Downloading and installing Truecrypt (step by step)
Downloading and installing Truecrypt (step by step)
as the title says.
I will take a potato chip AND EAT IT! ~ Kira
-
- Full of knowledge
- Posts: 2564
- Joined: 25 Jun 2014, 15:21
- Distribution: 3.2.2 Cinnamon & KDE5
- Location: London
Re: Downloading and installing Truecrypt (step by step)
@Kira
You may try the Truecrypt in i486 xzm modules on your own cognisance 8)
You may try the Truecrypt in i486 xzm modules on your own cognisance 8)
Linux porteus 4.4.0-porteus #3 SMP PREEMPT Sat Jan 23 07:01:55 UTC 2016 i686 AMD Sempron(tm) 140 Processor AuthenticAMD GNU/Linux
NVIDIA Corporation C61 [GeForce 6150SE nForce 430] (rev a2) MemTotal: 901760 kB MemFree: 66752 kB
NVIDIA Corporation C61 [GeForce 6150SE nForce 430] (rev a2) MemTotal: 901760 kB MemFree: 66752 kB
- brokenman
- Site Admin
- Posts: 6105
- Joined: 27 Dec 2010, 03:50
- Distribution: Porteus v4 all desktops
- Location: Brazil
Re: Downloading and installing Truecrypt (step by step)
How do i become super user?
Wear your underpants on the outside and put on a cape.
Wear your underpants on the outside and put on a cape.
Re: Downloading and installing Truecrypt (step by step)
so I installed a package like dnscrypt, how can I access it?
I will take a potato chip AND EAT IT! ~ Kira
- francois
- Contributor
- Posts: 6435
- Joined: 28 Dec 2010, 14:25
- Distribution: xfce plank porteus nemesis
- Location: Le printemps, le printemps, le printemps... ... l'hiver s'essoufle.
Re: Downloading and installing Truecrypt (step by step)
Welcome to porteus community Kira.
In command line do:
The final package and dependencies should be in /tmp/usm folder
Move them to /porteus/modules, so that they will be available at each bootup of the system. Reboot to activate them or simply double click on each of the modules to activate them.
Note: There is also a gui for USM package manager. But the cli version is simple to use and very efficient. See:
http://forum.porteus.org/viewtopic.php?t=3318 for newcomer's info on porteus.
In command line do:
Code: Select all
guest@porteus:/root$ su root
Password:
root@porteus:~# usm -u all (this will update the packages database)
root@porteus:~# usm -g dnscrypt
The following items were found.
Choose an number to confirm.
ctrl+c to quit
1) dnscrypt-proxy-1.4.1-x86_64-1sl.txz (just answer 1)
...
...
Multiple packages were detected.
Would you like to merge the packages into one module? [y/n]
...
Move them to /porteus/modules, so that they will be available at each bootup of the system. Reboot to activate them or simply double click on each of the modules to activate them.
Note: There is also a gui for USM package manager. But the cli version is simple to use and very efficient. See:
http://forum.porteus.org/viewtopic.php?t=3318 for newcomer's info on porteus.
Prendre son temps, profiter de celui qui passe.
-
- Samurai
- Posts: 134
- Joined: 18 Sep 2012, 20:56
- Distribution: Porteus 64bit KDE4
- Location: Absurdistan
Re: Downloading and installing Truecrypt (step by step)
about Diskencription on Porteus:
On a Linux only System you can use Luks:And please be carefull.
If you need truecrypt.
I have make a cheatcode for diskencrytion and in this project, i have make a buildsrcipt,
that download and build a lot of packages. Amongst other things TrueCrypt.
- download and unpack crsetup_src4.tar.xz
- read the readme steps 0 and 1.
- run additional # ./buildall.sh move
- the packages that you are need: ./repo(32|64)/wxGTK-2.8.12.1-$ARCH-1ab.xzm and ./pm-$ARCH-new/truecrypt-7.1a-$ARCH-3KnKo.xzm
activate them run in rootconsole: truecrypt &
the rest are hopefully self-explanatory.
@ brokenman
he should read truecrypt.sourceforge.net and about the history of TrueCrypt in the wikipedia.
additional duckduckgo`s truecrypt and make our own image about truecrypt.
And make yourself familiar with the legal situation of diskencryption in your country.
@ Bogomips
Since when need TrueCrypt systemd ?
On a Linux only System you can use Luks:
Code: Select all
# encrypting a blockdevice:
# <disk> mean a disk partition for example /dev/sdb1. Be carefull all data will lost on this partition.
cryptsetup luksFormat /dev/<disk>
# open the blockdevice
# or better you generate a virtual decrypted block-device from /dev/<disk> that are called: /dev/mapper/<mappername>
# <mappername> is a induvidial name that you have thought.
cryptsetup open --type luks /dev/<disk> <mappername>
# generate a ext4 filesystem
mkfs.ext4 /dev/mapper/<mappername>
# and close it.
cryptsetup close <mappername>
If you need truecrypt.
I have make a cheatcode for diskencrytion and in this project, i have make a buildsrcipt,
that download and build a lot of packages. Amongst other things TrueCrypt.
- download and unpack crsetup_src4.tar.xz
- read the readme steps 0 and 1.
- run additional # ./buildall.sh move
- the packages that you are need: ./repo(32|64)/wxGTK-2.8.12.1-$ARCH-1ab.xzm and ./pm-$ARCH-new/truecrypt-7.1a-$ARCH-3KnKo.xzm
activate them run in rootconsole: truecrypt &
the rest are hopefully self-explanatory.
@ brokenman
he should read truecrypt.sourceforge.net and about the history of TrueCrypt in the wikipedia.
additional duckduckgo`s truecrypt and make our own image about truecrypt.
And make yourself familiar with the legal situation of diskencryption in your country.
@ Bogomips
Since when need TrueCrypt systemd ?
- francois
- Contributor
- Posts: 6435
- Joined: 28 Dec 2010, 14:25
- Distribution: xfce plank porteus nemesis
- Location: Le printemps, le printemps, le printemps... ... l'hiver s'essoufle.
Re: Downloading and installing Truecrypt (step by step)
@kira:
What type of use do you intend for data encryption?
There is stock on porteus os some encryption possibilities. See: panel menu > system > porteus setting center > lock icon > Encrypt a folder of file.
What type of use do you intend for data encryption?
There is stock on porteus os some encryption possibilities. See: panel menu > system > porteus setting center > lock icon > Encrypt a folder of file.
Prendre son temps, profiter de celui qui passe.
-
- Full of knowledge
- Posts: 2564
- Joined: 25 Jun 2014, 15:21
- Distribution: 3.2.2 Cinnamon & KDE5
- Location: London
Re: Downloading and installing Truecrypt (step by step)
truecrypt-1:7.1a-2-i686.pkg.tar.xz.html > device-mapper > systemdKnallKopf wrote:@ Bogomips
Since when need TrueCrypt systemd ?
Linux porteus 4.4.0-porteus #3 SMP PREEMPT Sat Jan 23 07:01:55 UTC 2016 i686 AMD Sempron(tm) 140 Processor AuthenticAMD GNU/Linux
NVIDIA Corporation C61 [GeForce 6150SE nForce 430] (rev a2) MemTotal: 901760 kB MemFree: 66752 kB
NVIDIA Corporation C61 [GeForce 6150SE nForce 430] (rev a2) MemTotal: 901760 kB MemFree: 66752 kB
- Rava
- Contributor
- Posts: 5401
- Joined: 11 Jan 2011, 02:46
- Distribution: XFCE 5.01 x86_64 + 4.0 i586
- Location: Forests of Germany
Re: Downloading and installing Truecrypt (step by step)
Sometimes, a named dependency still is not obligatory as in: program won't run without it...Bogomips wrote:@ Bogomips
Since when need TrueCrypt systemd ?
truecrypt-1:7.1a-2-i686.pkg.tar.xz.html > device-mapper > systemd
It is years ago I last used truecrypt. Even when it is officially no longer supported, I saw no article anywhere that I can recall that tc has severe security issues.
Maybe some folks *cough*NSA*cough* just were not pleased cause they could not access truecrypted containers as they wanted and the ones developing it were ... threatened "convinced" to drop the project...
I know of only one issue with a criminal, and the federal police not being able to crack his encrypted container or encrypted file system... even after trying for at least 6 month. But don't ask for any more details, cause I have none. It was the German BKA or LKA, that's all I recall, and it was about alleged child porn, or in other words, the most wrong kind of person using (abusing) encryption... If you want more details on that case, your duckduckgo'ing on it is as good as mine.
______________________________________________________________________
Also, this: https://truecrypt.ch/
CipherShedTrueCrypt will not die
TrueCrypt.ch is the gathering place for all up-to-date information. Unfortunately TrueCrypt.org is dead. But, we (the pure-privacy people) will help organize a future.
[...]
In Development
Two teams, CipherShed and VeraCrypt, are currently leading the TrueCrypt replacement initiative. And that is very good news. We work with both teams for the better of the community.
https://ciphershed.org/
VeraCrypt
https://veracrypt.codeplex.com/
Cheers!
Yours Rava
Yours Rava
-
- Full of knowledge
- Posts: 2564
- Joined: 25 Jun 2014, 15:21
- Distribution: 3.2.2 Cinnamon & KDE5
- Location: London
Re: Downloading and installing Truecrypt (step by step)
All I know is that that a menu entry is created which launches a GUI. Having no prior experience with this program, was not able to proceed further and test the above conjecture. Easily fixed now, as there is nothing to stop you from downloading the tar containing both modules, and given previous experience with Truecrypt, activate both systemd and truecrypt, and then just truecrypt alone, and see how it goes. (Having separate modules, have allowed for this eventuality ) Would be interested to know the answer to that one. As they say, the proof of the pudding is in the eating.Rava wrote:Sometimes, a named dependency still is not obligatory as in: program won't run without it...Bogomips wrote:@ Bogomips
Since when need TrueCrypt systemd ?
truecrypt-1:7.1a-2-i686.pkg.tar.xz.html > device-mapper > systemd
P.S. Download a 32 bit iso and launch Porteus from iso, in 64 bit case.
Linux porteus 4.4.0-porteus #3 SMP PREEMPT Sat Jan 23 07:01:55 UTC 2016 i686 AMD Sempron(tm) 140 Processor AuthenticAMD GNU/Linux
NVIDIA Corporation C61 [GeForce 6150SE nForce 430] (rev a2) MemTotal: 901760 kB MemFree: 66752 kB
NVIDIA Corporation C61 [GeForce 6150SE nForce 430] (rev a2) MemTotal: 901760 kB MemFree: 66752 kB
- Rava
- Contributor
- Posts: 5401
- Joined: 11 Jan 2011, 02:46
- Distribution: XFCE 5.01 x86_64 + 4.0 i586
- Location: Forests of Germany
Re: Downloading and installing Truecrypt (step by step)
Like I said it is ages since I last used it, but now that you said the above, I indeed do recall some issues with tc when activating it with something missing... Cannot recall what was missing, but I included that missing part cause it did influence the was I wanted to use tc... also, technically itself ran without the dependency...Bogomips wrote:All I know is that that a menu entry is created which launches a GUI. Having no prior experience with this program, was not able to proceed further and test the above conjecture.
Do you mean yourself with that, or me? Cause I would try it running as pure 64 bit, or when not available, not run it at all...Bogomips wrote:P.S. Download a 32 bit iso and launch Porteus from iso, in 64 bit case.
Cheers!
Yours Rava
Yours Rava
- francois
- Contributor
- Posts: 6435
- Joined: 28 Dec 2010, 14:25
- Distribution: xfce plank porteus nemesis
- Location: Le printemps, le printemps, le printemps... ... l'hiver s'essoufle.
Re: Downloading and installing Truecrypt (step by step)
You did not answered to my question?francois wrote:@kira:
What type of use do you intend for data encryption?
There is stock on porteus os some encryption possibilities. See: panel menu > system > porteus setting center > lock icon > Encrypt a folder of file.
Did you looked at my suggestion?
Prendre son temps, profiter de celui qui passe.
- Rava
- Contributor
- Posts: 5401
- Joined: 11 Jan 2011, 02:46
- Distribution: XFCE 5.01 x86_64 + 4.0 i586
- Location: Forests of Germany
Re: Downloading and installing Truecrypt (step by step)
Not... really, technically the place where tc lives is all the places you still find the 7.1a version.
But that page links to another, saying the tc code audit /cryptanalysis is not finished yet. (That's where https://www.grc.com/misc/truecrypt/truecrypt.htm is outdated and another reason that page cannot be called "[the] place where truecrypt lives")
But alas! the code audit is finished:
http://istruecryptauditedyet.com/
So, yeah, with the we just have to read all of http://blog.cryptographyengineering.com ... eport.html and then know if tc 7.1a still can be used...istruecryptauditedyet.com wrote:Update Apr 2, 2015: Phase II complete. TrueCrypt has been audited.
Update Feb 18, 2015: Matthew posted an update on the Phase II cryptanalysis today. The Phase I audit report is available on the Open Crypto Audit Project site, and a verified source and download archive for TrueCrypt v. 7.1a can be found on our GitHub mirror. We'll be posting further news @opencryptoaudit on Twitter in the months ahead.
Will post here an heads up when I finished reading the final cryptanalysis / tc code audit...
//Update
Read his article, which is a TL;DR or the full report. Here the main parts:
http://blog.cryptographyengineering.com ... eport.html
So, yeah, according to the TL;DR and considering none of us would run tc from Windoze anyway: it is okay to be used!Matthew Green / blog.cryptographyengineering.com wrote:You can find the full report over at the Open Crypto Audit Project website. Those who want to read it themselves should do so. This post will only give a brief summary.
The TL;DR is that based on this audit, Truecrypt appears to be a relatively well-designed piece of crypto software. The NCC audit found no evidence of deliberate backdoors, or any severe design flaws that will make the software insecure in most instances.
That doesn't mean Truecrypt is perfect. The auditors did find a few glitches and some incautious programming -- leading to a couple of issues that could, in the right circumstances, cause Truecrypt to give less assurance than we'd like it to.
For example: the most significant issue in the Truecrypt report is a finding related to the Windows version of Truecrypt's random number generator (RNG), which is responsible for generating the keys that encrypt Truecrypt volumes. This is an important piece of code, since a predictable RNG can spell disaster for the security of everything else in the system.
The Truecrypt developers implemented their RNG based on a 1998 design by Peter Guttman that uses an entropy pool to collect 'unpredictable' values from various sources in the system, including the Windows Crypto API itself. A problem in Truecrypt is that in some extremely rare circumstances, the Crypto API can fail to properly initialize. When this happens, Truecrypt should barf and catch fire. Instead it silently accepts this failure and continues to generate keys.
This is not the end of the world, since the likelihood of such a failure is extremely low. Moreover, even if the Windows Crypto API does fail on your system, Truecrypt still collects entropy from sources such as system pointers and mouse movements. These alternatives are probably good enough to protect you. But it's a bad design and should certainly be fixed in any Truecrypt forks.
In addition to the RNG issues, the NCC auditors also noted some concerns about the resilience of Truecrypt's AES code to cache timing attacks. This is probably not a concern unless you're perform encryption and decryption on a shared machine, or in an environment where the attacker can run code on your system (e.g., in a sandbox, or potentially in the browser). Still, this points the way to future hardening of any projects that use Truecrypt as a base.
Truecrypt is a really unique piece of software. The loss of Truecrypt's developers is keenly felt by a number of people who rely on full disk encryption to protect their data. With luck, the code will be carried on by others. We're hopeful that this review will provide some additional confidence in the code they're starting with.
Cheers!
Yours Rava
Yours Rava
Re: Downloading and installing Truecrypt (step by step)
@rava
thnx bro for posting review 'in deep', very interesting,
so does veracrypt has similar issues, the que is, whats more secure
veracrypt vs truecrypt
thnx bro for posting review 'in deep', very interesting,
so does veracrypt has similar issues, the que is, whats more secure
veracrypt vs truecrypt