are standing next to your system. Even in these cases you are not 100% weak to this sort of attack, but given that one of these two requirements must be met for you to be weak to this attack at all, you can sleep soundly still. The biggest worry would be Atlantis (or someone who compromises SR, on the seemingly reasonable assumption that we can trust DPR) doing a MITM attack on key exchange.
Title: Re: Elcomsoft Forensic Disk Decryptor - Encryption broken?! No...
Post by: finally55 on April 29, 2013, 03:16 pm
Yeah - without access to the hard drive of the machine that generated the key, I don't think they have any way of decrypting encrypted messages...
Title: Re: Elcomsoft Forensic Disk Decryptor - Encryption broken?! No...
Post by: SelfSovereignty on April 29, 2013, 03:26 pm
I am so sick of seeing this stupid piece of software mentioned on this forum... ugh.  Drives me bloody insane every time.
Title: Re: Elcomsoft Forensic Disk Decryptor - Encryption broken?! No...
Post by: kittenfluff on April 29, 2013, 03:34 pm
I am so sick of seeing this stupid piece of software mentioned on this forum... ugh.  Drives me bloody insane every time.

Sorry, first I'd seen it. Only been let out of noob-pergatory recently....
Title: Re: Elcomsoft Forensic Disk Decryptor - Encryption broken?! No...
Post by: astor on April 29, 2013, 03:35 pm
There are techniques you can use to make this sort of attack harder to pull off

Presumably you're talking about TRESOR. Another reason Linux > Windows. You can hack it to make it safer, if you're competent enough to do so.
Title: Re: Elcomsoft Forensic Disk Decryptor - Encryption broken?! No...
Post by: SelfSovereignty on April 29, 2013, 04:01 pm
I am so sick of seeing this stupid piece of software mentioned on this forum... ugh.  Drives me bloody insane every time.

Sorry, first I'd seen it. Only been let out of noob-pergatory recently....

Eh, it's alright... I ignore the search function too; the stupid "last search 5 seconds fuck you blah-blah" message you get half the time is just too aggravating when it takes 5 seconds just to find out it didn't work.  I'm just moody today.  I think I need more drugs... yes, definitely need more drugs...