{"id":268,"date":"2014-01-02T17:34:24","date_gmt":"2014-01-03T00:34:24","guid":{"rendered":"http:\/\/somethingk.com\/main\/?p=268"},"modified":"2014-01-08T17:03:47","modified_gmt":"2014-01-09T00:03:47","slug":"hard-drive-encryption","status":"publish","type":"post","link":"http:\/\/somethingk.com\/main\/hard-drive-encryption\/","title":{"rendered":"Hard Drive Encryption"},"content":{"rendered":"<p>On a totally different encryption tangent, I need to encrypt my hard drives. Kind of ashamed that they aren\u2019t encrypted already&#8230; I studied the field of cyber-security. However, for a basic home server it didn\u2019t seem as pertinent to encrypt my drives.<\/p>\n<p>I\u2019m not going crazy or anything with confidential data. However, something really cool with hard drive encryption is that in most cases (strong password utilized, best practices, etc.), if the user is not logged into the computer at the time of seizure, it can be close to impossible (at the moment of writing this) for forensics to decrypt the data. True, there are tools that are part of the <a title=\"FTK Toolkit\" href=\"http:\/\/www.accessdata.com\/products\/digital-forensics\/ftk\" target=\"_blank\">FTK toolkit<\/a>\u00a0like PRTK that can be used to attempt to decrypt your hard drive. Now correct me if I\u2019m wrong, but if your password is over 12 characters long and includes different characters, numbers, symbols and all that jazz, the decryption attempt will take forever! The investigators are likely to be long gone before anything is returned (the cracking system would also have to be amazing and last just as long).<\/p>\n<p style=\"text-align: center;\"><a href=\"http:\/\/servedfreshmedia.net\/wp-content\/uploads\/2010\/03\/skeleton-at-keyboard.jpg\"><img fetchpriority=\"high\" decoding=\"async\" class=\"aligncenter\" title=\"Served Fresh Media | skeleton at keyboard\" alt=\"\" src=\"http:\/\/servedfreshmedia.net\/wp-content\/uploads\/2010\/03\/skeleton-at-keyboard.jpg\" width=\"360\" height=\"239\" \/><\/a><\/p>\n<p>There are primarily two types of encryption, hardware and software encryption. I prefer the idea of hardware encryption, it encrypts data at the lowest level and tends to be more secure. If someone has access to your environment with a software encryption scheme there is a greater likelihood they will be able to obtain the key through brute force. A simple reference site for an explanation of encryption and the differences can be found <a title=\"Software vs Hardware Encryption\" href=\"http:\/\/www.ehow.com\/about_6521817_hardware-vs_-software-encryption.html\" target=\"_blank\">here<\/a>.\u00a0One uses the computers resources to encrypt while the other relies on the hardware to encrypt data on its own dedicated processor. There really isn\u2019t much difference between performance, problem is not all hard drives come with a dedicated processor for encryption.<\/p>\n<p>My environment consists of three 4 TB hard drives in a RAID5 array that are currently partitioned into two drives. One drive contains Windows 8 and the other is for storage.<\/p>\n<figure id=\"attachment_269\" aria-describedby=\"caption-attachment-269\" style=\"width: 254px\" class=\"wp-caption aligncenter\"><a href=\"http:\/\/somethingk.com\/main\/wp-content\/uploads\/2014\/01\/2014-01-02-17.37.28-HDR.jpg\"><img decoding=\"async\" class=\" wp-image-269     \" alt=\"The hard drives I'm currently using.\" src=\"http:\/\/somethingk.com\/main\/wp-content\/uploads\/2014\/01\/2014-01-02-17.37.28-HDR.jpg\" width=\"254\" height=\"338\" srcset=\"http:\/\/somethingk.com\/main\/wp-content\/uploads\/2014\/01\/2014-01-02-17.37.28-HDR.jpg 2448w, http:\/\/somethingk.com\/main\/wp-content\/uploads\/2014\/01\/2014-01-02-17.37.28-HDR-225x300.jpg 225w, http:\/\/somethingk.com\/main\/wp-content\/uploads\/2014\/01\/2014-01-02-17.37.28-HDR-768x1024.jpg 768w\" sizes=\"(max-width: 254px) 100vw, 254px\" \/><\/a><figcaption id=\"caption-attachment-269\" class=\"wp-caption-text\">The hard drives I&#8217;m currently using.<\/figcaption><\/figure>\n<p>So my options, hardware or software encrypt. I\u2019ve already been using the drives for quite some time, I don\u2019t really want to lose the data already stored on the devices. There are some issues I foresee with hardware encryption and a RAID system. Is it even possible with RAID? I have to concern myself with how encryption will affect the stripping and mirroring of data. It all depends on the drive and in my case, its easy, my hard drives don&#8217;t even include the capability to hardware encrypt so on to software encryption.<\/p>\n<p>For software encryption, <a title=\"BitLocker\" href=\"http:\/\/windows.microsoft.com\/en-US\/windows7\/products\/features\/bitlocker\" target=\"_blank\">BitLocker<\/a>\u00a0and <a title=\"TrueCrypt\" href=\"http:\/\/www.truecrypt.org\/downloads\" target=\"_blank\">TrueCrypt<\/a>\u00a0are two free solutions that I am familiar with and could consider using. I could also look at converting my entire system into a NAS (FreeBSD and FreeNAS can setup a software based RAID and they include encryption capabilities) but\u2026 I\u2019ll save that for another day.<\/p>\n<p>BitLocker is already made available on Windows 8 Enterprise and Ultimate, but is it better than TrueCrypt? According to <a title=\"System Encryption: BitLocker And TrueCrypt Compared\" href=\"http:\/\/www.tomshardware.com\/reviews\/bitlocker-truecrypt-encryption,2587.html\" target=\"_blank\">Tomshardware.com<\/a>, both encryption tools are almost identical in performance. Bottom line,\u00a0Microsoft\u2019s BitLocker apparently has a few advantages via Intel\u2019s new AES extensions. Despite this, TrueCrypt gives is compatible with non-Windows environments and it allows users to create &#8220;secret&#8221; partitions. These partitions are totally hidden and are only accessible from the TrueCrypt passphrase screen.<\/p>\n<p>Mmm I think I&#8217;ll explore both options. BitLocker is quite easy to setup. From the start screen, type in BitLocker and there it is!<\/p>\n<p><a href=\"http:\/\/somethingk.com\/main\/wp-content\/uploads\/2014\/01\/findBitLocker.png\"><img decoding=\"async\" class=\"aligncenter size-medium wp-image-274\" alt=\"Finding BitLocker\" src=\"http:\/\/somethingk.com\/main\/wp-content\/uploads\/2014\/01\/findBitLocker-300x168.png\" width=\"300\" height=\"168\" srcset=\"http:\/\/somethingk.com\/main\/wp-content\/uploads\/2014\/01\/findBitLocker-300x168.png 300w, http:\/\/somethingk.com\/main\/wp-content\/uploads\/2014\/01\/findBitLocker-1024x576.png 1024w, http:\/\/somethingk.com\/main\/wp-content\/uploads\/2014\/01\/findBitLocker.png 1776w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p style=\"text-align: left;\">Select to turn on BitLocker and follow the wizard instructions. It&#8217;ll take a couple restarts to get things going followed by a long, long wait.<\/p>\n<p style=\"text-align: left;\"><a href=\"http:\/\/somethingk.com\/main\/wp-content\/uploads\/2014\/01\/Capture.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-275\" alt=\"BitLocker\" src=\"http:\/\/somethingk.com\/main\/wp-content\/uploads\/2014\/01\/Capture-300x181.png\" width=\"300\" height=\"181\" srcset=\"http:\/\/somethingk.com\/main\/wp-content\/uploads\/2014\/01\/Capture-300x181.png 300w, http:\/\/somethingk.com\/main\/wp-content\/uploads\/2014\/01\/Capture.png 377w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p style=\"text-align: left;\">Easy Sauce!<\/p>\n<p style=\"text-align: left;\">TrueCrypt is slightly different. The install demonstrated was performed on a MacBook Pro with Mavericks installed.<\/p>\n<p style=\"text-align: left;\">I couldn&#8217;t encrypt the working hard drive because it was in use, kind of defeats the purpose of what I was attempting however, I was able to create a hidden\/secret partition. So I&#8217;m just going with that.<\/p>\n<p style=\"text-align: left;\">After starting up TrueCrypt, select to &#8220;Create Volume.&#8221;<\/p>\n<p style=\"text-align: left;\"><a href=\"http:\/\/somethingk.com\/main\/wp-content\/uploads\/2014\/01\/Screen-Shot-2014-01-02-at-6.50.03-PM.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-277\" alt=\"TrueCrypt Main Menu\" src=\"http:\/\/somethingk.com\/main\/wp-content\/uploads\/2014\/01\/Screen-Shot-2014-01-02-at-6.50.03-PM-300x243.png\" width=\"300\" height=\"243\" srcset=\"http:\/\/somethingk.com\/main\/wp-content\/uploads\/2014\/01\/Screen-Shot-2014-01-02-at-6.50.03-PM-300x243.png 300w, http:\/\/somethingk.com\/main\/wp-content\/uploads\/2014\/01\/Screen-Shot-2014-01-02-at-6.50.03-PM.png 667w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p style=\"text-align: left;\">Follow the wizard directions to &#8220;Create an encrypted file container.&#8221;<\/p>\n<p style=\"text-align: left;\"><a href=\"http:\/\/somethingk.com\/main\/wp-content\/uploads\/2014\/01\/Screen-Shot-2014-01-02-at-6.52.23-PM.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-278\" alt=\"Encrypted File Container\" src=\"http:\/\/somethingk.com\/main\/wp-content\/uploads\/2014\/01\/Screen-Shot-2014-01-02-at-6.52.23-PM-300x180.png\" width=\"300\" height=\"180\" srcset=\"http:\/\/somethingk.com\/main\/wp-content\/uploads\/2014\/01\/Screen-Shot-2014-01-02-at-6.52.23-PM-300x180.png 300w, http:\/\/somethingk.com\/main\/wp-content\/uploads\/2014\/01\/Screen-Shot-2014-01-02-at-6.52.23-PM.png 716w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p style=\"text-align: left;\">Following, select &#8220;Hidden TrueCrypt volume.&#8221;<\/p>\n<p style=\"text-align: left;\"><a href=\"http:\/\/somethingk.com\/main\/wp-content\/uploads\/2014\/01\/Screen-Shot-2014-01-02-at-6.52.32-PM.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-279\" alt=\"Hidden Drive\" src=\"http:\/\/somethingk.com\/main\/wp-content\/uploads\/2014\/01\/Screen-Shot-2014-01-02-at-6.52.32-PM-300x183.png\" width=\"300\" height=\"183\" srcset=\"http:\/\/somethingk.com\/main\/wp-content\/uploads\/2014\/01\/Screen-Shot-2014-01-02-at-6.52.32-PM-300x183.png 300w, http:\/\/somethingk.com\/main\/wp-content\/uploads\/2014\/01\/Screen-Shot-2014-01-02-at-6.52.32-PM.png 719w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p style=\"text-align: left;\">Select a file location for the TrueCrypt volume. This volume will appear as a file which can then be mounted by the TrueCrypt software. Once mounted, it can be accessed just like another filesystem with directory trees, files, etc.<\/p>\n<p style=\"text-align: center;\"><a href=\"http:\/\/somethingk.com\/main\/wp-content\/uploads\/2014\/01\/Screen-Shot-2014-01-02-at-7.22.44-PM.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-286\" title=\"Volume Location\" alt=\"\" src=\"http:\/\/somethingk.com\/main\/wp-content\/uploads\/2014\/01\/Screen-Shot-2014-01-02-at-7.22.44-PM-300x181.png\" width=\"300\" height=\"181\" srcset=\"http:\/\/somethingk.com\/main\/wp-content\/uploads\/2014\/01\/Screen-Shot-2014-01-02-at-7.22.44-PM-300x181.png 300w, http:\/\/somethingk.com\/main\/wp-content\/uploads\/2014\/01\/Screen-Shot-2014-01-02-at-7.22.44-PM.png 708w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p style=\"text-align: left;\">Choose whatever encryption algorithm works for your environment, testing is always a good idea.<\/p>\n<p style=\"text-align: left;\"><a href=\"http:\/\/somethingk.com\/main\/wp-content\/uploads\/2014\/01\/Screen-Shot-2014-01-02-at-6.53.06-PM.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-280\" alt=\"Outer Volume Encryption Options\" src=\"http:\/\/somethingk.com\/main\/wp-content\/uploads\/2014\/01\/Screen-Shot-2014-01-02-at-6.53.06-PM-300x182.png\" width=\"300\" height=\"182\" srcset=\"http:\/\/somethingk.com\/main\/wp-content\/uploads\/2014\/01\/Screen-Shot-2014-01-02-at-6.53.06-PM-300x182.png 300w, http:\/\/somethingk.com\/main\/wp-content\/uploads\/2014\/01\/Screen-Shot-2014-01-02-at-6.53.06-PM.png 711w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p style=\"text-align: left;\">The Outer Volume Format window is slightly peculiar, you just mouse around the window a lot to create a random key sequence.<\/p>\n<p style=\"text-align: left;\"><a href=\"http:\/\/somethingk.com\/main\/wp-content\/uploads\/2014\/01\/Screen-Shot-2014-01-02-at-6.54.33-PM.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-281\" alt=\"Outer Volume Format\" src=\"http:\/\/somethingk.com\/main\/wp-content\/uploads\/2014\/01\/Screen-Shot-2014-01-02-at-6.54.33-PM-300x183.png\" width=\"300\" height=\"183\" srcset=\"http:\/\/somethingk.com\/main\/wp-content\/uploads\/2014\/01\/Screen-Shot-2014-01-02-at-6.54.33-PM-300x183.png 300w, http:\/\/somethingk.com\/main\/wp-content\/uploads\/2014\/01\/Screen-Shot-2014-01-02-at-6.54.33-PM.png 712w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p style=\"text-align: left;\">After selecting, &#8220;Format,&#8221; the outer volume for the hidden\/secret partition will be created. This volume contains the hidden and can act as a decoy.\u00a0The wizard continues with the hidden volume creation.<\/p>\n<p style=\"text-align: left;\"><a href=\"http:\/\/somethingk.com\/main\/wp-content\/uploads\/2014\/01\/Screen-Shot-2014-01-02-at-6.57.22-PM.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-282\" alt=\"Screen Shot 2014-01-02 at 6.57.22 PM\" src=\"http:\/\/somethingk.com\/main\/wp-content\/uploads\/2014\/01\/Screen-Shot-2014-01-02-at-6.57.22-PM-300x182.png\" width=\"300\" height=\"182\" srcset=\"http:\/\/somethingk.com\/main\/wp-content\/uploads\/2014\/01\/Screen-Shot-2014-01-02-at-6.57.22-PM-300x182.png 300w, http:\/\/somethingk.com\/main\/wp-content\/uploads\/2014\/01\/Screen-Shot-2014-01-02-at-6.57.22-PM.png 709w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p style=\"text-align: left;\">It&#8217;s basically identical to the earlier, outer volume process.<\/p>\n<p style=\"text-align: left;\">Now to access the two volumes, open TrueCrypt and mount the file you created. You can either enter in the password for the hidden or decoy volume depending on which on you want to access.<\/p>\n<p style=\"text-align: left;\"><a href=\"http:\/\/somethingk.com\/main\/wp-content\/uploads\/2014\/01\/Screen-Shot-2014-01-02-at-7.06.29-PM.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-284\" alt=\"TrueCrypt Password Prompt\" src=\"http:\/\/somethingk.com\/main\/wp-content\/uploads\/2014\/01\/Screen-Shot-2014-01-02-at-7.06.29-PM-300x246.png\" width=\"300\" height=\"246\" srcset=\"http:\/\/somethingk.com\/main\/wp-content\/uploads\/2014\/01\/Screen-Shot-2014-01-02-at-7.06.29-PM-300x246.png 300w, http:\/\/somethingk.com\/main\/wp-content\/uploads\/2014\/01\/Screen-Shot-2014-01-02-at-7.06.29-PM.png 654w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p style=\"text-align: left;\">So why this outer volume\/hidden volume setup?\u00a0Say, somehow, someone knew you had the TrueCrypt volume and they were forcing you to provide the password. Well, thank goodness you have a decoy! They&#8217;ll think they&#8217;re getting the goods when really you are only supplying them with decoy files, while the hidden ones lay secretly nestled inside the decoy undetected.<\/p>\n<p style=\"text-align: left;\">Wow, what a long post but there you have it, the joys of encryption!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>On a totally different encryption tangent, I need to encrypt my hard drives. Kind of ashamed that they aren\u2019t encrypted already&#8230; I studied the field of cyber-security. However, for a basic home server it didn\u2019t seem as pertinent to encrypt my drives. I\u2019m not going crazy or anything with confidential data. However, something really cool with hard drive encryption is [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[23,34,12],"tags":[88,87,86,90,89],"class_list":["post-268","post","type-post","status-publish","format-standard","hentry","category-enumeration","category-forensics","category-windows","tag-bitlocker","tag-encryption","tag-hard-drive","tag-raid","tag-truecrypt"],"_links":{"self":[{"href":"http:\/\/somethingk.com\/main\/wp-json\/wp\/v2\/posts\/268","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/somethingk.com\/main\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/somethingk.com\/main\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/somethingk.com\/main\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/somethingk.com\/main\/wp-json\/wp\/v2\/comments?post=268"}],"version-history":[{"count":10,"href":"http:\/\/somethingk.com\/main\/wp-json\/wp\/v2\/posts\/268\/revisions"}],"predecessor-version":[{"id":406,"href":"http:\/\/somethingk.com\/main\/wp-json\/wp\/v2\/posts\/268\/revisions\/406"}],"wp:attachment":[{"href":"http:\/\/somethingk.com\/main\/wp-json\/wp\/v2\/media?parent=268"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/somethingk.com\/main\/wp-json\/wp\/v2\/categories?post=268"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/somethingk.com\/main\/wp-json\/wp\/v2\/tags?post=268"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}