Silk Road forums

Discussion => Security => Topic started by: PaulMuadDib on August 09, 2012, 01:29 pm

Title: TrueCrypt Question
Post by: PaulMuadDib on August 09, 2012, 01:29 pm
Where should I store my true-crypt key file? 

Is it a security risk to have this easily accessible outside my encrypted flashed drive??
Title: Re: TrueCrypt Question
Post by: Nigerian Prince on August 09, 2012, 01:38 pm
If you use a sufficiently strong password, it shouldn't matter if your TrueCrypt file is found in the sense that they still won't be able to decrypt the data.

However, you may still want to keep it in a hidden location, such as in a folder with files with similar sizes and names or on an easily destroyed flash drive. The use of encryption itself can raise suspicions against you, and in fact if you live in the UK you should be aware of a bizarre law that requires people to disclose their private keys and passwords (noncooperation carries a maximum prison sentence of 2 years).

Edit: In addition to the above, you could consider a hidden volume inside your TrueCrypt file for plausible deniability.
Title: Re: TrueCrypt Question
Post by: PaulMuadDib on August 09, 2012, 02:01 pm
Yeah I got the partition filled with plausible degraded PORN that would need hiding from my girlfriend........'Sorry officer sometimes I feel like a lady with a cock!'  lol

But I was worried specifically about the key file that I use in combination with a strong password to open my hidden drive.
Title: Re: TrueCrypt Question
Post by: vlad1m1r on August 09, 2012, 04:07 pm
Yeah I got the partition filled with plausible degraded PORN that would need hiding from my girlfriend........'Sorry officer sometimes I feel like a lady with a cock!'  lol

But I was worried specifically about the key file that I use in combination with a strong password to open my hidden drive.

Tell me of your homeworld Usul!

Sorry, sorry..

Anyway as the Nigerian Prince rightly says you're doing the right thing by having a hidden partition and MOST importantly filling the main volume with something you would reasonably want to encrypt like chicks with dicks.

You should bear in mind that if you want plausible denial for encryption, the keyfiles generated by Truecrypt itself might be a giveaway. As such I'd suggest you use an innocuous compressed file such as an MP3 - download a few hundred to your hard drive and select one or more at random to be your Keyfile.

May the hand of God guide us..

V.
Title: Re: TrueCrypt Question
Post by: sourman on August 09, 2012, 04:52 pm
Also, if you can, keep the entire drive containing the hidden partition in storage when not immediately in use. LE can tell that your fake OS was never used, and if it's on a drive sitting in a computer that they know has been on recently, it's pretty obvious that you are using a hidden OS and not the fake one containing dickgirl porn. All they have to do is check the file access dates. Since you can't boot up the fake OS without risking corruption of the hidden partition, there's no way you can easily make it look "used". By storing it outside of the computer, you now have the option of claiming the drive contains some old backups that you forgot about.