The Notebook Review forums were hosted by TechTarget, who shut down them down on January 31, 2022. This static read-only archive was pulled by NBR forum users between January 20 and January 31, 2022, in an effort to make sure that the valuable technical information that had been posted on the forums is preserved. For current discussions, many NBR forum users moved over to NotebookTalk.net after the shutdown.
Problems? See this thread at archive.org.

    Safety File encryption

    Discussion in 'Windows OS and Software' started by hceuterpe, Feb 19, 2009.

  1. hceuterpe

    hceuterpe Notebook Evangelist

    Reputations:
    111
    Messages:
    380
    Likes Received:
    0
    Trophy Points:
    30
    I'm looking for an alternative for a group of small laptop users and encryption for Windows XP. Vista isn't an option so BitLocker won't be available. Whole disk encryption seems overly expensive to implement and is a performance hit.

    Assuming I set certain parameters such as:Limiting users to regular users (not admins) and limiting folder write permissions so their files only go to Documents and Settings. Also setting a strong and long password for the local Administrator and enforcing strong user passwords. Would Windows file encryption for the Documents and Settings folder be sufficient to keep data safe in case the laptop were stolen?

    My understanding is encryption files via folder encryption remain encryption and unable to open even if a hacker resets a user's password or the admin password.

    Users are also part of a Windows 2003 domain. There are no local users other than the built-in admin password.
     
  2. F!nn

    F!nn Notebook Consultant

    Reputations:
    62
    Messages:
    182
    Likes Received:
    0
    Trophy Points:
    30
  3. Tolkannn

    Tolkannn Notebook Evangelist

    Reputations:
    5
    Messages:
    358
    Likes Received:
    0
    Trophy Points:
    30
    you beat me to it :p
     
  4. DetlevCM

    DetlevCM Notebook Nobel Laureate

    Reputations:
    4,843
    Messages:
    8,389
    Likes Received:
    1
    Trophy Points:
    205
    I think using an independent encryption programme will always be better.

    There is one problem however:

    An article form the New York Times.

    Encryption keys reside in the RAM memory of a laptop - thus, if you can read the RAM once you logged on, the encryption key can be extracted.

    Problem 1: You can't read RAM on the laptop with the encryption - thus you need to transfer the RAM module after boot-up from one computer to another.

    How do you retain the data?
    You freeze the RAM module - the colder the longer it retains the data it was supposed to loose after the power supply was cut...

    What does this mean:
    If someone is desperate it is impossible to truly secure data on a laptop.
     
  5. Nankuru

    Nankuru Notebook Evangelist

    Reputations:
    215
    Messages:
    592
    Likes Received:
    0
    Trophy Points:
    30
    Windows EFS is available for Win XPpro which is OK in a corporate environment, but TrueCrypt is probably the way to go. Read up on its documentation and see if it's right for you; based on what you wrote I think it is.

    Just make sure you have a good backup policy, particularly for encryption keys.
     
  6. hceuterpe

    hceuterpe Notebook Evangelist

    Reputations:
    111
    Messages:
    380
    Likes Received:
    0
    Trophy Points:
    30
    I already looked into TrueCrypt, it has it's limitations with integration and it really won't work for me.
    Bottomline, if I keep a rule that all data that needs to be safe is encrypted with EFS and assume the thief doesn't do the RAM trick, is EFS enough?
     
  7. Pitabred

    Pitabred Linux geek con rat flail!

    Reputations:
    3,300
    Messages:
    7,115
    Likes Received:
    3
    Trophy Points:
    206
    If you make a rule, your users will break it. Especially for a small group of laptop users, you should just upgrade them to encrypted drives. It's going to be much less of your time spent getting it done, it won't get in the way of your users, and you won't have to remind them of where to put sensitive data because everything is encrypted (and there's no speed penalty. I'm using one now).
     
  8. ahl395

    ahl395 Ahlball

    Reputations:
    3,867
    Messages:
    8,218
    Likes Received:
    72
    Trophy Points:
    216
  9. Nankuru

    Nankuru Notebook Evangelist

    Reputations:
    215
    Messages:
    592
    Likes Received:
    0
    Trophy Points:
    30
    As far as I know, EFS is secure enough, though not as secure/versatile as TrueCrypt. It has other limitations; when the machine is on, the data is available, data is encrypted by account, problems with backups and keys.