I NEED FULL DISK ENCRYPTION RIGHT NOW they will come to my house soon, in 48 hours
I need fast advice and fast actions. What software should I use and why? What are pros/cons? There are: TrueCrypt, VeraCrypt, DiskCryptor, Jetico BestCrypt.
And how fast will the hdd encrypt? Is it possible to use this software without rebooting? Can I pause encryption and use computer while doing it?
FAST, help or I'll throw HDD into oven at maximum temperature or I will put other useless HDD and pretend it is my main, whereas main will be in my underwear
but I want to encrypt it now for additional security
Jeremiah Kelly
Is BestCrypt NSA shill? Or is legit?
Kevin Phillips
sudo hdparm --security-erase NULL
Ryan Robinson
They can recover the files if it's not overwritten by any other file. Oven is your best choice.
William Anderson
my old hdd is encrypted backup. I can put it into computer and pretend it is my main HDD
and put my main real HDD into my underwear. But I want to encrypt it for maximum security. FAST. what to use how?
Gavin Long
Do we help this guy or not, Holla Forums? He's clearly too dumb to type the word man into a terminal, so it's likely that anything we do to help is wasted effort.
Michael Harris
...
Brody Cooper
it needs to go all the way up your ass
Lincoln Parker
You can't really encrypt a disk that already has information on it, because setting up encryption is akin to reformatting. FDE is something that you have to think about from the beginning, not add on at the end. Besides, the police may be able to compel you to hand over the encryption key, if they can prove that doing so does not constitute self-incrimination.
If you're really worried about your computer, do the following: shred -u for any file that you know you want to remove. This overwrites the file with random data and then deletes it, and is relatively fast. sudo dd if=/dev/urandom of=/dev/sda will wipe your entire disk (I'm assuming it's mounted at /dev/sda) with random bytes. This will take quite a bit of time to run, especially if you have a large disk. That's why I'd recommend shredding important files first, since that way, if your door gets kicked in during the full disk wipe, you can at least guarantee that sensitive files have already been erased.
Dylan Sullivan
I'm computer expert, I know everything, don't worry
Why? FDE will overwrite everything (including free space).
I will tell that I forgot it, or give them wrong key. If they say I do so on purpose, I will deny.
That will remove the file.
Charles Brown
Use base64. You'll be safe, no one is gonna read that shit.
Aaron Gutierrez
Just use base64. Then there is no key, impossible for police to decrypt.
Joseph Bailey
base64 is no encryption, it's encoding
Nolan Roberts
Exactly. FDE will erase everything. That means that you won't have access to your files anymore.
Then you will be held in contempt of court, and you'll go to prison for even longer
Yes, but FDE will remove the file anyway.
Thomas Turner
Just burn down the house, tbh fam.
Henry Hill
I have no idea what you're up to but whatever you do don't break your drive. If it's the law after you this will count as destroying evidence. Besides, you're supposed to smash it, not bake it. A smashed drive is harder to recover and doesn't make your house smell. Similarly if you live in a country where not giving your password over counts against you, don't fill in your drive with random data. That looks like encrypted data and they'll ask you for the password, whether it exists or not. Hiding a drive in your underwear is stupid. If it's the FBI, which it might be if this is sensitive enough, they will check every crack in your house for a MicroSD card. Do you really think they'll see your crotch bulge and think you're just getting off to the idea of being caught?
You have 48 hours. Find a plastic tupperware container and put the drive in it and seal it. Find somewhere in the middle of nowhere and bury it, and make sure it doesn't look too obvious and that nobody sees you. Buy another hard drive, install some Linux distro and normie out for a week or so.
Anyway. Who are "they", how do you know they're coming in 2 days and what is so dangerous that you have to hide it?
Ayden Gray
...
Wyatt Foster
is Jetico BestCrypt shill?
Thomas Walker
Yeah, and it's a lot better.
Colton Taylor
it looks professional, but is made by private corporation from US
Nicholas Foster
Which one to use and why?
Henry Nguyen
LUKS
Benjamin Rivera
What did the cops call you and politely say they are coming over to Netflix and Chill or something?
Jason Powell
Get v&, pedo scum
Are you the pedo that spammed a thread with cp on Holla Forums?
Luke Hill
DBAN the drive, they will force you to give them the key.
Gabriel Butler
HELP THEY COMMIN my backhole is not ready
Isaac Hughes
get fucked.
Gavin Perez
Start overwriting your drive with /dev/urandom right now. It will not work in time, but it could destroy data that would compromise you. You're probably smashing your hard drive right now though.
The reason you're formatting your drive is not because the police are coming, but because you wanted to reinstall your operating system with encryption (which is not illegal). Remember this.
Wyatt Thompson
NO I want to start encrypting RIGHT NOW tell me how and what software
I will tell them that I just encrypted it but password was long and I didn't write it down
Adam Lewis
Just fucking kill yourself.
Dylan Parker
Better buy a lot of vaseline and start lubing up then, because when you say that they'll help you remember. Whether you like it or not.
Blake Long
Just burn your pc. If it's too hard, remove your HD, RAM, etc make a fire and toss them there one by one. Don't be a retard and don't stay close to it while it burns. Also, make sure to do a decent fire, those shit are hard to melt. If you had a Torch and safety equipment this would be much much easier.
If you really don't want to burn it, bury it in the middle of nowhere.
Angel Barnes
STOP with stupid advice. I would rather go to jail for few years than lose my data
Now tell me, would you trust Jetico BestCrypt? Why nobody uses it outside of corporations?
What is best for FDE? What is best for encrypted containers? Can I have dynamic-size containers?
John Torres
You can't full disk encrypt when you already have shit on the drive. I'm trying to save your ass. The first step of encrypting would be formatting your drive in an unrecoverable way, such as running /dev/urandom. Then you would use LUKS.
I would tell you to move your valuable shit to a USB drive with encryption through Veracrypt, but that won't help you right now as the files are already on your drive even if they're "deleted". And it creates a suspicious USB drive that's encrypted.
Format now or get fucked in jail. At worst you'll get destruction of evidence over what is probably CP charges.
If you're posting this on that unencrypted disk, you are fucked. You have to format NOW. I'm not fucking around.
This post gave me another idea that will work much faster, but you have to move quick. Smash your hard drive. Now. Into bits. Put it into separate trash bags and put it in different public trash bins. Now grab another hard drive, or buy a small one from somewhere in cash. Put it in your computer. Install a lightweight linux distro. No encryption needed here, this is a distraction technique. Install a bunch of general use programs and make it seem like you've used this OS for a while. Bookmark reddit, facebook, etc etc.
Congrats, you should seem somewhat more innocent now.
Jace Williams
shit thread, son hehe Just let it die, or bury it somewhere safe.
Aiden Butler
If your data is that important to you: Use Veracrypt to create an encrypted file on a USB drive. Mount that file and move all your important shit over there. Now you have to hide the USB drive. Give it to a friend and tell him to hold it for you. That's the best way to get it off your hands and know where it is.
You could avoid the USB and upload the encrypted file to Dropbox or another cloud provider, but police will see that you used their service, get a warrant to get the file, and then they have an encrypted file they know you made. Queue beating the password out of you.
Destroy your hard drive. I'm saving you from jail here.
Luis Turner
STOP with stupid advice. I would rather go to jail for few years than lose my data
Now tell me, would you trust Jetico BestCrypt? Why nobody uses it outside of corporations?
What is best for FDE? What is best for encrypted containers? Can I have dynamic-size containers?
Bentley Perry
Move data into an encrypted container (if I had to choose, use VeraCrypt) on another device, hide it somehow, then zero out your hard drive or destroy it.
Camden Gutierrez
Jail will give you time to learn to communicate properly, you fucking illiterate mongoloid.
Lincoln Sanchez
Of course you can dumbass. FDE will encrypt and overwrite entire drive, including free space.
This shit doesn't work on Microsoft Windows.
Well I'm already suspicious, so it doesn't matter.
I already said clearly, I prefer jail over losing my data.
I'm not aiming to look innocent.
I didn't fell for SSD, I am using traditional HDD.
Do not have friends. How to get them ASAP?
How will they know I used Dropbox if I used proxies/Tor/VPN?
Blake Cooper
Do the second method with the distraction HDD (which you seem to have), and hide the USB with your encrypted data. Since you don't have friends, you need to think of a way you can hide it while assuming the cops will search every inch of your property. Put it in a safe deposit box at your bank. Leave it at your mothers house. Something like that. You have to be able to return to it assuming your house is cleared out and your person is searched.
I'm not the dumbass here, you're a windowsfag who wants to hide his HDD in his underwear. I'm saving you. You have to destroy the drive. Encryption will take too long anyway. Move your shit to an encrypted USB drive, and hide it. Then destroy the drive.
Encryption on a system with shit on it is unreliable.
As for dropbox, you could use a VPN if you have one. I'd still stay away from it, but consider if it's worth Dropbox having a copy of your (encrypted) files. Quantum computing will eventually come and they may still have a copy, meaning they can decrypt your files.
Nicholas Green
You will lose your data regardless of encryption when they confiscate your drives
Connor Butler
If they find and confiscate them But even then, they will have to give them back to me after they don't find anything, or I will sue them
Andrew Sanders
They won't give it back (the government finds the government not guilty) and encrypted files means they did find something.
Why can't you do the USB method?
Caleb Rogers
since you have all the answers why even ask questions here?
Lincoln Gonzalez
All of my USB and flash memory are full of encrypted backups.
I asked what software to use and how to get a FDE. And what algorithm to use.
Still waiting for answer.
Connor Evans
Then hide the backup and destroy/overwrite the hdd.
Adam Fisher
Veracrypt on windows Cryptsetup on Linux
install the program and follow the steps( assuming you use windows because a Linux user would look everything up and figure it out himself)
Does not matter much, AES is the fastest use that, hash sha512.
You got your answer
Connor Bennett
Bury your hard drive somewhere you can recover it later Flee the country and start your new life Come back after a few months and dig it up
Blake Sanchez
tl;dr: You want it one way, but it's the other way.
I'm giving you this advice on the assumption that you're not trying to stockpile CP. Stop reading and neck yourself if you are.
First off, stop whining that we won't answer your stupid questions. If the state is already turning its gaze toward your computers and you're using Windows, you're already pwned. Anything at this point is damage control. Your opsec already has fatal flaws and encryption won't save you. Forget whether or not a Windows encryption tool is trustworthy because Windows itself is not.
You will not be allowed to keep anything that even vaguely resembles evidence. Doesn't matter what country you live in, lawsuits won't save them. The state does not care about your innocence, how much you spent on the hard drives, or how important the data is. If push comes to shove they'll buy you new hard drives.
Linux is your only option. Buy a new hard drive, create a Linux livedisk with something small like Puppy Linux, create an FDE container with LUKS, dump the files, and wipe the old one with random data. Algorithm doesn't really matter since none of the ones included with LUKS are significantly better than each other in security. If the cops don't come for you, breathe a sigh of relief because you got a second chance. Don't expect a third. If you touch Windows ever again, you deserve anything bad that happens to you.
Eli Stewart
Alright there, bud.
You know, you could have just made a normal thread about FDE instead of this shitty LARPing.
Xavier Green
If you actually needed something fast you wouldn't come to a dead imageboard.
Ayden Jackson
why not just put all your cp in a 7zip file with a password on it
Nathan Green
Don't use urandom, it's too slow.
Jace Perez
If you didn't do FDE from day 1 you're completely fucked as modern drives have some % of extra space they use for bad sectors and write balancing (SSDs) which you can't erase with a secure erase tool. Get out that dremel and start cutting.
I'd recommend the built-in encryption on SSDs from Samsung and Intel as it's strong enough to be standard in the enterprise and has zero performance impact. Be aware the setup is non-trivial.
Levi Foster
zeroing out a drive doesn't always work. Forensic analysis can reveal information that may have persisted across writes. If you write all 0's, then it's an easier job, since they know that the last write was always a 0. With random data, it's nigh impossible to do this kind of analysis.
Sebastian Bell
Those commands open the drive with a random master key.
The 0's will be encrypted into pseudorandom data.
Justin Butler
it's stupid shit that doesn't support extended partitions, so it's useless
AES is only fastest when using hardware acceleration, which is insanely stupid to use
How to get new ID, name, etc
bullshit. show proofs
YEAH GOY IT'S ALL LOST DON'T ENCRYPT, ACCEPT MICROCHIP UNDER YOUR SKIN if it's all lost why did snowden leaks tell they view truecrypt as 'catastrophic'?
Then come where? Lainchan is even deader.
that's sounds like a good option. but, every time you extract it, it is dangerous (unencrypted), and after you stop using it you need to overwrite it few times
bullshit. only applicable to SSDs. HDDs are safe. And when you encrypt you actually overwrite HDD one time.
so encryption itself is overwriting it with nonzero data
Levi Turner
Confirmed for larping.
Ryan Price
Jesus Christ you are dumb. I suppose we shouldnt be surprised, considering you are a pedo.
Enjoy your time in jail.
Evan Price
No encryption needed, and your stuff is safe. Worst that can happen is that you forget where it is, and far into the future a race of aliens discover remnants of humanity and find your memes. You could be our Rosetta Stone, but you insist on bumbling about with shitty encryption.
Luke Allen
Yes but it doesn't give you way to access the data. I could simply burn the disk in oven, same result.
Zachary Martin
How have you managed to live so long while being so stupid? Do you have to set an alarm to remind you to breathe?
Jordan Adams
Police have electronic sniffing dogs now.
Josiah Nguyen
Cover it in magnets to make the electronic sniffing dogs malfunction. Or just seal the electronics in a plastic food container and bury it far away. Other side of a big town, or just somewhere nobody would bother to look.
Justin Foster
use veracrypt and create a hidden volume. look at the Veracrypt instructions online. the most important thing you can do now is stay calm and make sure your passwords are good, and that they aren't written down anywhere
Jayden Price
How can it even be proven that a random file is actually an encrypted container? I mean if there's no evidence of any files being accessed from it through thumbnail caches/recent files/things that the OS logs then it must be impossible right?
Matthew Brooks
No it is not you stupid faggot, Rijndeal was chosen as the AES standard primarily because it was the fastest compared to serpent and twofish.
now GTFO
Levi Nelson
Assuming OP hasen't been V& maybe we could actually have a useful discussion.
What kind of data are you worried about loosing? Are they pictures and video files or are you a 1337 |-|4x0r and accessed some kind of database that you wern't supposed to?
How did you get caught?
How do you know that there after you and why do you specifically know it will happen in 48 hours?
Jose Allen
How secure is that? Couldn't it be easily brute forced?
Jayden Bennett
Not with AES-256
Charles Gutierrez
If you choose a strong passphrase, then no. 7zip uses AES256. It derives the master key from a SHA256sum of your password + a salt and iterates it 100,000+ times.
But it's not secure unless you're already using full disk encryption. If unencrypted data ever touches your disks (extracting / creating 7z), consider it recoverable by a forensics team until physically destroyed or a full wipe on a HDD (assuming sectors weren't relocated).
Hunter Gonzalez
Is it possible to recover erased files off solid state?
Isaac Moore
Also keep your CP/or other illegal shit on a Micro SD card in easy reach, so if the police come to bust down your door you can easily eat it real fast.
Jonathan Davis
lol
or you know, don't keep CP or illegal shit.
Cooper Campbell
Micro sd cards are easy to eat, tinier than fingernail.. If you have the police bust down your door, how hard would it be to pull a tiny as card out and swallow it?
Luke Nguyen
...
Benjamin Lee
All these stupid scenario's and dumb solutions.
If you implement proper Opsec and correctly implement encryption there is no need for all this stupid shit. Full disk encryption is meant to protect your data at rest.
OP is a retard, his question got answered multiple times over but in each case the answer did not suit him, primarily because of his ignorance of the subject.
Brayden James
Except when your government can imprison you for contempt of court or whatever, for a couple of years. The the autistic fantasies go out the window.
Lucas Myers
Not everyone lives in the UK or US
James Garcia
Can't remember if it was a kickstarter or something but people are at least trying to make edible sd cards
Levi Green
I have your answer right here OP, the best encryption imaginable github.com/veorq/oee
Oliver Reed
That looks cool but there's nothing inside.
Adrian Perez
K so what about something like this
>Put alleged and unconfirmed cp/whatever else OP will go an hero if he looses, into a passworded 7zip
Fast and effective, no?
Wyatt Morris
OP has all of a sudden stopped posting. Kek.
Now that the tard is gone, what would you consider to be the safest encryption tool and encryption type? I plan on doing a FDE and I honestly have no idea on where to start.
Parker Allen
Doesn't apply in every country, but if they want it they'll do their best to get it. And OP doesn't seem like the smartest guy. They'd probably say their CP sniffer dog is alarmed by it and he'll break down and 'fess up.
If you can hide the drive so they can't find it your plan should be fine. Don't hide it in the house, because in the absolute worst case scenario the FBI will upturn everything big enough to hold a MicroSD card.
Angel Torres
V& by Santa Clause smh
Justin Richardson
RIP Holla Forums
Juan Jenkins
Come on, OP. Give up. It's just embarrassing.
Jordan Davis
This deserves a comic, but I'm too fucking lazy to make one.
Gavin Torres
V& by Santa's Party Sleigh for his Little Elves pictures
Jack Martinez
Hey guys
how do I safely encrypt my CHILD PORNOGRAPHY?
I want to escape justice in case I'm raided and keep everyone else from knowing I want to rape children!
Blake Robinson
My second HDD wasn't encrypted until a few days ago. Assuming OP's story isn't bait and he didn't get v&, cryptsetup-reencrypt could be useful to him.
Another bit of advice is to set up your drive with dm-crypt plain mode as LUKS headers won't be present. You'll have better plausible deniability with plain mode since there would be no proof that you don't have purely random data on the drive (maybe you test RNG for a hobby, i don't know). Although, with cryptsetup-reencrypt you can't use plain mode.
Wyatt Baker
but who cares since OP is a lainchan nigger and a retard anyway
Gavin Parker
kek
Christopher Perez
I've heard that bleachbit wipes data so hard that not even God Himself can read it. Just tell them you wiped it with like a cloth or something.
Mason Kelly
If you go to jail for a few years you're gonna lose your illegal fucking data anyway you dipshit.
Henry Wood
shit fam u still there? upload the file on the internet if its fast enough.
dev/urandom your old shit then install a normie distro or buy a brand new HDD. best thing to do is to entrust the hard drive to someone if it's really important say it's a science breakthrough or matrix conspiracy shit then give it to the pizza delivery guy or someone you can really trust.
Ayden Williams
RIP in pieces OP
12/25/16
Nathaniel Cooper
ctrl+f truec 3 results no one mentions truecrypt is the ONLY encryption tool that has been fully audited and is confirmed safe no one mentions it is fully cross platform truecrypt has and prob always will be the NUMBER ONE encryption tool
Logan Miller
Don't bother encrypting, just shred every file and smash storage media into bits before dumping in lake. Then have suicide pills ready still just incase.
Cooper King
What are the odds that OP is just a pedo?
Liam Harris
you paedos need to be strung up on lampposts
Nathan Smith
You know what I use to control my urge to rape every legal aged woman I see? Will power. Kill yourself pedo
Jace Kelly
I wish I knew that before losing gigs of memes.
Ethan Lopez
RIP OP I'm glad you're dead
Cameron Hall
rip fgt
Jose Turner
Rest in pieces, OP. It was nice knowing you while you still retained command over your rectum.
Michael Ramirez
Just send the FBI an email explaining that you don't even know how to use a computer. Trust me, it will work.
Jaxson Nguyen
So you actually have urges to rape real women and have to rely on willpower to stop yourself because you're so weak? No wonder you sound so edgy. You're obviously a potential rapist and should kill yourself before you eventually snap and hurt someone
John Flores
Seeing OP's thread made me wonder... I don't have anything illegal in my unencrypted HDD, but say, hypothetically, that there iyys a possibility it'll get confiscated for a legit reason. They don't find anything, and instead of returning it they fabricate some evidence because they *know* I'm guilty but can't prove it. So... Would FDE help in this case? I mean I have nothing to hide but otherwise what's keeping them from filling my HDD with fabricated evidence if they want me in jail? I use Tor for legal purposes sometimes so they could just say they can't track where the material came from but it could have been from this or that Tor session. On the other hand I'd voluntarily supply the unencryption key so I guess with that it's useless to have FDE in the first place since they can unencrypt it and do the aforementioned process (though my POV would be more compelling given that I cooperate).
Lucas Stewart
If you have any forewarning that the police would like to look at your disk, you could always run a quick hash on the disk contents in the presence of a lawyer or third party. Then, if anything gets added/removed, the hash won't match and you can prove that it was tampered.
Luis Peterson
All men are potential rapists tbh
Tyler Rodriguez
Better to do this instead: cryptsetup create sda-wipe /dev/sda --key-size 256 --key-file /dev/urandom; dd if=/dev/zero of=/dev/mapper/sda-wipe; cryptsetup remove sda-wipe;
Will wipe faster, as AES should be as secure as SHA256 hash function.
William Brown
How was your ”chat” with the police?
Austin Martinez
That is a good idea for data storage disks, but what about the disk I use day-to-day? The hash would change by merely turning the computer on.
Alexander Williams
ITT: Cop asks if community trusts Jetico Bestcrypt
Nathan Gutierrez
Anyone has any ideas for this?
Josiah Scott
Friend was a admin for some comunity server, once some kid hacked into it. The kid formated his hhd, police let him of the hock, because it was to much work for them to reconstruct it.
So format your hdd a dozen times, put a new OS on it and fill it with programs and trash. They will suspect its not associated and do a lax probing of it. Dont forget to create a "clone" of your old hdd onto a new hdd which the inspectors will think has the information they are looking for.
The easyest thing is just to let it dissapear. Put it in a plastic bag and hide it in the forest.
The art of deception ;^)
Noah Scott
Yes and no. It depends on how old the data is. You should be aware that your hdd is not perfect and for this will not live forever. Over time the writting head of the hdd, will "move" it will not write on the same spot as on the first day. So if your data is 2 years old and you want to erase it, it will only be partially overwritten, a criminalistic labratory or a reconsruction labratory will be able to read "between the lines".
In this case you have no other choise but to get rid of the hdd
Camden Davis
When I say new OS, use a diffrent one
James Brown
This.
Or use a hammer.
Mason Moore
Encrypted HDD is dangerous territory nowadays.
Ryder Diaz
Would a higher capacity disk be less suceptible to this?
Cooper Jenkins
Maybe he is just roleplaying.
Carter Jackson
Of course he is. This was the retard's way to get the board to provide tech support/software recommendations to him, because he's too fucking stupid to use the sticky.
Brayden Howard
Install linux. Install cryptsetup. Use cryptsetup to create an encrypted partition with a strong passphrase. Move all of your sensitive files to the encrypted partition. Wipe all other partitions that contained sensitive files, with dd or something. Unless you're hiding state secrets, you're now reasonably secure.
Jaxon Thompson
There is a tool for in-place luks conversion if you don't have any place to where you can store your files when encrypting the disk.