ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    Encrypted flash drives

    IT Discussion
    6
    31
    3.7k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • A
      Alex Sage @scottalanmiller
      last edited by

      @scottalanmiller You can use two partitions too, but it's much easier to use a VeraCrypt Volume.

      1 Reply Last reply Reply Quote 0
      • A
        Alex Sage
        last edited by Alex Sage

        So to be clear, you not really encrypting the drive itself, your encrypting the data your putting on the drive.

        scottalanmillerS 1 Reply Last reply Reply Quote 1
        • A
          Alex Sage
          last edited by

          Remember that a VeraCrypt Volume is just a file. It can have no extension or it can have a fake one. I normally fill the flash drive with a bunch of unimportant unencrypted documents, as well some VeraCrypt Volume's named TPS_Report.xls, pics.zip, etc. Any normally person finding the USB drive, just assumes that those files at corrupted, and deletes then or better yet just wipes the drive and reuses it.

          BRRABillB iroalI 2 Replies Last reply Reply Quote 0
          • scottalanmillerS
            scottalanmiller @Alex Sage
            last edited by

            @aaronstuder said in Encrypted flash drives:

            So to be clear, you not really encrypting the drive itself, your encrypting the data your putting on the drive.

            Oh I see, that makes more sense then.

            1 Reply Last reply Reply Quote 0
            • BRRABillB
              BRRABill @Alex Sage
              last edited by

              @aaronstuder said in Encrypted flash drives:

              Remember that a VeraCrypt Volume is just a file. It can have no extension or it can have a fake one. I normally fill the flash drive with a bunch of unimportant unencrypted documents, as well some VeraCrypt Volume's named TPS_Report.xls, pics.zip, etc. Any normally person finding the USB drive, just assumes that those files at corrupted, and deletes then or better yet just wipes the drive and reuses it.

              Don't you trust VC to do its job? 😉

              DashrenderD 1 Reply Last reply Reply Quote 0
              • bbigfordB
                bbigford
                last edited by bbigford

                Decided to just use the built in tools (Bitlocker to Go and HFS+ encryption), for each device respectively. The Corsair Padlocks are cheaper than, say, IronKey. But still too spendy when we can get thumb drives for $3 apiece for regular 8GB drives.

                VeraCrypt is awesome, but it's going to be too cumbersome for end users. Going with the built in options are just going to be the easiest method instead of fighting with it, since it allows for plug in and prompt for password. 😐

                http://www.amazon.com/Corsair-Padlock-Secure-Flash-CMFPLA8GB/dp/B003809LBS/ref=sr_1_2?ie=UTF8&qid=1461363132&sr=8-2&keywords=corsair+padlock

                1 Reply Last reply Reply Quote 0
                • DashrenderD
                  Dashrender @BRRABill
                  last edited by

                  @BRRABill said in Encrypted flash drives:

                  @aaronstuder said in Encrypted flash drives:

                  Remember that a VeraCrypt Volume is just a file. It can have no extension or it can have a fake one. I normally fill the flash drive with a bunch of unimportant unencrypted documents, as well some VeraCrypt Volume's named TPS_Report.xls, pics.zip, etc. Any normally person finding the USB drive, just assumes that those files at corrupted, and deletes then or better yet just wipes the drive and reuses it.

                  Don't you trust VC to do its job? 😉

                  I'm not sure what you're asking?

                  BRRABillB 1 Reply Last reply Reply Quote 0
                  • BRRABillB
                    BRRABill @Dashrender
                    last edited by

                    @Dashrender said

                    Don't you trust VC to do its job? 😉

                    I'm not sure what you're asking?

                    He said he obscures his VC container on the disk. I guess a little extra security is OK, but isn't that the point of VC, that if someone gets their hands on your container they can't get into it?

                    An average user wouldn't know what it was anyway, and a hacker wouldn't be thrown off by the renaming.

                    scottalanmillerS 1 Reply Last reply Reply Quote 1
                    • scottalanmillerS
                      scottalanmiller @BRRABill
                      last edited by

                      @BRRABill said in Encrypted flash drives:

                      @Dashrender said

                      Don't you trust VC to do its job? 😉

                      I'm not sure what you're asking?

                      He said he obscures his VC container on the disk. I guess a little extra security is OK, but isn't that the point of VC, that if someone gets their hands on your container they can't get into it?

                      An average user wouldn't know what it was anyway, and a hacker wouldn't be thrown off by the renaming.

                      That would be my thought. It's just obscurity. The casual hacker is already thwarted. The determined one is not affected.

                      BRRABillB 1 Reply Last reply Reply Quote 0
                      • BRRABillB
                        BRRABill @scottalanmiller
                        last edited by

                        @scottalanmiller said

                        That would be my thought. It's just obscurity. The casual hacker is already thwarted. The determined one is not affected.

                        My thoughts exactly.

                        1 Reply Last reply Reply Quote 0
                        • iroalI
                          iroal @Alex Sage
                          last edited by

                          @aaronstuder said in Encrypted flash drives:

                          Remember that a VeraCrypt Volume is just a file. It can have no extension or it can have a fake one. I normally fill the flash drive with a bunch of unimportant unencrypted documents, as well some VeraCrypt Volume's named TPS_Report.xls, pics.zip, etc. Any normally person finding the USB drive, just assumes that those files at corrupted, and deletes then or better yet just wipes the drive and reuses it.

                          Same think I do in my PenDrive using Veracrypt.

                          Veracrypt is great and Free!!!

                          1 Reply Last reply Reply Quote 0
                          • 1
                          • 2
                          • 2 / 2
                          • First post
                            Last post