The Notebook Review forums were hosted by TechTarget, who shut down them down on January 31, 2022. This static read-only archive was pulled by NBR forum users between January 20 and January 31, 2022, in an effort to make sure that the valuable technical information that had been posted on the forums is preserved. For current discussions, many NBR forum users moved over to NotebookTalk.net after the shutdown.
Problems? See this thread at archive.org.

    WinXP Filesystem-level Encryption

    Discussion in 'Windows OS and Software' started by E.B.E., Aug 29, 2008.

  1. E.B.E.

    E.B.E. NBR Procrastinator

    Reputations:
    1,572
    Messages:
    8,632
    Likes Received:
    4
    Trophy Points:
    206
    Hi,

    I'm looking for a way to encrypt certain files and directories on my computer (things like Thunderbird & Firefox profile folders where passwords and browsing history is saved, a password index, tax returns, document scans etc.)

    I have looked around, and as usual there are many related threads but none that answer my needs fully. The best info I found is here: http://forum.notebookreview.com/showthread.php?p=2672179#post2672179

    What I need is:
    1. Robustness. The encrypted data should be readable: in the event of Windows failure followed by reinstallation; in the event of hardware/motherboard failure, so with the HDD in another machine. All that should be needed in such an event would be remembering the password, and a reinstall of the software on the new OS/machine.
    2. Robustness. See above.
    3. Robustness. :)
    4. Secure. Should be difficult enough to crack so that anyone gaining access to (e.g., stealing) the HDD is better off just wiping it.
    5. File and directory-level encryption (because I don't want to rearrange my file structure so that I drop the files in a "vault" like with TrueCrypt. If truly necessary, I guess I'm willing to do this, but I'd rather not.)
    6. Transparency (enter password once, then all encrypted data should be readable even though it may be sparsely distributed around the filesystem)
    7. If possible, free, but I'm willing to pay some tens of dollars for the software if it's worth it.

    That's about it. I guess what I'd really like is EFS without the shortcomings of EFS (which I gather is easy to crack and/or can render data unreadable in the event of OS breakdown).

    Thanks in advance.

    Edit: BTW on top of that I'm thinking of activating the HDD firmware password. Just to make things an extra bit more difficult in case of something. Will that work across computers, e.g. in the event of motherboard failure?
     
  2. usapatriot

    usapatriot Notebook Nobel Laureate

    Reputations:
    3,266
    Messages:
    7,360
    Likes Received:
    14
    Trophy Points:
    206
  3. Itomix

    Itomix Notebook Consultant

    Reputations:
    15
    Messages:
    139
    Likes Received:
    0
    Trophy Points:
    30
    +1
    Truecrypt is amazing
     
  4. mooler

    mooler Notebook Consultant

    Reputations:
    9
    Messages:
    196
    Likes Received:
    0
    Trophy Points:
    30
    +2 for TrueCrypt. Unbreakable. I forgot my password to a container and ran a brute force attempt at cracking it.....nothing. I ended up just doing a low level format on that drive. haha. Good thing it wasnt really anything important...just some pics of my gf
     
  5. E.B.E.

    E.B.E. NBR Procrastinator

    Reputations:
    1,572
    Messages:
    8,632
    Likes Received:
    4
    Trophy Points:
    206
    Thanks for the info.

    See however item 5. I know about truecrypt and its excellent feedback. If there is no good file-level option, I'll end up going that way...
     
  6. schoko

    schoko Custom User Title

    Reputations:
    405
    Messages:
    1,090
    Likes Received:
    1
    Trophy Points:
    56
    well truecrypt is a nice thing and works really great, but the container thing is a bit odd, especially when you are working with the files and already have a structure in your files / folders.

    so far efs is a bit better for non mission critical files in an existing file folder structure. but you should export your key and back it up, in case your windows installation fails.
     
  7. Silas Awaketh

    Silas Awaketh Notebook Deity

    Reputations:
    891
    Messages:
    1,676
    Likes Received:
    0
    Trophy Points:
    0
    Is it better than the Windows Vista Ultimate's Bitlocker Drive Encryption?
     
  8. E.B.E.

    E.B.E. NBR Procrastinator

    Reputations:
    1,572
    Messages:
    8,632
    Likes Received:
    4
    Trophy Points:
    206
    You mean EFS? They are different things. EFS is file-system level encryption, and Bitlocker is full disk encryption. I believe. I'm new to this stuff myself.

    TrueCrypt is better because it can also encrypt only a portion of the HDD, and it works in XP as well as Vista; also has a version for MacOS. Also, it generates keys on the basis of password only, so no need to back up keys, like in Windows.

    More to the topic. I have done a bit of research, and it seems that the ATA security is pretty good.

    Source: http://en.wikipedia.org/wiki/Advanced_Technology_Attachment#HDD_Passwords_and_Security

    When the level is set to Maximum, the only way anyone is going to get access to your data without knowing the password, is remove the platters in a cleanroom, or perhaps with other specialized hardware only available at the HDD manufacturers' factories and probably to government security agencies. I certainly don't aim for the sort of security that would defeat these attempts, as well. :) I think James Bond would, though...

    The only problem is, how to figure out the security level of the HDD? And if it's High, how to set it to Maximum? My BIOS does not support that, it only allows to set the user password. I also don't find a tool on the Western Digital site (I have a WD2500BEVE PATA/EIDE 2.5 HDD). Does anyone know such a tool?

    (I found this BIOS extension http://www.fitzenreiter.de/ata/ata_eng.htm but I don't really trust it, last updated 2006 so it may not be compatible with my BIOS. Also I think it's mainly targeted at desktops)
     
  9. E.B.E.

    E.B.E. NBR Procrastinator

    Reputations:
    1,572
    Messages:
    8,632
    Likes Received:
    4
    Trophy Points:
    206
    So, the answer is, the security level defaults to High when I set the password. I can read this level with hdparm in Linux. I can't write it though, also it's very dangerous to try since those features are experimental and "use at your own risk". There are other "shady" utils like atapwd and that BIOS hack linked above...

    I wonder why the HDD manufacturers don't offer a proper tool to control these things, and make our life difficult, forcing us to use tools that may ruin the HDD due to incompatibilies and bugs. As long as the features are there anyway...