Notifications
Clear all

How to encrypt CDs?

19 Posts
9 Users
0 Likes
1,021 Views
(@chrism)
Posts: 97
Trusted Member
Topic starter
 

I want to be able to send a report through the post and I am looking at the best ways to encrypt it.

I've tried www.cd-lock.com, but that only works half the time without crashing and it also leaves 0 byte files on the hard disk for no reason what so ever.

What does everyone use to make sure their CDs are encypted? Or does everyone just send them special delivery instead? Anyone that has any ideas if would be a great help.

By the way, yeah there is truecrypt, but I can't see the client ever knowing how to use that program or getting permission to install it.

Cheers

 
Posted : 14/01/2010 5:32 pm
CFP001
(@cfp001)
Posts: 36
Eminent Member
 

I understand what your saying about truecrypt, but it's not necessary to install it on the client pc. You can use the USB installer and install TC directly onto the CD. The client needs only double click the truecrypt icon, choose auto mount and everything should be fine.

I sent an encrypted hard drive to my last client using this method. Here is a very simple write up (replace external hard drive with CD).

1. Attach the external USB hard drive to the computer.
2. Plug in the external USB hard drive power.
3. Open “My Computer” and locate the external USB hard drive.
4. Open the USB hard drive in “My Computer”.
5. Open the Folder “Truecrypt”
6. Double click the Truecrypt.exe icon. It is –not- necessary to install the program first.
7. In the Truecrypt program select an available drive letter (z)
8. Click on “Auto-Mount Devices”
9. Enter the password for decryption and click “OK”. The encrypted files will be available in “My Computer” on the drive letter chosen in step 7.

 
Posted : 14/01/2010 5:58 pm
(@mscotgrove)
Posts: 938
Prominent Member
 

If you are only worried about the file contents, rather than types of file, why not just encrypt the file(s), eg with WinZip 256 AES, PGP etc. You can then write the CD in the normal way.

To decrypt from WinZip you just need the password - more than maybe 10 characters long to be secure - the longer the better.

 
Posted : 14/01/2010 6:25 pm
(@chrism)
Posts: 97
Trusted Member
Topic starter
 

If you are only worried about the file contents, rather than types of file, why not just encrypt the file(s), eg with WinZip 256 AES, PGP etc. You can then write the CD in the normal way.

To decrypt from WinZip you just need the password - more than maybe 10 characters long to be secure - the longer the better.

That is assuming the client has WinZip their end… also when they unzip the file it will ask to store the files locally on the clients hard disk, I can't see them deleting the folder after in the proper way we all know how to. I want to keep the 'spreading' of the evidence to a minumum.

I'll have a go with the TC volume and see what I can come up with cheers.

 
Posted : 14/01/2010 7:06 pm
jaclaz
(@jaclaz)
Posts: 5133
Illustrious Member
 

Check OTFE "portable mode" or "explorer"
http//www.freeotfe.org/features.html

jaclaz

 
Posted : 14/01/2010 8:17 pm
(@seanmcl)
Posts: 700
Honorable Member
 

That is assuming the client has WinZip their end…

Or you can make a self-extracting executable in which case they don't need any software.

also when they unzip the file it will ask to store the files locally on the clients hard disk, I can't see them deleting the folder after in the proper way we all know how to. I want to keep the 'spreading' of the evidence to a minumum.

What is to keep them from copying the contents of the Truecrypt volume to an unencrypted section of their hard drive?

I'm not saying that you shouldn't use TC, but it seems like a lot of extra effort when WinZip, AES encryption and a good password would make the archive virtually unbreakable.

 
Posted : 14/01/2010 8:48 pm
(@indur)
Posts: 67
Trusted Member
 

That's a significant difference With TrueCrypt, they have to willfully make an unencrypted copy of the data, and it's not necessary to view the data. With ZIP, an unencrypted copy is automatically made if they want to be able to view the data. So the likelihood of them making an unencrypted copy increases from "somewhat" to "assured".

 
Posted : 14/01/2010 10:12 pm
(@chrism)
Posts: 97
Trusted Member
Topic starter
 

What is to keep them from copying the contents of the Truecrypt volume to an unencrypted section of their hard drive?

Nothing, but that goes with everything that you send them!

I tried to see where, once you decrypt using Truecrypt, the files go? Are they stored in RAM? I guess so as that would make a logical answer. Does anyone know?

The self extractable Zip idea sounds good but I'm not too sure on letting the client choose where to store the files once extracted… I'm not trying to say they're dumb but they could accidentally unzip them to a network share or something - I know very unlikely and it goes the same with Truecrypt if they drag and drop accidentally - I guess it's the risk we take with everything.

 
Posted : 14/01/2010 10:17 pm
(@chrism)
Posts: 97
Trusted Member
Topic starter
 

That's a significant difference With TrueCrypt, they have to willfully make an unencrypted copy of the data, and it's not necessary to view the data. With ZIP, an unencrypted copy is automatically made if they want to be able to view the data. So the likelihood of them making an unencrypted copy increases from "somewhat" to "assured".

Nicely put - your post arrived after I had written mine.

 
Posted : 14/01/2010 10:18 pm
(@seanmcl)
Posts: 700
Honorable Member
 

That's a significant difference With TrueCrypt, they have to willfully make an unencrypted copy of the data, and it's not necessary to view the data. With ZIP, an unencrypted copy is automatically made if they want to be able to view the data. So the likelihood of them making an unencrypted copy increases from "somewhat" to "assured".

Not entirely true. Once the file is opened by the application, neither Truecrypt nor WinZip can prevent that application/OS from caching an unencrypted version of the file in the user's profile or other temp space. The only purely safe way to do this is to have all temp and profile data located within the TC volume/disk.

In fact, these guys were able to do that for TC version 5

http//www.schneier.com/blog/archives/2008/07/truecrypts_deni.html
http//www.schneier.com/paper-truecrypt-dfs.pdf

and while they have not succeeded in doing this with version 6, the fact that something hasn't been done doesn't mean it can't be done.

I'll agree that if you are really paranoid about who might see the data, TC provides an extra level of protection over WinZip. But to my way of thinking, the responsibility for protecting the data lies with the data owner.
My responsibility is simply to make sure that while it is in my possession (or in transit), it is secured.

 
Posted : 14/01/2010 10:46 pm
Page 1 / 2
Share: