What's new
  • ICMag with help from Landrace Warden and The Vault is running a NEW contest in November! You can check it here. Prizes are seeds & forum premium access. Come join in!

Encrypting Your Hard Drive?

cashmunny

Member
there is no encryption that cannot be un-encrypted...
especially on standard commercial hard drives. w/ standard commercial operating systems.

I suppose that's true, but if it takes longer than the age of the universe with computers that don't even exist yet to decrypt the information, I would think you are safe.

There is a sculpture called Kryptos by artist Jim Sanborn in front of the CIA building with a code embedded in it that no one in the CIA has been able to crack for almost 20 years.
 

*mistress*

Member
Veteran
I suppose that's true, but if it takes longer than the age of the universe with computers that don't even exist yet to decrypt the information, I would think you are safe.

There is a sculpture called Kryptos by artist Jim Sanborn in front of the CIA building with a code embedded in it that no one in the CIA has been able to crack for almost 20 years.
they wouldnt tell you if they did crack it anyway.
which they wouldnt place there, if it wasnt already...
cracked...

puzzle palace. a book. kind of old. the tech is out there. there are those that take over entire websites & remove all members to another forum. forums of hackers getting hacked...

encryption is primarily a software barrier. once get into and/or/nand/nor gates, or hardware, 1's & 0's become easier to manage... most havnt even gotten into own registry... very simple. there are machines as big as cities w/ nothing to do but :wallbash:#'s...

enjoy your garden!
 

ItsAllOver

Devil's Advocate
This is where my assumption that smash/burn will work comes from.
Burn alone might be just fine, but not quick enough to do. A hammer will stop the feds from finding things on my computer about my mj grow. I'm not coordinating international terror attacks, so I doubt they'd go the necessary lengths to reconstruct a hammer-smashed hard drive.
Anyway sorry I have been OT!

BTW I don't see that there's any evidence to logically conclude that Kryptos has been cracked and we just don't know... It could just be gibberish that Sanborn's smart ass created to make lots of CIA folks waste their time. Have to admit that would be a bit funny. I suppose he'll tell us on his death bed! :)
 
Hey all you computer geeks out there and in here figure this one out. @%^R#S@G&U$$^BBH. If you create your own language and symbols its most likely secure. Im not too worried im small fry. Guess the double knot 7 spy got spied on. The British feds have cameras up everyones ass.
:bat:
 

*mistress*

Member
Veteran
not the **a that does this work.
its **a... among other groups.
there are over 30,000 satellites in orbit. many com sat's...

again. 2 books should give you a rough estimate of capabilitites of nsa...

-puzzle palace, circa 1980's.
-shadow factory, circa 2007-08.

same author.
james bamford.

may be startling to some, but every digital communication can be recorded. again, just 1's & 0's. only limitation is data storage.
data storage is not issue w/ san's, holographic memory & the entire cities of memory in existence...
as for making your own code; sure could work. as long at it is changed daily. otherwise patterns reveal content.

teraflop calculations per second is openly-commerically available.

this does not even bring into discussion ech*lon, carniv*re, tr*p & tr*ce devices, p*n-*egisters, ke**troke counters, etc... assuming you were able to mask/encrypt youyr hard drives. there are those that would just record key-st*okes & re-assemble them.

point is, for every machine in existence, there is a spec-sheet or flow chart to reverse-engineer it. an encryption computer fails when a computer that has greater computing capacity cruches #'s & finds patterns.
encrytion companies/software engineers/isp's, etc. will not deny gov access to back-door access to encrypt programs; they usually supply own facilities to make such access possible.

see *t&t communications hub, they set up a room that simply downloaded all of the traffic coming thru that hub. voice, data, voip, etc... then filtered it out for keywords, etc...

they are here on icmag, too...

navigate to:
forum menu
who's online
bottom of page, select dialog box 'search bots'

the industry standard for clearing a hard drive is ~35+ times of clearing data. even then, some 1's & 0's can be found in the layers of read/write, & re-constructed.

from the link provided:
Overwriting:

Using a program such as Kill Disk or Derek's Boot and Nuke (DBAN) overwrites the data with varying patterns of ones and zeros. DBAN is free and KD has a free version that only makes three passes. The FBI suggests at least nine passes with such a program to cover the data on the drive. One can find these programs here in CNET's Download section, but I suggest going to the home site of the program to learn even more about it. With sophisticated forensics software (such as what a government, or even a large corporate, entity has available) it IS still possible to uncover data or portions of data on the drive in question after a "wiping" program is used.

Destruction:

The ONLY way to completely and irrevocably destroy data on a hard drive is to destroy the platter(s) of the hard drive itself/selves. One must make double sure that there is absolutely NOTHING left of the platter(s)!!!...but ashes or almost sandy particles. There have been several methods discussed here, of which, you may find useful.
this may also be helpful:
http://www.eff.org/ns*/faq#1

there are also a few old thread in this forum relevant to zero'ing out a hd ~35+ times...


enjoy your garden!
 

ItsAllOver

Devil's Advocate
Nice reply. Sorry for the mis-type on the CIA-NSA thing! I must have had a serious brain fart. I read Simon Singh's The Code Book a long time ago and got into cryptography for a little while... That was some cool stuff, but I never sought any more resources really. I'll have to check those books out! Thanks!
 

wintermute

Member
Of Entropy and Randomness Oh My!

Of Entropy and Randomness Oh My!

they wouldnt tell you if they did crack it anyway.
which they wouldnt place there, if it wasnt already...
cracked...

It is not cracking if you are the designer of it! He will take it to the grave, oh well... (And they do tell when they solve part of it, it is just for fun after all and they rarely ever get bragging rights. Gotta beat amatuer cryptologists to punch! :)

For secure deletion:
Use full disk encryption. To destroy data, destroy the disk keys on USB or wherenot. Much easier and you render platters full of nothing just the same! If your filesystem supports encryption you can delete FS by wiping those keys like in ZFS.

ALSO: Some crypto is safe even if new world order had quantum computers the size of cities! Quantum search sucks compared to quantum Shor's Algorithm. A good Symmetric Block Cipher disk encryption is secure well into our lifetimes no matter quantum or huge computers. RSA and DiffieHellman and other public key are screwed in post quantum land though, oops!
 
Last edited:

wintermute

Member
Pre-Boot Authentication

Pre-Boot Authentication

let me pose this question, if we encrypt everything and that stuff is safe. But what if the the cops get ahold of our account name some how because we forgot to log out of the Cannagraphic forms.

The way good Full Disk Encryption works is you first authenticate with the pre-boot FDE software. This might entail inserting a USB fob with disk keys and entering a passphrase to decrypt the hard disk and boot into your Operating System.

If you save your login password in your browser, even leave grow pics on your desktop it does not matter. They cannot boot the machine without the pre-boot auth USB and or passphrase! They cannot even tamper with the operating system to install keylogging software to try and capture the passphrase.

If you access icmag directly from your home and post detailed grow info unencrypted without HTTPS! you are not being too careful and this might be risky. Setup a proxy tunnel or VPN as recommended in other threads on your FDE protected OS. They got absolute zero then!
 

gardenlover

Member
So I am currently running a mac from a verizon wireless card. I would like to set up my computer so that no prying eyes legal or legal can see my info. What is th best software and how hard is a proxy tunnel to set up?

Thanks Wintermute
 

h&r

Member
don't use hardrives, remove them, just use a thumb drive with a persistent OS on it and keep that drive on you at all times.

If you really need security that bad and find yourself in an emergency have a way to fry the chips on it by over-volting them.

gardenlover look into a vpn I get a free intl vpn with my usenet service.



But I think just because you visit ICMAG you shouldn't necessarily want to be hiding anything.

Seeing Weed-sites on the net isn't really a big deal.....

I think you guys smoke too much and are paranoid.

Just use VPN and your ISP wont be able to see or shape any of your traffic. (wont know what sites your hitting)
 
M

medi-useA

I'm interested in setting one up in Linux on a flash drive...what would you recommend?

muA
 

Hythloth

New member
How can they force you to give up your encryption keys? Doesn't that break people's 5th amendment rights by forcing them to incriminate themselves?
 

anonnoats

Member
How can they force you to give up your encryption keys? Doesn't that break people's 5th amendment rights by forcing them to incriminate themselves?

There are actually several ways you can forced to give up your encryption keys. It turns out that when you go through an airport or customs that those rights are waived through some magical, convenient loophole. Additionally, depending on your country, you can go to jail for longer if you refuse to give up your encryption keys.

A lot of good things have been said here already so I won't repeat them. However, everyone should use full disk encryption, no matter what. The issue goes beyond law enforcement troubles and into one of data and personal privacy.
 

RetroGrow

Active member
Veteran
Hey all you computer geeks out there and in here figure this one out. @%^R#S@G&U$$^BBH. If you create your own language and symbols its most likely secure. Im not too worried im small fry. Guess the double knot 7 spy got spied on. The British feds have cameras up everyones ass.
:bat:

Just put everything in Pig Latin. :)
 

Latest posts

Latest posts

Top