When I want to secure data on a USB drive, I use Veracrypt or similar software. I always assumed the "encrypted" USB keys you can buy out there are largely garbage.
@cepamoa17497 жыл бұрын
issue is that veracrypt do not run well on all platform. On my fedora27 it does not in gui making end user usage not likely as you need command line foo to make it work.
@briancarnell7 жыл бұрын
That makes sense. I assume the market for these "encrypted USB drives" are largely Windows users which is why I mentioned Veracrypt. I assume Linux users would use something like cryptsetup/LUKS.
@kirbfx5 жыл бұрын
Why not do both, use Veracrypt on an encrypted USB drive so they must crack the key and then the encrypted vault??
@osamabinladen8243 жыл бұрын
@@hmm8hql739 Please make it simple. What's the best way to encrypt my SSD?
@georgesamaras29225 жыл бұрын
All that nerdy ways to attack secure chipsets, and everyone just ignores that they used a freaking fingerprint sensor. Imagine if you left you computer password written on tables, drinking glasses, smartphones screens, shop catalogs, doors, handles, police database depending on your history, your smartphone manufacturer, etc. And of course depending on threat model a goverment can use physical violence to obtain a fingerprint. Fingerprint is like the dumbest of the dumbest ideas for key input.
@brendacovert40524 жыл бұрын
I'm sorry watching and I totally agree
@adds7617 жыл бұрын
Are the results from each drive they tested published anywhere?
@Baigle17 жыл бұрын
this data is invaluable to consumers and high profile users that need the FIPS usb keys.. we need the brands and models
@cepamoa17497 жыл бұрын
i would love that too :)
@NoneNone-rw7bs6 жыл бұрын
I'm very impressed. In short the "laymen" term would be that it is very difficult, but possible. And in fact it is currently possible in many instances. So in short, It "Sucks" but needs work.
@kirbfx5 жыл бұрын
I recommend using an an encrypted USB that you then encrypt a second time with Veracrpyt or LUKS with a very strong 30 plus multi character password (without using any actual words in any language so it can’t be dictionary cracked) so even if they crack the outer hardware based key 🔑 , they then have to brute force the second veracrpyt key making it much, much more difficult to crack.
@ArchangelTyrael5 жыл бұрын
Then how do you acces your data? Having to type a random 30 character combination sucks if you want to acces your data.
@arabicfoot4 жыл бұрын
Archangel Tyrael stop posting stupid comments
@ArchangelTyrael4 жыл бұрын
@@arabicfoot It’s not stupid. How are you supposed to remember 30 random characters for every site? Write them down and someone can find them. Password manager and they are all in one place. Hackers that get in can now log in to all your accounts. If the manager doesn't work or is unreachable you are locked out of everything.
@gastonhitw7203 жыл бұрын
@@ArchangelTyrael you have to rely on a hand-written note.....you can also remember the password tho, I use a 27 digit password and I can easily remember it
@over00lordunknown126 жыл бұрын
Does anyone know a drive that will encrypt the data on it like a normal drive, but have a sort of "fail safe" mode? IE: If someone pries the case open, will destroy the data (either by consecutively writing zeros, or electric shock to the chip(s)).
@mohamedfouad23046 жыл бұрын
over00lord Unknown tom cruise got one
@osamabinladen8243 жыл бұрын
@@mohamedfouad2304 It burns
@maxicx75v2 жыл бұрын
IIRC there's a separate certification for that, and yes, these exist. No need to overwrite data or shock the chips too: it's sufficient to erase the encryption key and the data will be just unrecoverable random garbage.
@over00lordunknown126 жыл бұрын
5:51 Ough! I *LOVE* tree categories! :D (I can't speak French, so who am I to make jokes about him? :/)
@Malegys7 жыл бұрын
are there any subs available for Pépé LePeu here?
@ciscomalo57317 жыл бұрын
could someone please help me with the latest CEH exam dumps?
@NoneNone-rw7bs6 жыл бұрын
Blackhat is clearly the superior technology because they find all the stupid mistakes tech companies make just to put a component to market as fast as possible. So in short, Technology component developers are only interested in profit, whereas blackhat is all about making things secure. I would assume that Blackhat technology is more expensive. But the one element that no one can ever eliminate is a "mole programmer." And of course state sponsored attacks that have millions if not billions behind the attack.
@CharlesVanNoland6 жыл бұрын
I'm glad people develop skillz from all over the world and come to BlackHat to share them, but I have a hard time understanding half of the speakers because of their thick accents. I'm sure a slight case of nerves being in front of a bunch of people lends itself to them slipping into the thickest of their tongue while speaking - distracting them from making it a point to articulate as they focus on the material intently. Video subtitles aren't much help if they don't read as what the speaker means either, and mostly just make it harder to understand what's being said :(
@phatpants09176 жыл бұрын
You listen to enough talks and you start to have an ear for the accents.
@jakec9047 жыл бұрын
Is this guy from vupen?
@sundhaug927 жыл бұрын
They're from Google
@Baigle17 жыл бұрын
arent vupen a bunch of dbags that don't release their exploits and only sell to oppressive regimes and tyrannical govts?
@sundhaug927 жыл бұрын
Baigle1: 1. These guys are not Vupen 2. Vupen no longer exists 3. While it is true that Vupen did not disclose the vulnerabilities they discovered for pwn2own 2012, they did disclose them for pwn2own 2014. 4. While their full customer-list has not been revealed, it is known that it included the US (NSA) and Germany BND) - neither of which are generally recognized as oppressive nor tyrannical. You might be thinking of Hacking Team, which was one of their customers.
@Baigle17 жыл бұрын
Yep it was hacking team, thanks.
@MrTizinator5 жыл бұрын
So basically there is no safe way to encrypt your drive and everything can be hacked? O.o
@theglowingone56435 жыл бұрын
you will always be able to bruteforce a encrypted thing. If you can prevent hardware vulnerabilities, you can use strong encryption that would take 1000s of years to calculate. But in encryption USB, there are many hardware loopholes. So instead, get just a normal usb stick but store everything encrypted and decrypt it on your pc with a key. There is software that does this, I forgot its name tho... Ill follow up on this
@theglowingone56435 жыл бұрын
Veracrypt is one of those softwares. You can ofc use it on an encryption USB stick so it adds a (very thin) extra layer of security
@dukesoft72115 жыл бұрын
Also don't underestimate the power of a big bald guy with a 5$ wrench
@hjembrentkent61814 жыл бұрын
Use encryption strong enought that all matter in the universe converted to energy would be unsuficcient to do the brute force work.
@Kitulous3 жыл бұрын
@@dukesoft7211 that's why you use the "double bottom" option in VeraCrypt - hidden partition
@Ibentheamazing6 жыл бұрын
This means that someone can decrypt a USB Key without the password!!!???
@SCITom3 жыл бұрын
It takes time to get used to French people speaking English, that's a given.
@printchipe7 жыл бұрын
Podem me ajudar? Para área de segurança da informação, devemos ter conhecimentos mais profundos em redes de computadores e infra, ou em programação? Desde já agradeço. Obrigado.
@NoneNone-rw7bs6 жыл бұрын
Yes, that sucks, :)
@dexterh68147 жыл бұрын
hard to understand what he said.. but i got the point tho.