![]() Atom computers, however, just cope with a slim Windows Desktop, and as soon as more applications run at the same time the system feels slow. ![]() On common CPUs, you will barely notice a difference in how fast the computer deals with your daily work whether your hard disk is encrypted or not. Encryption isn't free, however, even with this tool-it needs CPU power. You can access the full report in pdf fprmat here.The Enterprise and Ultimate editions of Windows 7 offer a comfortable way to encrypt your hard disk and protect your data, called BitLocker. The audit has turned up a dozen bugs in the code that is TrueCrypt, but not signs of backdoors or other critical security holes. (Update April 2014) US consultancy iSEC has completed on April 2014 a detailed two – person code audit of the software seeking security holes. This might not be the same with commercial products. Being open source makes it very difficult to add a backdoor. My personal preference is TrueCrypt for the simple reason that is open source. Now that you know the pros and cons of the programs and also the attack methods I hope it is easier to select the appropriate one for your needs. There is also a very interesting discussion about “Evil Maid’ in Bruce Schneier’s blog.Īs a conclusion, both BitLocker and TrueCrypt are excellent programs that can encrypt data. The attack, along with the software is explained by Joanna Rutkowska. Next time you will operate your computer and enter your key it will be transmitted to the eavesdropper.An evil maid (enemy) enters your room and changes the boot-loader.You leave your laptop into your hotel room and you go for breakfast.So, what is the ‘Evil Maid’ attack? In a nutshell the attack is as follows: For smaller businesses or for your personal computer or laptop TrueCrypt offers a really great solution.įor the security perspective there is the ‘Evil Maid’ attack that can be used to TrueCrypt to acquire the pass phrase. BitLocker uses trusted boot that can be attacked too. Of course you can store your pass phrase in any storage media at your own risk.įrom the above discussion, I believe that for large corporations the preferred solution would be BitLocker. It does not require to store a start up key to any device.Can be used with many operating systems including Microsoft and Linux.Allows IT Administrators to enforce Group policy.Allows storage of startup key in USB stick. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |