I NEED FULL DISK ENCRYPTION RIGHT NOW

I NEED FULL DISK ENCRYPTION RIGHT NOW
they will come to my house soon, in 48 hours

I need fast advice and fast actions.
What software should I use and why? What are pros/cons?
There are: TrueCrypt, VeraCrypt, DiskCryptor, Jetico BestCrypt.

And how fast will the hdd encrypt?
Is it possible to use this software without rebooting?
Can I pause encryption and use computer while doing it?

Other urls found in this thread:

github.com/veorq/oee
johannes-bauer.com/linux/luksipc/
en.wikipedia.org/wiki/Rubberhose_(file_system)
twitter.com/SFWRedditImages

Stop being a pedo

Hope you enjoy your courtyard trip! :D

FAST, help or I'll throw HDD into oven at maximum temperature
or I will put other useless HDD and pretend it is my main, whereas main will be in my underwear

but I want to encrypt it now for additional security

Is BestCrypt NSA shill? Or is legit?

sudo hdparm --security-erase NULL

They can recover the files if it's not overwritten by any other file. Oven is your best choice.

my old hdd is encrypted backup. I can put it into computer and pretend it is my main HDD

and put my main real HDD into my underwear. But I want to encrypt it for maximum security. FAST. what to use how?

Do we help this guy or not, Holla Forums? He's clearly too dumb to type the word man into a terminal, so it's likely that anything we do to help is wasted effort.

...

it needs to go all the way up your ass

You can't really encrypt a disk that already has information on it, because setting up encryption is akin to reformatting. FDE is something that you have to think about from the beginning, not add on at the end. Besides, the police may be able to compel you to hand over the encryption key, if they can prove that doing so does not constitute self-incrimination.

If you're really worried about your computer, do the following:
shred -u for any file that you know you want to remove. This overwrites the file with random data and then deletes it, and is relatively fast.
sudo dd if=/dev/urandom of=/dev/sda will wipe your entire disk (I'm assuming it's mounted at /dev/sda) with random bytes. This will take quite a bit of time to run, especially if you have a large disk. That's why I'd recommend shredding important files first, since that way, if your door gets kicked in during the full disk wipe, you can at least guarantee that sensitive files have already been erased.

I'm computer expert, I know everything, don't worry


Why? FDE will overwrite everything (including free space).

I will tell that I forgot it, or give them wrong key. If they say I do so on purpose, I will deny.

That will remove the file.

Use base64. You'll be safe, no one is gonna read that shit.

Just use base64. Then there is no key, impossible for police to decrypt.

base64 is no encryption, it's encoding

Exactly. FDE will erase everything. That means that you won't have access to your files anymore.

Then you will be held in contempt of court, and you'll go to prison for even longer

Yes, but FDE will remove the file anyway.

Just burn down the house, tbh fam.

I have no idea what you're up to but whatever you do don't break your drive. If it's the law after you this will count as destroying evidence. Besides, you're supposed to smash it, not bake it. A smashed drive is harder to recover and doesn't make your house smell.
Similarly if you live in a country where not giving your password over counts against you, don't fill in your drive with random data. That looks like encrypted data and they'll ask you for the password, whether it exists or not.
Hiding a drive in your underwear is stupid. If it's the FBI, which it might be if this is sensitive enough, they will check every crack in your house for a MicroSD card. Do you really think they'll see your crotch bulge and think you're just getting off to the idea of being caught?

You have 48 hours. Find a plastic tupperware container and put the drive in it and seal it. Find somewhere in the middle of nowhere and bury it, and make sure it doesn't look too obvious and that nobody sees you. Buy another hard drive, install some Linux distro and normie out for a week or so.

Anyway. Who are "they", how do you know they're coming in 2 days and what is so dangerous that you have to hide it?

...

is Jetico BestCrypt shill?

Yeah, and it's a lot better.

it looks professional, but is made by private corporation from US

Which one to use and why?

LUKS

What did the cops call you and politely say they are coming over to Netflix and Chill or something?

Get v&, pedo scum

Are you the pedo that spammed a thread with cp on Holla Forums?

DBAN the drive, they will force you to give them the key.

HELP THEY COMMIN
my backhole is not ready

get fucked.

Start overwriting your drive with /dev/urandom right now. It will not work in time, but it could destroy data that would compromise you. You're probably smashing your hard drive right now though.

The reason you're formatting your drive is not because the police are coming, but because you wanted to reinstall your operating system with encryption (which is not illegal). Remember this.

NO
I want to start encrypting RIGHT NOW
tell me how and what software

I will tell them that I just encrypted it but password was long and I didn't write it down

Just fucking kill yourself.

Better buy a lot of vaseline and start lubing up then, because when you say that they'll help you remember. Whether you like it or not.

Just burn your pc.
If it's too hard, remove your HD, RAM, etc make a fire and toss them there one by one.
Don't be a retard and don't stay close to it while it burns.
Also, make sure to do a decent fire, those shit are hard to melt.
If you had a Torch and safety equipment this would be much much easier.

If you really don't want to burn it, bury it in the middle of nowhere.

STOP with stupid advice. I would rather go to jail for few years than lose my data


Now tell me, would you trust Jetico BestCrypt? Why nobody uses it outside of corporations?

What is best for FDE?
What is best for encrypted containers? Can I have dynamic-size containers?

You can't full disk encrypt when you already have shit on the drive. I'm trying to save your ass. The first step of encrypting would be formatting your drive in an unrecoverable way, such as running /dev/urandom. Then you would use LUKS.

I would tell you to move your valuable shit to a USB drive with encryption through Veracrypt, but that won't help you right now as the files are already on your drive even if they're "deleted". And it creates a suspicious USB drive that's encrypted.

Format now or get fucked in jail. At worst you'll get destruction of evidence over what is probably CP charges.

If you're posting this on that unencrypted disk, you are fucked. You have to format NOW. I'm not fucking around.


This post gave me another idea that will work much faster, but you have to move quick. Smash your hard drive. Now. Into bits. Put it into separate trash bags and put it in different public trash bins. Now grab another hard drive, or buy a small one from somewhere in cash. Put it in your computer. Install a lightweight linux distro. No encryption needed here, this is a distraction technique. Install a bunch of general use programs and make it seem like you've used this OS for a while. Bookmark reddit, facebook, etc etc.

Congrats, you should seem somewhat more innocent now.

shit thread, son
hehe
Just let it die, or bury it somewhere safe.

If your data is that important to you: Use Veracrypt to create an encrypted file on a USB drive. Mount that file and move all your important shit over there. Now you have to hide the USB drive. Give it to a friend and tell him to hold it for you. That's the best way to get it off your hands and know where it is.

You could avoid the USB and upload the encrypted file to Dropbox or another cloud provider, but police will see that you used their service, get a warrant to get the file, and then they have an encrypted file they know you made. Queue beating the password out of you.

Destroy your hard drive. I'm saving you from jail here.

STOP with stupid advice. I would rather go to jail for few years than lose my data


Now tell me, would you trust Jetico BestCrypt? Why nobody uses it outside of corporations?

What is best for FDE?
What is best for encrypted containers? Can I have dynamic-size containers?

Move data into an encrypted container (if I had to choose, use VeraCrypt) on another device, hide it somehow, then zero out your hard drive or destroy it.

Jail will give you time to learn to communicate properly, you fucking illiterate mongoloid.

Of course you can dumbass. FDE will encrypt and overwrite entire drive, including free space.

This shit doesn't work on Microsoft Windows.

Well I'm already suspicious, so it doesn't matter.

I already said clearly, I prefer jail over losing my data.

I'm not aiming to look innocent.


I didn't fell for SSD, I am using traditional HDD.


Do not have friends. How to get them ASAP?

How will they know I used Dropbox if I used proxies/Tor/VPN?

Do the second method with the distraction HDD (which you seem to have), and hide the USB with your encrypted data. Since you don't have friends, you need to think of a way you can hide it while assuming the cops will search every inch of your property. Put it in a safe deposit box at your bank. Leave it at your mothers house. Something like that. You have to be able to return to it assuming your house is cleared out and your person is searched.

I'm not the dumbass here, you're a windowsfag who wants to hide his HDD in his underwear. I'm saving you. You have to destroy the drive. Encryption will take too long anyway. Move your shit to an encrypted USB drive, and hide it. Then destroy the drive.

Encryption on a system with shit on it is unreliable.

As for dropbox, you could use a VPN if you have one. I'd still stay away from it, but consider if it's worth Dropbox having a copy of your (encrypted) files. Quantum computing will eventually come and they may still have a copy, meaning they can decrypt your files.

You will lose your data regardless of encryption when they confiscate your drives

If they find and confiscate them
But even then, they will have to give them back to me after they don't find anything, or I will sue them

They won't give it back (the government finds the government not guilty) and encrypted files means they did find something.

Why can't you do the USB method?

since you have all the answers why even ask questions here?

All of my USB and flash memory are full of encrypted backups.


I asked what software to use and how to get a FDE. And what algorithm to use.

Still waiting for answer.

Then hide the backup and destroy/overwrite the hdd.

Veracrypt on windows
Cryptsetup on Linux

install the program and follow the steps( assuming you use windows because a Linux user would look everything up and figure it out himself)

Does not matter much, AES is the fastest use that, hash sha512.

You got your answer

Bury your hard drive somewhere you can recover it later
Flee the country and start your new life
Come back after a few months and dig it up

tl;dr: You want it one way, but it's the other way.

I'm giving you this advice on the assumption that you're not trying to stockpile CP. Stop reading and neck yourself if you are.

First off, stop whining that we won't answer your stupid questions. If the state is already turning its gaze toward your computers and you're using Windows, you're already pwned. Anything at this point is damage control. Your opsec already has fatal flaws and encryption won't save you. Forget whether or not a Windows encryption tool is trustworthy because Windows itself is not.

You will not be allowed to keep anything that even vaguely resembles evidence. Doesn't matter what country you live in, lawsuits won't save them. The state does not care about your innocence, how much you spent on the hard drives, or how important the data is. If push comes to shove they'll buy you new hard drives.

Linux is your only option. Buy a new hard drive, create a Linux livedisk with something small like Puppy Linux, create an FDE container with LUKS, dump the files, and wipe the old one with random data. Algorithm doesn't really matter since none of the ones included with LUKS are significantly better than each other in security. If the cops don't come for you, breathe a sigh of relief because you got a second chance. Don't expect a third. If you touch Windows ever again, you deserve anything bad that happens to you.

Alright there, bud.

You know, you could have just made a normal thread about FDE instead of this shitty LARPing.

If you actually needed something fast you wouldn't come to a dead imageboard.

why not just put all your cp in a 7zip file with a password on it

Don't use urandom, it's too slow.

If you didn't do FDE from day 1 you're completely fucked as modern drives have some % of extra space they use for bad sectors and write balancing (SSDs) which you can't erase with a secure erase tool. Get out that dremel and start cutting.

I'd recommend the built-in encryption on SSDs from Samsung and Intel as it's strong enough to be standard in the enterprise and has zero performance impact. Be aware the setup is non-trivial.

zeroing out a drive doesn't always work. Forensic analysis can reveal information that may have persisted across writes. If you write all 0's, then it's an easier job, since they know that the last write was always a 0. With random data, it's nigh impossible to do this kind of analysis.

Those commands open the drive with a random master key.

The 0's will be encrypted into pseudorandom data.

it's stupid shit that doesn't support extended partitions, so it's useless

AES is only fastest when using hardware acceleration, which is insanely stupid to use


How to get new ID, name, etc


bullshit. show proofs

YEAH GOY IT'S ALL LOST DON'T ENCRYPT, ACCEPT MICROCHIP UNDER YOUR SKIN
if it's all lost why did snowden leaks tell they view truecrypt as 'catastrophic'?


Then come where? Lainchan is even deader.


that's sounds like a good option.
but, every time you extract it, it is dangerous (unencrypted), and after you stop using it you need to overwrite it few times


bullshit. only applicable to SSDs. HDDs are safe. And when you encrypt you actually overwrite HDD one time.


so encryption itself is overwriting it with nonzero data

Confirmed for larping.

Jesus Christ you are dumb. I suppose we shouldnt be surprised, considering you are a pedo.

Enjoy your time in jail.

No encryption needed, and your stuff is safe. Worst that can happen is that you forget where it is, and far into the future a race of aliens discover remnants of humanity and find your memes. You could be our Rosetta Stone, but you insist on bumbling about with shitty encryption.

Yes but it doesn't give you way to access the data. I could simply burn the disk in oven, same result.

How have you managed to live so long while being so stupid? Do you have to set an alarm to remind you to breathe?

Police have electronic sniffing dogs now.

Cover it in magnets to make the electronic sniffing dogs malfunction.
Or just seal the electronics in a plastic food container and bury it far away. Other side of a big town, or just somewhere nobody would bother to look.

use veracrypt and create a hidden volume. look at the Veracrypt instructions online. the most important thing you can do now is stay calm and make sure your passwords are good, and that they aren't written down anywhere

How can it even be proven that a random file is actually an encrypted container? I mean if there's no evidence of any files being accessed from it through thumbnail caches/recent files/things that the OS logs then it must be impossible right?

No it is not you stupid faggot, Rijndeal was chosen as the AES standard primarily because it was the fastest compared to serpent and twofish.

now GTFO

Assuming OP hasen't been V& maybe we could actually have a useful discussion.

What kind of data are you worried about loosing? Are they pictures and video files or are you a 1337 |-|4x0r and accessed some kind of database that you wern't supposed to?

How did you get caught?

How do you know that there after you and why do you specifically know it will happen in 48 hours?

How secure is that? Couldn't it be easily brute forced?

Not with AES-256

If you choose a strong passphrase, then no. 7zip uses AES256. It derives the master key from a SHA256sum of your password + a salt and iterates it 100,000+ times.

But it's not secure unless you're already using full disk encryption. If unencrypted data ever touches your disks (extracting / creating 7z), consider it recoverable by a forensics team until physically destroyed or a full wipe on a HDD (assuming sectors weren't relocated).

Is it possible to recover erased files off solid state?

Also keep your CP/or other illegal shit on a Micro SD card in easy reach, so if the police come to bust down your door you can easily eat it real fast.

lol

or you know, don't keep CP or illegal shit.

Micro sd cards are easy to eat, tinier than fingernail.. If you have the police bust down your door, how hard would it be to pull a tiny as card out and swallow it?

...

All these stupid scenario's and dumb solutions.

If you implement proper Opsec and correctly implement encryption there is no need for all this stupid shit. Full disk encryption is meant to protect your data at rest.

OP is a retard, his question got answered multiple times over but in each case the answer did not suit him, primarily because of his ignorance of the subject.

Except when your government can imprison you for contempt of court or whatever, for a couple of years.
The the autistic fantasies go out the window.

Not everyone lives in the UK or US

Can't remember if it was a kickstarter or something but people are at least trying to make edible sd cards

I have your answer right here OP, the best encryption imaginable
github.com/veorq/oee

That looks cool but there's nothing inside.

K so what about something like this

>Put alleged and unconfirmed cp/whatever else OP will go an hero if he looses, into a passworded 7zip

Fast and effective, no?

OP has all of a sudden stopped posting.
Kek.

Now that the tard is gone, what would you consider to be the safest encryption tool and encryption type? I plan on doing a FDE and I honestly have no idea on where to start.

Doesn't apply in every country, but if they want it they'll do their best to get it.
And OP doesn't seem like the smartest guy. They'd probably say their CP sniffer dog is alarmed by it and he'll break down and 'fess up.

If you can hide the drive so they can't find it your plan should be fine. Don't hide it in the house, because in the absolute worst case scenario the FBI will upturn everything big enough to hold a MicroSD card.

V& by Santa Clause smh

RIP Holla Forums

Come on, OP. Give up. It's just embarrassing.

This deserves a comic, but I'm too fucking lazy to make one.

V& by Santa's Party Sleigh for his Little Elves pictures

Hey guys

how do I safely encrypt my CHILD PORNOGRAPHY?

I want to escape justice in case I'm raided and keep everyone else from knowing I want to rape children!

My second HDD wasn't encrypted until a few days ago. Assuming OP's story isn't bait and he didn't get v&, cryptsetup-reencrypt could be useful to him.

Another bit of advice is to set up your drive with dm-crypt plain mode as LUKS headers won't be present. You'll have better plausible deniability with plain mode since there would be no proof that you don't have purely random data on the drive (maybe you test RNG for a hobby, i don't know). Although, with cryptsetup-reencrypt you can't use plain mode.

but who cares since OP is a lainchan nigger and a retard anyway

kek

I've heard that bleachbit wipes data so hard that not even God Himself can read it. Just tell them you wiped it with like a cloth or something.

If you go to jail for a few years you're gonna lose your illegal fucking data anyway you dipshit.

shit fam u still there? upload the file on the internet if its fast enough.

dev/urandom your old shit then install a normie distro or buy a brand new HDD. best thing to do is to entrust the hard drive to someone if it's really important say it's a science breakthrough or matrix conspiracy shit then give it to the pizza delivery guy or someone you can really trust.

RIP in pieces OP

12/25/16

ctrl+f truec
3 results
no one mentions truecrypt is the ONLY encryption tool that has been fully audited and is confirmed safe
no one mentions it is fully cross platform
truecrypt has and prob always will be the NUMBER ONE encryption tool

Don't bother encrypting, just shred every file and smash storage media into bits before dumping in lake. Then have suicide pills ready still just incase.

What are the odds that OP is just a pedo?

you paedos need to be strung up on lampposts

You know what I use to control my urge to rape every legal aged woman I see? Will power. Kill yourself pedo

I wish I knew that before losing gigs of memes.

RIP OP I'm glad you're dead

rip fgt

Rest in pieces, OP. It was nice knowing you while you still retained command over your rectum.

Just send the FBI an email explaining that you don't even know how to use a computer. Trust me, it will work.

So you actually have urges to rape real women and have to rely on willpower to stop yourself because you're so weak? No wonder you sound so edgy. You're obviously a potential rapist and should kill yourself before you eventually snap and hurt someone

Seeing OP's thread made me wonder... I don't have anything illegal in my unencrypted HDD, but say, hypothetically, that there iyys a possibility it'll get confiscated for a legit reason. They don't find anything, and instead of returning it they fabricate some evidence because they *know* I'm guilty but can't prove it. So... Would FDE help in this case? I mean I have nothing to hide but otherwise what's keeping them from filling my HDD with fabricated evidence if they want me in jail? I use Tor for legal purposes sometimes so they could just say they can't track where the material came from but it could have been from this or that Tor session. On the other hand I'd voluntarily supply the unencryption key so I guess with that it's useless to have FDE in the first place since they can unencrypt it and do the aforementioned process (though my POV would be more compelling given that I cooperate).

If you have any forewarning that the police would like to look at your disk, you could always run a quick hash on the disk contents in the presence of a lawyer or third party. Then, if anything gets added/removed, the hash won't match and you can prove that it was tampered.

All men are potential rapists tbh

Better to do this instead:
cryptsetup create sda-wipe /dev/sda --key-size 256 --key-file /dev/urandom;
dd if=/dev/zero of=/dev/mapper/sda-wipe;
cryptsetup remove sda-wipe;

Will wipe faster, as AES should be as secure as SHA256 hash function.

How was your ”chat” with the police?

That is a good idea for data storage disks, but what about the disk I use day-to-day? The hash would change by merely turning the computer on.

ITT: Cop asks if community trusts Jetico Bestcrypt

Anyone has any ideas for this?

Friend was a admin for some comunity server, once some kid hacked into it.
The kid formated his hhd, police let him of the hock, because it was to much work for them to reconstruct it.

So format your hdd a dozen times, put a new OS on it and fill it with programs and trash.
They will suspect its not associated and do a lax probing of it.
Dont forget to create a "clone" of your old hdd onto a new hdd which the inspectors will think has the information they are looking for.

The easyest thing is just to let it dissapear. Put it in a plastic bag and hide it in the forest.

The art of deception ;^)

Yes and no. It depends on how old the data is.
You should be aware that your hdd is not perfect and for this will not live forever. Over time the writting head of the hdd, will "move" it will not write on the same spot as on the first day.
So if your data is 2 years old and you want to erase it, it will only be partially overwritten, a criminalistic labratory or a reconsruction labratory will be able to read "between the lines".

In this case you have no other choise but to get rid of the hdd

When I say new OS, use a diffrent one

This.

Or use a hammer.

Encrypted HDD is dangerous territory nowadays.

Would a higher capacity disk be less suceptible to this?

Maybe he is just roleplaying.

Of course he is. This was the retard's way to get the board to provide tech support/software recommendations to him, because he's too fucking stupid to use the sticky.

Install linux. Install cryptsetup. Use cryptsetup to create an encrypted partition with a strong passphrase. Move all of your sensitive files to the encrypted partition. Wipe all other partitions that contained sensitive files, with dd or something. Unless you're hiding state secrets, you're now reasonably secure.

There is a tool for in-place luks conversion if you don't have any place to where you can store your files when encrypting the disk.

johannes-bauer.com/linux/luksipc/

number one unmaintained ?junk
stay happy with your false security m9

If the state wants you in jail just tuck in an clench your ass because you're in for a butt rape.

My only advice is to belong outside the six degrees of separation and use pseudo identities and a lot of disguise : )

Wow, great advice, thanks.

Thermite motherfucker, it can get up t-
F

What about rubberhose?
en.wikipedia.org/wiki/Rubberhose_(file_system)

It's been unmaintained for almost 2 decades.