ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    Encrypted flash drives

    Scheduled Pinned Locked Moved IT Discussion
    31 Posts 6 Posters 4.2k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • A
      Alex Sage
      last edited by Alex Sage

      So to be clear, you not really encrypting the drive itself, your encrypting the data your putting on the drive.

      scottalanmillerS 1 Reply Last reply Reply Quote 1
      • A
        Alex Sage
        last edited by

        Remember that a VeraCrypt Volume is just a file. It can have no extension or it can have a fake one. I normally fill the flash drive with a bunch of unimportant unencrypted documents, as well some VeraCrypt Volume's named TPS_Report.xls, pics.zip, etc. Any normally person finding the USB drive, just assumes that those files at corrupted, and deletes then or better yet just wipes the drive and reuses it.

        BRRABillB iroalI 2 Replies Last reply Reply Quote 0
        • scottalanmillerS
          scottalanmiller @Alex Sage
          last edited by

          @aaronstuder said in Encrypted flash drives:

          So to be clear, you not really encrypting the drive itself, your encrypting the data your putting on the drive.

          Oh I see, that makes more sense then.

          1 Reply Last reply Reply Quote 0
          • BRRABillB
            BRRABill @Alex Sage
            last edited by

            @aaronstuder said in Encrypted flash drives:

            Remember that a VeraCrypt Volume is just a file. It can have no extension or it can have a fake one. I normally fill the flash drive with a bunch of unimportant unencrypted documents, as well some VeraCrypt Volume's named TPS_Report.xls, pics.zip, etc. Any normally person finding the USB drive, just assumes that those files at corrupted, and deletes then or better yet just wipes the drive and reuses it.

            Don't you trust VC to do its job? 😉

            DashrenderD 1 Reply Last reply Reply Quote 0
            • bbigfordB
              bbigford
              last edited by bbigford

              Decided to just use the built in tools (Bitlocker to Go and HFS+ encryption), for each device respectively. The Corsair Padlocks are cheaper than, say, IronKey. But still too spendy when we can get thumb drives for $3 apiece for regular 8GB drives.

              VeraCrypt is awesome, but it's going to be too cumbersome for end users. Going with the built in options are just going to be the easiest method instead of fighting with it, since it allows for plug in and prompt for password. 😐

              http://www.amazon.com/Corsair-Padlock-Secure-Flash-CMFPLA8GB/dp/B003809LBS/ref=sr_1_2?ie=UTF8&qid=1461363132&sr=8-2&keywords=corsair+padlock

              1 Reply Last reply Reply Quote 0
              • DashrenderD
                Dashrender @BRRABill
                last edited by

                @BRRABill said in Encrypted flash drives:

                @aaronstuder said in Encrypted flash drives:

                Remember that a VeraCrypt Volume is just a file. It can have no extension or it can have a fake one. I normally fill the flash drive with a bunch of unimportant unencrypted documents, as well some VeraCrypt Volume's named TPS_Report.xls, pics.zip, etc. Any normally person finding the USB drive, just assumes that those files at corrupted, and deletes then or better yet just wipes the drive and reuses it.

                Don't you trust VC to do its job? 😉

                I'm not sure what you're asking?

                BRRABillB 1 Reply Last reply Reply Quote 0
                • BRRABillB
                  BRRABill @Dashrender
                  last edited by

                  @Dashrender said

                  Don't you trust VC to do its job? 😉

                  I'm not sure what you're asking?

                  He said he obscures his VC container on the disk. I guess a little extra security is OK, but isn't that the point of VC, that if someone gets their hands on your container they can't get into it?

                  An average user wouldn't know what it was anyway, and a hacker wouldn't be thrown off by the renaming.

                  scottalanmillerS 1 Reply Last reply Reply Quote 1
                  • scottalanmillerS
                    scottalanmiller @BRRABill
                    last edited by

                    @BRRABill said in Encrypted flash drives:

                    @Dashrender said

                    Don't you trust VC to do its job? 😉

                    I'm not sure what you're asking?

                    He said he obscures his VC container on the disk. I guess a little extra security is OK, but isn't that the point of VC, that if someone gets their hands on your container they can't get into it?

                    An average user wouldn't know what it was anyway, and a hacker wouldn't be thrown off by the renaming.

                    That would be my thought. It's just obscurity. The casual hacker is already thwarted. The determined one is not affected.

                    BRRABillB 1 Reply Last reply Reply Quote 0
                    • BRRABillB
                      BRRABill @scottalanmiller
                      last edited by

                      @scottalanmiller said

                      That would be my thought. It's just obscurity. The casual hacker is already thwarted. The determined one is not affected.

                      My thoughts exactly.

                      1 Reply Last reply Reply Quote 0
                      • iroalI
                        iroal @Alex Sage
                        last edited by

                        @aaronstuder said in Encrypted flash drives:

                        Remember that a VeraCrypt Volume is just a file. It can have no extension or it can have a fake one. I normally fill the flash drive with a bunch of unimportant unencrypted documents, as well some VeraCrypt Volume's named TPS_Report.xls, pics.zip, etc. Any normally person finding the USB drive, just assumes that those files at corrupted, and deletes then or better yet just wipes the drive and reuses it.

                        Same think I do in my PenDrive using Veracrypt.

                        Veracrypt is great and Free!!!

                        1 Reply Last reply Reply Quote 0
                        • 1
                        • 2
                        • 1 / 2
                        • First post
                          Last post