View Full Version : Password USB drive

01-11-2013, 01:50 PM
Is there a way to password or encrypt a USB flash drive? Have been looking but cannot find anything that helps me

Speedy Gonzales
01-11-2013, 03:25 PM
Use truecrypt. Altho as it says on the site

How can I use TrueCrypt on a USB flash drive?

You have two options:

Encrypt the entire USB flash drive. However, you will not be able run TrueCrypt from the USB flash drive.
Note: Windows does not support multiple partitions on USB flash drives.

Create a TrueCrypt file container on the USB flash drive (for information on how to do so, see the chapter Beginner's Tutorial, in the TrueCrypt User Guide). If you leave enough space on the USB flash drive (choose an appropriate size for the TrueCrypt container), you will also be able to store TrueCrypt on the USB flash drive (along with the container – not in the container) and you will be able to run TrueCrypt from the USB flash drive (see also the chapter Portable Mode in the TrueCrypt User Guide).

01-11-2013, 07:57 PM
Truecrypt slows down people same as a windowsxp password does, but law enforcement and hackers can quickly open it. PGP is supposedly the best at the moment, but who knows if anything is safe. Given the size of the drive, physical security is often best.

02-11-2013, 02:14 AM
Truecrypt is the way to go, Use AES-Twofish-Serpent and SHA512 + A very long password and you'll be fine.

I don't agree with TropoScatter's comment about 'law enforcement' and 'hackers' being able to open it quickly, they wouldn't stand a chance.

02-11-2013, 03:32 AM
Well, not ALL law enforcement officers can open truecrypt files, some of them can't google like I just did, and find many news stories like this (http://www.prnewswire.com/news-releases/passware-kit-forensic-decrypts-truecrypt-hard-disks-in-minutes-89502507.html)

MOUNTAIN VIEW, Calif., March 30 /PRNewswire/ -- Passware Inc., a provider of password recovery, decryption, and evidence discovery software for computer forensics, announced that the latest version of its flagship product, Passware Kit Forensic, has become the first commercially available software to break TrueCrypt hard drive encryption without applying a time-consuming brute-force attack. It was also the first product to decrypt BitLocker drives.

"Our law enforcement customers requested decryption of TrueCrypt disks, and we developed a practical and effective method for quickly obtaining encrypted data," said Dmitry Sumin, president of Passware, Inc. "We are proud to be the first to market with a solution that empowers police, law enforcement officials and private investigators to bypass both BitLocker and now TrueCrypt encryption of seized computers."

I don't know how old that story is, I've known for years that truecrypt was as 'safe' as a windows XP password, that is to say, not safe at all.

02-11-2013, 01:38 PM
Passware doesn't compromise BitLocker

It feeds on the fact that they encryption key is obviously in memory and the direct access of memory from FireWire

To protect yourself Disable FireWire which stops DMA attacks, and Disable hibernation and use sleep on a laptop. Also make sure to use devices with a TPM (used to encrypt and decrypt the key blob)

Note their own warning on their webpage:

NOTE: If the target computer is turned off and the encrypted volume was dismounted during the last hibernation, neither the memory image nor the hiberfil.sys file will contain the encryption keys. Therefore, instant decryption of the volume is impossible. In this case, Passware Kit assigns brute-force attacks to recover the original password for the volume.

Brute force? Yeah, good luck. I’ll see you in a few years