Quote from: Looker on December 02, 2011, 05:53 pmThis example used 1 cipher to encrypt the data in question, mine uses 3 cascading ones. So I would challenge you or anyone else for that matter to attempt to compromise the security of this VM from the standpoint of decrypting it without the proper credentials or otherwise retrieving data from it. In fact I'd put $500USD on it.You can just send the $500 to my SR account, thanks.Quote from: Looker on December 01, 2011, 10:00 pmI will also offer to truecrypt it ahead of time (using 3 cipher cascade) for the USB buyers with the password of their choice which again at first boot there are instructions that load as soon as the VM starts that explain how to change it that a 10 year old could follow (I had a friend of mines son verify this, literally).From http://www.truecrypt.org/docs/changing-passwords-and-keyfilesQuoteNote that the volume header (which is encrypted with a header key derived from a password/keyfile) contains the master key (not to be confused with the password) with which the volume is encrypted. If an adversary is allowed to make a copy of your volume before you change the volume password and/or keyfile(s), he may be able to use his copy or fragment (the old header) of the TrueCrypt volume to mount your volume using a compromised password and/or compromised keyfiles that were necessary to mount the volume before you changed the volume password and/or keyfile(s)....Also note that if an adversary knows your password (or has your keyfiles) and has access to your volume, he may be able to retrieve and keep its master key. If he does, he may be able to decrypt your volume even after you change its password and/or keyfile(s) (because the master key does not change when you change the volume password and/or keyfiles).