#32
Сообщение
radiks » 23 дек 2011, 10:47
Вот хороший способ, который не сможет взломать никакая спецслужба:
Using 'keyfiles' as enormous passwords
Free encryption software lets you use the first 1,024 characters of any file you choose as a gigantic password. But using keyfiles carries special dangers you need to be aware of — or risk locking yourself out of your own data forever!
Reader Charlie Cohen writes:
"Want a secure password you can't lose for your encrypted data? Use a keyfile instead of a password. With TrueCrypt, for example, you can pick any file you want, and the first 1,024 characters will be used for the password.
"For instance, you might pick a song on iTunes that you know will always be there, like a particular Beatles song or whatever. Download it if you don't already have it, and put it in your music files. When you're ready to decrypt and mount your secure volume, just browse to the song and click. Even the FBI wouldn't be able to figure that one out.
"If your house burns down, computer is stolen, etc., you can always go to iTunes and re-download the song (or take it off your iPod); with your backups, you're back in business."
TrueCrypt (site) is an excellent (and free!) tool for on-the-fly encryption of files, partitions, or whole disks.
TrueCrypt's ability to use part of a designated keyfile as a long password is very clever. But there are some gotchas with using a keyfile in the way you suggest, Charlie.
Say your PC was inaccessible for whatever reason and you needed to go online to get a new copy of whatever keyfile you used, such as that example MP3. If that file has been altered in any way — a slightly different header; a tweaked compression ratio; or even a single, accidentally flipped bit — then the first 1024 characters won't be exactly the same as in your original version of the file. The keyfiles won't match, and you won't be able to decrypt your files.
If you're going to use a keyfile, it's important to keep multiple copies of the original keyfile in several very secure locations so you can be 100-percent certain you'll have access to exactly the same arrangement of bits later on.
For that and other reasons, TrueCrypt's online documentation suggests you use it in combination with a regular, personal password. That way, you'll be implementing a very secure two-factor authentication system (definition), which is about as good as it gets on the desktop.
Keyfiles aren't worth the hassle, in my opinion. I prefer just to use a long, well-crafted, easy-to-remember, master password to securely encrypt my private files. It's not two-factor secure, but it's plenty secure for my routine needs.
There are many sites that tell you how to create strong passwords — Microsoft offers an adequate guide — but one simple, easy way is to use the initial letters of the words in a personally relevant (but nonobvious) passphrase.
For example, picking from my own sordid past, I might (but don't) use the phrase The first commercial software I wrote was for Apple II and Atari 800 computers! This becomes TfcsIwwfAIIaA800c! That's easy for me to remember but would be quite hard for someone else to guess, coming at it cold.
I'm sure you can come up with a phrase (longer or shorter as needed) that's based on unguessable personal trivia!
За действия страны ответственность лежит на народе этой страны.