EvilZone
Hacking and Security => Beginner's Corner => : AlphaVirus September 02, 2015, 01:24:54 AM
-
Hello Everyone,I would like to create a hidden encrypted volume where to install Whonix and Kali on VirtualBox, does anyone know approximately how big that volume should be? Thanks!
-
Use a search engine of your choice. Hell, Kali Linux even tells you how much space you need.
-
Why not VeraCrypt as TrueCrypt is out of date.
https://veracrypt.codeplex.com/ This program is based off TrueCrypt...
-
Why not VeraCrypt as TrueCrypt is out of date.
TrueCrypt is still considered to be safe. Its sourcecode has been checked over and over again by lots of people.
-
TrueCrypt is still considered to be safe. Its sourcecode has been checked over and over again by lots of people.
I know but TrueCrypt is not in development anymore, and VeraCrypt is. Plus VeraCrypt is the same as TrueCrypt and gets updates, plus it still open source as well... Might as well use a program which is in development rather than use a non active version of the same product.
-
Just wanted to point out that there's actually no reason to switch if one's already using TrueCrypt. TrueCrypt's still perfectly fine, so if one's comfortable with it, switching would be unnecessary work. :)
-
Just wanted to point out that there's actually no reason to switch if one's already using TrueCrypt. TrueCrypt's still perfectly fine, so if one's comfortable with it, switching would be unnecessary work. :)
But why, as VeraCrypt is a clone of TrueCrypt which has the same UI and text within the program. Moving to VeraCrypt makes sense, it is a active program, still open source and is based off TrueCrypt.
It even states on the old TrueCrypt website "WARNING: Using TrueCrypt is not secure as it may contain unfixed security issues" and "WARNING: Using TrueCrypt is not secure and you should download TrueCrypt only if you are migrating data encrypted by TrueCrypt".
Yes it has been audited and looked at but why bother encrypting your hard drive with a dead project, at at least keep the peace and mind of using an active program, meaning if any vulnerabilities happen to arise an update would probably come out, unlike if you were using TrueCrypt. :)
-
I know about this statement, just like everybody else, and it is well-known that it is not true that TrueCrypt's unsafe. Most think that TC received a National Security Letter. As I have said before, there's no point in switching if you're already using TC because it would cause unnecessary work. That's not the same as telling people who do not have TC-encrypted drives yet to use TC instead of VeraCrypt. Hope you got my point now. :)
-
I would say for future deployments not using TC would be wise.
Since if new vulns will be found no patches are released, this is more of a principle then anything else.
On the other hand I bet someone will update the code when such an event will occur.
-
New security bugs found in TrueCrypt "What we do know, however, is that there’s now very good reason to move away from using TrueCrypt and towards one of the actively maintained forks or alternate solutions. TrueCrypt itself has now proven flawed enough to no longer be trustworthy." Like VeraCrypt.
Source: http://www.extremetech.com/computing/215285-critical-truecrypt-security-bugs-finally-found
-
Thanks for sharing, Katheudo. These bugs apparently only affect Windows, though.
-
I would like to go back on topic and say don't install those on your HDD - install on a flash drive... when will people finally realize that Kali or other "hacking" distros are not meant to be used as a primary OS or even installed on your drive to dual-boot.
-
I would like to go back on topic and say don't install those on your HDD - install on a flash drive... when will people finally realize that Kali or other "hacking" distros are not meant to be used as a primary OS or even installed on your drive to dual-boot.
Or use a VM so when you inevitably break something by a crappy multiarch package you don't have to wipe the flashdrive and wear down the cells.