fingertips

434 views
392 views

Published on

A presentation @ MACitizen monthly gathering (2008.06.09) about storage security.

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
434
On SlideShare
0
From Embeds
0
Number of Embeds
4
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide












  • •Creates a virtual encrypted disk within a file and mounts it as a real disk.
    •Encrypts an entire partition or storage device such as USB flash drive or hard drive.
    •Encrypts a partition or drive where Windows is installed (pre-boot authentication).
    •Encryption is automatic, real-time (on-the-fly) and transparent.
    •Provides two levels of plausible deniability, in case an adversary forces you to reveal the password:1) Hidden volume (steganography – more information may be found here).2) No TrueCrypt volume can be identified (volumes cannot be distinguished from random data).
    •Encryption algorithms: AES-256, Serpent, and Twofish. Mode of operation: XTS.





  • fingertips

    1. 1. fingertips Calvin C.Yu 2008.06.09 Monday, February 9, 2009
    2. 2. Monday, February 9, 2009
    3. 3. Do you have a finger? Monday, February 9, 2009
    4. 4. Who hasn’t? Monday, February 9, 2009
    5. 5. What have you got? Monday, February 9, 2009
    6. 6. Monday, February 9, 2009
    7. 7. Monday, February 9, 2009
    8. 8. Monday, February 9, 2009
    9. 9. Monday, February 9, 2009
    10. 10. or other brands...... Monday, February 9, 2009
    11. 11. Security Features • Enterprise level mandatory security • Fingerprint scanner • Hardware encryption • 256bit AES encryption • strong password • ...etc Monday, February 9, 2009
    12. 12. What is the relevance of all these security features with you? Monday, February 9, 2009
    13. 13. irrelevant... Monday, February 9, 2009
    14. 14. because you use a Mac Monday, February 9, 2009
    15. 15. Monday, February 9, 2009
    16. 16. • Cross-platform compatibility Monday, February 9, 2009
    17. 17. • Cross-platform compatibility • Virtual encrypted disk Monday, February 9, 2009
    18. 18. • Cross-platform compatibility • Virtual encrypted disk • Encrypts an entire partition Monday, February 9, 2009
    19. 19. • Cross-platform compatibility • Virtual encrypted disk • Encrypts an entire partition • Encryption is automatic, real-time (on-the- fly) and transparent. Monday, February 9, 2009
    20. 20. • Cross-platform compatibility • Virtual encrypted disk • Encrypts an entire partition • Encryption is automatic, real-time (on-the- fly) and transparent. • Encryption algorithms: AES-256, Serpent, and Twofish Monday, February 9, 2009
    21. 21. Demonstration Monday, February 9, 2009
    22. 22. www.truecrypt.org Monday, February 9, 2009
    23. 23. fingertips Monday, February 9, 2009
    24. 24. fingertips Q &A Monday, February 9, 2009
    25. 25. fingertips Monday, February 9, 2009
    26. 26. fingertips Thank you! Monday, February 9, 2009

    ×