Do you even read past the headline
from your first link (the only one that actually attempts to crack in to the container)
Quote:
Conclusion
The generic brute force attack on any target, including a TrueCrypt volume is extremely difficult to achieve since the time needed to try the passwords is very long. The only logical approach is to perform the 'due dilligence' of knowing the partial password before attacking the TrueCrypt volume.
|
your second link says it cracks truecrypt but actually just detects the container and remnants in the system OS.
That's not "cracked" that's found, not cracked unless you can read my data.
And we haven't even touched on keyfiles that use data from normal file(s) as part of the password making a very long pass phrase.
And no one has found a way of determining if or which files that may or may not be present on the system were used as keyfiles. Because they are in all respects ordinary files unchanged by the fact that their info was used to help encrypt the hidden volume in the container that you point out can be detected.
And even if you tie up your computer guessing passwords the first password you'll find is the one to the fake normal volume (cause the password is short) not the important password to the hidden volume.
So you will believe you have cracked the file and wondering why I would so carefully protect pictures of my yard, pets and kids would be your
only hint of something amiss.
So I did miss speak MY grand kids great grand kids will be dead before they get my data. With out a massive jump in computing (quantum)
Unless they ask nice, but then again they can't be sure if there is or isn't a hidden volume in the container they found.
Again the best attack on a truecrypt volume is to corrupt the OS and get the user who knows the password ect. to mount the volume.
So you can read the mounted "drive" as a normal drive.
Ive seen other reports of "cracking" truecrypt but this is how they cracked it (not what I'd consider cracking the encryption).
edit: and for the point of deneability and auto created shortcuts: If I boot to a live CD OS like knoppix there are no surviving shortcuts or records of files used or accessed. Once the system powers down all the ram memory (where the shortcuts or tracks would be) is gone. Crack that!
And I use truecrypt version 7.0 not 5.1