You Need To Encrypt Your Drives! (Seriously...)

Поделиться
HTML-код
  • Опубликовано: 21 авг 2024
  • Do you need to encrypt your hard drive or solid state drive using an encryption tool like Bitlocker, FileVault, or Veracrypt for your Windows or MacOS laptop/desktop? ABSOLUTELY! In this Techlore video tutorial/guide, I discuss and demonstrate the reasons why it is an absolutely necessity for you to encrypt your drives in order to properly secure your files, programs, and operating system from a basic attack involving booting into a live Linux distribution and mounting any unencrypted drive without your password. This can lead to viruses, keyloggers, identity theft, stolen documents/files, deleted documents/files, or writing illegal files which don't belong to you.
    If you're interested in learning about EVERYTHING you need to know about security, privacy, and anonymity--check out Go Incognito, a free and in-depth course taking you from start to finish: techlore.tech/...
    🔐 Our Website: techlore.tech
    🕵 Go Incognito Course - to learn about privacy: techlore.tech/...
    🏫 Techlore Coaching - to get direct support: techlore.tech/...
    💻 Techlore Forum - to connect with other advocates: discuss.techlo...
    🦣 Mastodon - to stay updated: social.lol/@te...
    We cannot provide our content without our Patrons, huge thanks to:
    BRIGHTSIDE, Clark, Ente, Larry, Afonso, Boori, Brad, Casper, Cookie, Floyd, JohnnyO, kevin, love your content, NotSure, Poaclu, x
    🧡 Join them on Patreon: / techlore
    💚 To see our production gear, privacy tools we use, and other affiliates: techlore.tech/...
    💖 All Techlore Support Methods: techlore.tech/...
    This is an extremely fast and simple hack/attack which can be done by any person who has a few minutes of physical access to your computer. This works on any version of Windows, any version of MacOS, and on both laptops and desktops as long as the drive is not encrypted. Even if you have a password to login! (A password is not drive encryption) This is a basic requirement if you hope to protect your digital security and privacy.
    How to Make Bootable Linux Drive: • Create Bootable Linux ...
    Veracrypt: www.veracrypt....
    Veracrypt Tutorial: • Veracrypt Get Started ...
    Additional Notes:
    1) The absolute best thing you can do to combat this problem is by spreading the message. Make sure to share this video with all of your friends! Odds are they have no idea this is possible and think that a basic login password is enough. Protect your friends and family 👍
    2) I am fully aware the both FileVault and BitLocker use proprietary encryption which most likely has backdoors by the company and/or the government. A) Having ANY encryption is still infinitely better than having nothing, B) These are the absolutely simplest ways to encrypt your computer and C) If you want genuinely good open encryption, consider using Veracrypt or a PGP drive encryption tool, although they are a bit trickier to setup.
    3) Macs only mount in read-only, so you aren't able to copy files to a Mac computer or modify the Mac files. But you still have the capability of viewing them and copying them to another computer...still a huge risk!
    4) Like the video says, adding a password to modify the boot priority and/or access the BIOS at all is an excellent security precaution, but it won't help you at all from someone who physically removes the drive from your computer.
    5) A huge security benefit is if your laptop is ever lost or stolen, you know your data is safe :) Loading viruses and keyloggers are very sophisticated and quite honestly uncommon. Simple data robbery is the main attack we're avoiding.
    #veracrypt #encryption #hacked

Комментарии • 239

  • @techlore
    @techlore  6 лет назад +51

    Additional Notes:
    1) The absolute best thing you can do to combat this problem is by spreading the message. Make sure to share this video with all of your friends! Odds are they have no idea this is possible and think that a basic login password is enough. Protect your friends and family 👍
    2) I am fully aware the both FileVault and BitLocker use proprietary encryption which most likely has backdoors by the company and/or the government. A) Having ANY encryption is still infinitely better than having nothing, B) These are the absolutely simplest ways to encrypt your computer and C) If you want genuinely good open encryption, consider using Veracrypt or a PGP drive encryption tool, although they are a bit trickier to setup.
    3) Macs only mount in read-only, so you aren't able to copy files to a Mac computer or modify the Mac files. But you still have the capability of viewing them and copying them to another computer...still a huge risk!
    4) Like the video says, adding a password to modify the boot priority and/or access the BIOS at all is an excellent security precaution, but it won't help you at all from someone who physically removes the drive from your computer.
    5) A huge security benefit is if your laptop is ever lost or stolen, you know your data is safe :) Loading viruses and keyloggers are very sophistacted and quite honestly uncommon. Simple data robbery is the main attack we're avoiding.

    • @doctor7z
      @doctor7z 6 лет назад

      For VPNs, would you recommend Virtual Shield or Nord?

    • @techlore
      @techlore  6 лет назад +1

      I’ve never used Virtual Shield so I really can’t give an opinion on them. Nord has consistently been a very good performer in the testing on the channel. Virtual shield is on the list to review 👍

    • @ceruleanphoenix993
      @ceruleanphoenix993 6 лет назад +1

      2 things. First, is VeraCrypt encrypting the entire drive or just a part of it? Second, keep in mind and inform people that they can actually get "hacked" without the "hacker" ever touching their computer by simply being connected to the same wifi connection!

    • @techlore
      @techlore  6 лет назад +1

      Veracrypt can do both as far I know...individual files and full drive encryption.

    • @JoseRodriguez-gw8kg
      @JoseRodriguez-gw8kg 6 лет назад +1

      how do you get your flash drive to do this? Could you make a video for that

  • @zachmcfadden716
    @zachmcfadden716 6 лет назад +74

    I did this to a school laptop, booted from a live linux usb, changed the magnify to cmd, giving me full admin cmd access without even logging in, typed a few commands, and had my own full access local account in 15 minutes

    • @techlore
      @techlore  6 лет назад +48

      Then what you do is change the wallpaper to “Encrypt your drives IT department” and wait for them to get half a clue as to how to properly secure their devices. Shame on them for not encrypting that stuff. Students are logging in every day with personal information...that is just so ridiculous.

    • @randomsnow6510
      @randomsnow6510 4 года назад

      I was going to do that but coronavirus happened. I would of had to unplug the harddrive to hack the boot order because the bios has security.

    • @arisu7397
      @arisu7397 4 года назад

      oh wow thats cool

    • @mlgoverrated745
      @mlgoverrated745 3 года назад

      My school has the bios locked and I don’t know where the cmos battery is

    • @jamesedwards3923
      @jamesedwards3923 8 месяцев назад

      Softwate encrypting the drive would have stopped you. Wow, your school was lazy.

  • @NoEgg4u
    @NoEgg4u 6 лет назад +51

    Performance considerations:
    If you use Bitlocker or VeraCrypt, etc, to encrypt your partition(s) (meaning: everything is encrypted), then know that your CPU will always be using cycles to encrypt and decrypt every read and write function, which is significant.
    So you will see a performance hit.
    For general use, you might not notice. But if you are, for example, rendering videos (or doing any other type of CPU intensive work that will use all of your CPU cores and CPU cycles), then your work will suffer, as it will take noticeably longer.
    If you do not need to encrypt 100% of your files, then I suggest that you use VeraCrypt to create an encrypted, virtual drive, and you can store all of your sensitive files in that encrypted, virtual drive.
    As noted in the video, that encrypted drive (which will be a single file) can be copied by anyone that has physical access to your computer. But as long as you used a proper passphrase, then that file will be useless to them -- it will be gibberish.
    This will not, however, prevent them from deleting your encrypted drive (file), or screwing with any other files on your computer. So be sure to backup your computer to an external drive, which only you can physically possess. A cloud backup is an option, and is better than no backup. But if your computer will not boot, you will have additional hurdles in copying your cloud files back to your computer for a restore. And do you want a cloud service (a 3rd party) to have copies of your sensitive files?
    Cheers!

    • @jamesedwards3923
      @jamesedwards3923 2 года назад +3

      Agreed.
      I have encrypted my systems. One is a multifunction rig. Primarily for streaming and editing.
      Your security is in correlation to your threat modeling. If you want to encrypt everything. Which is normally my default for primary drives. I suggest you invest here:
      1) Buy the fastest processor you can.
      2) By the one with the most cores you can afford.
      3) RAM, faster is better always, but in real world applications. There is a limit. Unless you are doing some heavy stuff on it. Most of us are not. Video editing, rendering, etc. For the average users and casual gamers. They will not notice much difference.
      With every computer I have ever owned. RAM is what I normally consider one of the key upgrades.
      4) For your OS partition, a platter drive is more secure. An SSD. Given the technology and how it works at current. Is less secure in most instances, but speeds up performance even on older rigs. Extending their life. There are ways to mitigate security risks with SSDs.

    • @jamesedwards3923
      @jamesedwards3923 2 года назад +1

      @«tutacat» Look up hardware encryption standards and breaches. Garbage. I use it as a layer. Not as my absolute line of for security.
      Even Microsoft gives instructions to disable hardware encryption.
      Software encryption all the way.

    • @jamesedwards3923
      @jamesedwards3923 2 года назад

      @«tutacat» From what I read. Hardware encryption sucks. OPAL was poorly implemented. I use it as weak 2FA. A common thief will steal the drive. Think it is busted. Thus they will either wipe the drive or toss it in the trash in fustration. Fail Safe or Fail Secure? I lean on Fail Secure most of the time. Any mission critical data is typically software encrypted. Either as individual files or an encrypted partition.
      This will not stop an informed individual. Or a government agency. If somebody broke into my house. I doubt they would have a clue.
      Also, their are plenty of forms and RUclips Videos on how to bypass the weakest of hardware encryption. With relative ease.
      Now some are better than others. However, I do not bet the farm on hardware encyrption.
      winaero.com/disable-hardware-bitlocker-encryption/
      linustechtips.com/topic/991420-major-ssd-hardware-encryption-flaws-discovered/
      www.digitaltrends.com/computing/western-digital-encryption-flaws/
      redmondmag.com/articles/2018/11/06/microsoft-ssd-security-advisory.aspx
      www.bleepingcomputer.com/news/security/flaws-in-popular-ssd-drives-bypass-hardware-disk-encryption/
      www.tomshardware.com/news/crucial-samsung-ssd-encryption-bypassed,38025.html
      www.tomshardware.com/news/crucial-samsung-ssd-encryption-bypassed,38025.html
      www.reddit.com/r/DataHoarder/comments/5z2gmf/do_western_digital_external_drives_still_have/
      www.pcworld.com/article/398130/bitlocker-windows-built-in-encryption-tool-no-longer-trusts-your-ssds-hardware-protection.html
      www.zdnet.com/article/flaws-in-self-encrypting-ssds-let-attackers-bypass-disk-encryption/
      www.computerworld.com/article/2995516/western-digital-self-encrypting-hard-disk-drives-have-flaws-that-can-expose-data.html
      arstechnica.com/information-technology/2015/10/western-digital-self-encrypting-hard-drives-riddled-with-security-flaws/?comments=1

    • @jamesedwards3923
      @jamesedwards3923 2 года назад

      ​@«tutacat»
      Disclaimer: I am not an expert. I read things. Watch RUclips Videos. As well as draw conclusions from my own experiences.
      LOL, you want to take that risk for senstive data. Knock yourself out. I never suggest long term storage. Of senstive data. On a hardware encrypted drive. My only exception is if the files are individiually encrypted. That is fine. Senstive naked data long term on a hardware encrypted drive? Absolutely not.
      I Own a few old and new hardware encrypted drives. All of them are on a compromised list. Last I checked, they all had firmware updates.
      As far as speed. I am generally going agree with you. Since you would also have to account settings both on the OS and and hardware. Not to mention bus speeds. Etc.
      LOL, if you can afford after. Buy faster. Every milisecond counts.
      One of the things I learned using VeraCrypt. Is that in some rare instances. There is slow down depending on what I am doing. The best I can do is buy a faster processor with more cores. Which for the moment is not required. For gaming. A faster graphics cand and going above 60Hrtz. Seems to be bottlenecking my FPS.
      Now what I could do is enable virtual memory. However, that is in itself is a security risks. Granted minimal since the entire drive is encrypted. Also I have not maxed out my RAM.
      What I have personally observed. Is that during certain processes. Even when I use all the cores on my processor. Opersations that require way more cycles. Before I encrypted the drive. This was not a problem at all. Thus I advise everyone. If you are going total OS drive encryption with VeraCrypt. Which I recommend everybody does. You must buy all the cores you can. Lite users will see absolutely no difference. Casual web browsing. Videos with minor editing.
      I use bitlocker, but to a limited extent. Only out of convience, nothing more. To people I talk to and or know off line. I tell them. If you are not software encrypting your senstive data. They are fools.
      Fail Safe or Fail Secure?

    • @prototry
      @prototry 2 года назад +2

      @@jamesedwards3923 Decently new hardwares would probably be able to encrypt and decrypt simultaneously without a noticable slowdown as long as your CPU have the AES new instruction. I have a laptop from 2016 and with full disk encryption, and it has only been experiencing 2-5 frames drop when playing games.

  • @slap_my_hand
    @slap_my_hand 2 года назад +21

    It's crazy to think that there are really people out there who leave their data completely unprotected while I'm deep down in the rabbit hole of encryption and trying to close every tiny loophole that could enable someone with physical access to perform an evil maid attack on me.

    • @jamesedwards3923
      @jamesedwards3923 2 года назад +1

      Same here dude. I know people who make no effort to encrypt their phones.
      I know one person who made no effort to wipe a phone after it was completely compromised. Nor did they destroy it and buy a new one.
      You know what I learned about users? They are not ignorant in the general or laymen sense. They are just lazy. Until they get powned. Most of them will never make even a decent basic effort. Even then, they do not care.
      If one more person bitches and complains to me offline. Here are my following questions:
      1) Did you use a password manger?
      2) Did you use complicated and long passwords. For the codes you must remember?
      3) Did you enable OTP and FIDO keys for all accounts that allow it?
      - Did you disable SMS on all accounts that allow you to turn it off? Yes, I acknowledge some accounts you do not have a choice.

    • @eeaotly
      @eeaotly Месяц назад

      Every time when I was paranoid I lost important information.

  • @B1_GGS
    @B1_GGS 6 лет назад +57

    good job bring this to light everyone should use full disk encryption

    • @techlore
      @techlore  6 лет назад +10

      It makes less than a 10% difference on any modern machine, this is not a noticeable difference whatsoever. If you have an SSD, this will be almost no difference.

    • @jamesedwards3923
      @jamesedwards3923 3 года назад

      Upgrades will be completed soon on all devices.

  • @Christian-wg7gz
    @Christian-wg7gz 6 лет назад +41

    This youtuber actually makes good and informative content.
    Keep up the good work!!!!!!!!!

    • @techlore
      @techlore  6 лет назад +4

      Thanks for the kind words :)

  • @ithound
    @ithound 5 лет назад +8

    Its also worth encrypting the backup drive as when Mac and windows backup encrypted operating systems the backup is not encrypted.

  • @Flowave-cc5ul
    @Flowave-cc5ul 3 года назад +4

    I'm do dumb coz o was like " oh that mini-fridge is a great Idea to keep drinks and snacks there I'm going to get one " ...just realized its your pc tower

  • @wannabe-01
    @wannabe-01 6 лет назад +5

    I didden´t know that my laptop missed the TPM. So i had to make a GPO. Greate video !

  • @ps2hacker
    @ps2hacker 5 лет назад +4

    The only trouble with encrypting your system drive in Windows is that you will have to boot from some other partition that isn't encrypted. Sometimes Windows sets itself up to do that when it installs, but not always. In that case, you will have a hidden partition named SYSTEM_RESERVED, and you will not have the hidden directory BOOT or hidden file BOOTMGR in the root of your system drive, that's how you can tell. In that case, drive encryption won't be an issue.

    • @jamesedwards3923
      @jamesedwards3923 2 года назад

      LOL, I still need to buy a cheap, but vial microSD or flash drive. For my recovery disk. All critical data is not on the primary drive. Two internals and external SSD for backing up daily stuff.

    • @jamesedwards3923
      @jamesedwards3923 2 года назад

      You can install and configure to boot from a flash drive. I have not learned how to do this yet. In time I will and adjust my security protocols accordingly.

  • @Elohimless
    @Elohimless 5 лет назад +3

    This channel is very underrated (in my opinion!)

    • @techlore
      @techlore  5 лет назад

      Thanks for watching!

    • @techlore
      @techlore  5 лет назад

      Wow Stephen thanks so much for all the nice comments 😀 Yes, that support link is the best way to give back; I also recently setup Brave Rewards on the RUclips channel itself if you use BAT. You’ve already given back in encouragement and support, so thank you!

    • @jamesedwards3923
      @jamesedwards3923 2 года назад

      That is because he makes harder subjects easier to understand. Telling people how use more powerful tools to further secure their data.
      Of course it is underrated.

  • @rhymingdinosaur964
    @rhymingdinosaur964 6 лет назад +6

    Im so happy i subbed. Techlore ur on point with ur content

    • @techlore
      @techlore  6 лет назад

      Thanks Rhyming Dinosaur :)

  • @btno222
    @btno222 2 года назад +1

    CHANGE YOUR EFI OR BIOS AND ENTER HARD DRIVE PASSWORD AND ADMIN PASSWORD THEN ALSO TPM BITLOCK ON WINDOWS, THEN ALSO BLOCK SMB PORTS AND PORT 445, CHANGE YOUR NETWORK 'WORKGROUP' DEFAULT TO SOMETHING ELSE! UTILIZE PFSENSE FROM THE CABLE MODEM, DISABLE THE WIFI ON THE MODEM IF YOU CAN'T GET A DOCSIS 3.0 MODEM..IF YOU DO GET A NEW MODEM ONE YOU BUY ON YOUR OWN YOU WOULD NEED TO REGISTER THAT ONE MODEM DOCSIS 3.0 TYPE WITH YOUR ISP CABLE COMPANY!!! I LIKE MESH WIFI BUT THAT TOO IS A VULNERABILITY SO IF YOU WANT AND ARE PARAZ CAT 5 IT IF YOU WANT IT CAT 6 IT DOWN TO THE FASTER THROUGHPUT LAN TOPOLOGY WITH ITS SERIOUS UPLOAD AND DOWNLOAD 10Gbps ON YOUR LAN GRANTED YOU GOT THE HARDWARE SUPPORT FOR IT... I DUNNO ??? DO YOU

  • @seelensand
    @seelensand 4 года назад +1

    btw: Windows 10, even the home edition, includes a "disk encryption" feature which will be available in the settings if your device uses a TPM (modern processors can actually have a TPM integrated into the CPU, at least that's the case with my Ryzen and modern laptops usually have some sort of TPM too) and has said TPM activated together with secure boot. Modern laptops often have all of this enabled and might even have the disk encryption feature activated by default.
    Of course, VeraCrypt is more secure, simply because it's opensource but also a lot more, but disk encryption has the advantage of being easy to use, literally one click on one button on the settings and that's it, no restart required and it does not need the user to remember a strong password and type it in on every boot so it is a lot better for "non tech savvy people" as it's easy and painless.

    • @jamesedwards3923
      @jamesedwards3923 3 года назад +1

      Disclaimer: I am not a cybers security expert or scientist. I just read casually. I am a layman. Remember this is the internet.
      Hardware encryption is weak. This has been well documented. Unless you have a absolute minimal assumption of threats in your models. I do not recommend using hardware encryption as a single layer at all. If at all possible software encryption is the preferred option. If you do not believe me. Take a few hours out of your day and run a search on hardware encryption flaws.

    • @jamesedwards3923
      @jamesedwards3923 2 года назад

      TPM are a component of encrypting anything on a computer. I do not even mention it since it is a standard component. Like a math coprocessor. When I talk about hardware encryption. I am referring to the OPAL standard.

    • @jamesedwards3923
      @jamesedwards3923 Год назад

      If you want to stick with Microsoft Encryption. Research EFS for Microsoft Windows Professional and higher.
      If you used Windows NT or Windows 2000 back in the day. You should be aware of this.
      I have incomplete casual data. So I do not know all the strengths and weaknesses. Cumbersome, but not bad for low threat environments.

  • @redeyesdrogon786
    @redeyesdrogon786 6 лет назад +3

    Awesome video man! Awesome video! Keep up the good work bro!

  • @dave24-73
    @dave24-73 28 дней назад

    If you are hacked, even if the drive is encrypted it’s unencrypted when they log in as you. Encryption only helps if they haven’t hacked you and computer was turned off. Otherwise you wouldn’t be able to access your own files.

  • @startingfromabsolute
    @startingfromabsolute 5 лет назад +2

    Great tips. Encrypting my machines as i am typing this.

    • @jamesedwards3923
      @jamesedwards3923 2 года назад

      Finishing up building and upgrading my devices this week.
      Yea, I have been busy. Too busy.

  • @impermanenthuman8427
    @impermanenthuman8427 6 лет назад +3

    Awesome video as usual! One more thing to growl about windows on this issue though, is when you specifically buy windows 10 pro largely for the convenience of bitlocker capability, then the system tells you that you still can’t use bitlocker because you don’t have a TPM (trusted platform module) on the laptop motherboard...fuming, should have just bought home and used Veracrypt for free which is regarded as more secure, and if you ever want to take the drive out of your laptop for mobility and install it in another system then once unencrypted you can still use the drive, where if it’s bound to the TPM on your motherboard then it makes life hard for you...but then...your even more fuming when you find out your Samsung SSD that you just loaded your new copy of Windows 10 pro onto, is capable of ‘hardware level encryption’ and has a chip in it that does all the encrypt/unencrypt in real time with no performance lag on your system because the process isn’t done by your processor AND there is currently no known way to hack it by any means, whereas there are ways to hack bitlocker and Veracrypt with enough skill time and energy
    So annoyed Samsung built an awesome feature into their ssd’s and virtually keep it a secret!? marketing really needs to communicate with the engineering dept better, plus I still don’t quite know how to set it up though, instructions for it are sparse and I think I need to use Veracrypt with it too?
    Would love a decent tutorial on how to set it up with windows and Ubuntu? or at least a proper tech support number to ring so they can walk me through it? please...😬
    I wonder how many people there are out there that also have Samsung ssd’s (plus some other premium brand ssd’s) that have no idea there ssd is capable of the best encryption method of all?

    • @techlore
      @techlore  6 лет назад

      It completely is frustrating! I actually made a tutorial for this though lol:
      ruclips.net/video/WZELVbrUEOM/видео.html
      (It’s old so don’t be too harsh)
      And yes Samsung totally kept this under the radar which is crazy! I only use Samsung SSDs and having that functionality is absolutely spectacular and doesn’t require crappy bitlocker

  • @sambarringer2862
    @sambarringer2862 4 года назад +2

    Will this impact SSD lifetime and/or performance? Also what is the CPU/RAM/GPU overhead (I imagine GPU would be doing nothing) for a ryzen 5 3000 mobile series?
    EDIT: Would be using VeraCrypt either on Ubuntu, Manjaro or Win 10
    Love ur vids!

    • @techlore
      @techlore  4 года назад +2

      It’s very minor. You won’t notice a difference in casual usage with that setup. You could see 10% decrease in performance in intense tasks. Depends on the rig

    • @sambarringer2862
      @sambarringer2862 4 года назад +1

      @@techlore Thanks for the answer! Go incognito is great btw and have been listening to ur new show

    • @jamesedwards3923
      @jamesedwards3923 Год назад

      Follow up to my initial post.
      Buy the fastest and most efficient specs you can.
      When using encryption on my rigs. Initial access or opening is the bottleneck. Even when including gaming. Once accessed. No significant speed decrease.
      Software encryption, all the way.

  • @bradjones5132
    @bradjones5132 6 лет назад +3

    Your channel has amazing coverage of how to stay safe online. Looking forward to seeing your channel grow!
    P.S. You remind me of Steve Jobs so much lol (No offence intended)

    • @techlore
      @techlore  6 лет назад

      Glad to have you on board and I'm happy you enjoy it :)
      As for being like Steve Jobs...I am not much of a revolutionary thinker lol, just a presenter of information. I am glad you think so though!

  • @hotrice4539
    @hotrice4539 4 года назад +2

    Did I watch a seven minute ad for Linux?

  • @ejonesss
    @ejonesss 2 года назад

    the framing part i doubt would work very well unless you have a police department that does not have access to the advanced forensics lab.
    most of the really bad stuff that can get someone put in jail like c/sam a halfway forensics department will be able to read the meta data of the files and will see someone from the outside put it there to set you up.
    it is far easier to swat someone as it is a popular thing to do as a result of being in live streaming but even then many police departments are learning what swatting is and is working with the 911 dispatch centers to trace the false alarms.

  • @unguidedone
    @unguidedone 5 лет назад +2

    you also need to explain how cold boot attacks can happen to booted and how it effects encrypted computers. Just because its encrypted DOES NOT MEAN ITS SAFE. ya i needed to use caps for that. Want a totally safe computer? POWER DOWN the computer with the keys / have encrypted memory / securely overwrite memory / use a tpm / use very strong keys. Ok totally safe does not exist it just reduces your odds of human error.

    • @danielson_9211
      @danielson_9211 4 года назад

      TPM, Bitlocker with encryption, Acronis with encryption. If you can crack it you are in the wrong line of work. Will it slow down your system, yes by like 3.7% average. Can always try to brute force it but good luck with that 256bit the sun will go dim first. People go after your keys and if they want it bad enough they can eventually get them, either by being sneaky or just straight out violent means. Can sub Bitlocker and Acronis with 2 others, just saying triple layer protection.

    • @jamesedwards3923
      @jamesedwards3923 Год назад

      Password protecting the UEFI aka BIOS. Is a good first step. If you 'software' encrypt the drive. Which is something most people do not even think about. You greatly mitigate the threats.
      Correct, about the RAM issue. First off why most of my encryption involves VeraCrypt, since they use limited encryption of the keys. It is a yes/no option when you type in the password. I do not know if Windows Bitlocker does it at all. I use Bitlocker for lower threat modeled threats. I have to do more research.
      Let us be honest. Most smash and grab thieves will have no fucking idea what we are talking about.
      You are correct enabling TPM is useful. Laptops come with it. Modern CPUs have a it built in. You can also buy an independent TPM for desktops.
      Also when dealing with laptops. Enabling UEFI password. Will turn your laptop into a brick. So unless they are going to flash hack it or replace the chip. Which again, most common thieves will not. At best they will sell it for parts.

  • @dumpsterdiverspcreclamation
    @dumpsterdiverspcreclamation 3 года назад +2

    One more thing... To do what we just saw in this video the "bad guy" still has to have physical access to your PC FIRST... Before he or she can pull all those nasties.

  • @anyone7605
    @anyone7605 4 года назад +1

    Sorry dad. On a completely seperate note; Can I change my operating system completely? and then encrypt my drives? Your content is always really good by the way, thank you for sharing it. Much appreciated.

    • @techlore
      @techlore  4 года назад +2

      Yeah of course. Major OSes have drive encryption support like Linux and MacOS

    • @anyone7605
      @anyone7605 4 года назад

      @@techlore Is it still safe and anonymous to browse Tor if I was to use a boot up version of Linux or would it be better to just fully convert to Linux?

  • @sudiptosarkar5711
    @sudiptosarkar5711 6 лет назад +1

    As usual great video brother.... Please make videos on hacking, viruses and malware...

  • @jamesedwards3923
    @jamesedwards3923 2 года назад

    I would really love to see you do a full tutorial on cryptomator and PGP.
    PGP is an open standard that most people I talk to. Have never even haerd of. It was old when I was in high school. I am getting old by the way.

  • @idankcai7787
    @idankcai7787 6 лет назад +2

    Fiiiurrrssst.
    Been waiting for this video!!

    • @techlore
      @techlore  6 лет назад

      I’ve been waiting for you 😛

    • @idankcai7787
      @idankcai7787 6 лет назад

      ( ͡° ͜ʖ ͡°)

  • @SyberPrepper
    @SyberPrepper 6 лет назад +3

    Great video. I use Acronis image backup software. If you encrypt the whole drive with Veracrypt, will this prevent using image backup software like Acronis? Thanks.

    • @techlore
      @techlore  6 лет назад

      Never tested this but my guess is yes. If it somehow does clone they’ll still need a password to decrypt it. Someone chime in if I’m wrong.

    • @ps2hacker
      @ps2hacker 5 лет назад

      I assume that your Acronis is on some kind of bootable media, like a CD or USB drive. In that case, you can still use it, but the backup images will also be encrypted. But you can copy and restore the encrypted images, and they will still work. There is only one backup/disc imaging program, the one I use, that can make a backup image of the system that it's running on, so doesn't have to be booted in a different os, and it's called SelfImage. If you make a backup using that, in the running system, then the backup will NOT be encrypted. SelfImage is freeware, and makes standard format *.img flat disc images that will work with many different programs, like WinHex, WinImage, and many others.

    • @ps2hacker
      @ps2hacker 5 лет назад

      @@MarkUnique Which aspect? I'll admit, my drive isn't encrypted, so I have never tried it. But I assume that the decryption takes place at a lower level, so it will be presented to the software the same way as it's presented to the user, and therefore if the system is running, it's decrypted already, and so will be the backup. But like I said, backing up the running system is a trick in itself that I only know of one software that can do at all. Generally speaking, as a rule, you can't backup the running system disc, so you can only backup the disc from another bootable os of some kind.

    • @ps2hacker
      @ps2hacker 5 лет назад

      @@MarkUnique It shouldn't be a big issue. Generally speaking, backup software has to be it's own bootable os, and it should make brute force backups just fine. If you are making your own backups to restore your system, and you know the password, then it shouldn't be a problem, the software is brute force, sector for sector, so it will copy the drive encrypted. If you know the password, you can use them like normal. But for someone like say, the police, who want to make an image of your drive to gather evidence of some kind against you, it's a problem, without the password, the images are useless.

  • @kevinmcguinness6526
    @kevinmcguinness6526 2 года назад +1

    Fantastic video!

  • @psssantosh
    @psssantosh 6 лет назад +1

    But if just because I have NO luck , I forget the password for the Drive Encryption....my hard drive files are gone

    • @techlore
      @techlore  6 лет назад

      And this is why you perform regular backups 👍

  • @Artimidorus
    @Artimidorus 6 лет назад +1

    Well, that's it. Going to turn my system into a vhdx booted drive with a bios password. Should simplify my security proceed and make backups easier. :)

  • @cookieneko6398
    @cookieneko6398 4 года назад

    I've used this technique for a long time, not for malicious proposes, just to help someone idiots, it's like entering your home via a portal.

  • @AFiB1999
    @AFiB1999 4 года назад +3

    I would stick with Bitlocker IMO, since veracrypt eat half of the speed og my M.2s. Kinda sucks tho.
    Awesome tips!

    • @jamesedwards3923
      @jamesedwards3923 3 года назад

      I am looking into doing gaming and multimedia on my two computers. I wish somebody would do videos on that. You say VeraCrypt eats up system resources? Please elaborate.

    • @teemuvesala9575
      @teemuvesala9575 3 года назад

      @@jamesedwards3923 Veracrypt is much slower than Bitlocker. They just do things differently... Veracrypt is probably more secure than Bitlocker, but its so much slower that normal people should just use Bitlocker. Only if you're afraid of government or something should you use Veracrypt.

    • @jamesedwards3923
      @jamesedwards3923 3 года назад

      @@teemuvesala9575 I want encryption with no back doors.

    • @teemuvesala9575
      @teemuvesala9575 3 года назад +1

      @@jamesedwards3923 Then you'd be best off with VeraCrypt. Just keep in mind it will be slower than BitLocker.

    • @jamesedwards3923
      @jamesedwards3923 2 года назад +1

      @@teemuvesala9575 VeraCrypt does it a larger percentage of speed transfers. I analized the data using 'crystal'. Not by any signficant amount. Plus I brought M.1 type SSDs for most of my working and gaming. For exactly that reason.
      I did decide on VeraCrypt. Marginally more secure.
      Bitlocker, I use it at a limited capacity. Do you have how many articles I had to go throught? To figure how disable stuff on it. Not to mention enabling 256bit as opposed to the standard 128bit? It is like Microsoft watered down and disable security to the bare minimal.

  • @honeymourn4315
    @honeymourn4315 5 лет назад +1

    You know you can trust someone when they have Stranger Things and IT Funko Pops!!

  • @msarricchiojr
    @msarricchiojr 5 лет назад +1

    You can do this in ANY OS on a USB or CD rom. (Windows 10, MacOS, and Linux). You don't even need a bootable OS, as long as you got the bootable install .iso or .dmg. With the install, you can use the space on that SSD or HDD all ready there to install the OS. You then can use another partition or USB to alter and copy files. Thats why I encrypted my HDDs and SSDs! lol

    • @jamesedwards3923
      @jamesedwards3923 Год назад

      You are correct. In an Evil Maid attack. There are easy ways to defend against this. Let us talk about the classic literal example of an evil maid attack.
      1) You encrypt every drive on the computer.
      2) Password protect your BIOS. A lot of people especially common Apple users. Do not password protect their BIOS. Some have asked me, "why would you password protect your BIOS? If I have done a full encryption of the drives on it?" Deterrent and layering.
      An Evil Maid, would have enough sense to not even bother. Since most people do not password protect the BIOS. In my experience most people who password protect the BIOS have disabled both 'wake on LAN' and alternate boot priority. So you would have to either software hack the BIOS. Or take apart the computer. Those take time.
      I think I have a public playlist [if not I will enable public viewing]. That involves traveling. All those people robbed. Airbnb and Hotels. Let me ask you a question? How many of those used passwords to encrypt their drives, tablets, and laptops? Answer, probably a handful at best. In my offline and online experience most users use numeric PIN codes. Especially Apple users. Once those hashes are extracted. A lot easier to brute force that stuff. All hashes can be deciphered and encryption can be broken. All it takes is time.
      3) I use hardware encrypted drives. More a deterrent and layering. So use the same example. The weaknesses in many hardware encrypted drives. Are publicly known. O rare occasion. I have no choice but to use unencrypted drives. if the file has anything a criminal would want. Or could use. I make an effort to encrypt that file. The threat modeling suggest that a typical smash and grab robber is not going to physically bypass my hardware encryption; depending on the model of the drive. Then brute force the files.
      4) Remember the best password is the one you do not know.
      5) Certain files have certain limitations on how you can encrypt them. I think we all know many of the common limitations.
      You now have SSDs that can do 1TB to 4TB. FYI, I'd be careful which drives you choose. Plenty of adaptors and enclosures. You could install multiple OSes and between script kiddy knowledge or even retail software. Created a multiple partition. And it fits in your pocket.

  • @HPMIKE55
    @HPMIKE55 6 лет назад +2

    thanks & keep up the great job!

  • @happytofu5
    @happytofu5 2 года назад

    It is even possible to bypass the windows login password without a Linux flashdrive. And its a feature, not a bug!

  • @brianbayer4868
    @brianbayer4868 7 месяцев назад +1

    new subscriber ✋✋✋

  • @SpiderRL
    @SpiderRL Год назад

    When trying to enable BitLocker, I get an error saying "This device can't use a Trusted Platform Module". How can I fix this?

  • @dubesor
    @dubesor 6 лет назад +1

    Definitely encrypt your laptops. And don't use USB drives with bank data or other super sensitive stuff and then use fast format ffs, literally every cheap freeware can restore that stuff. For someone who is not super paranoid or mistrusting making a small encrypted container in your HD is really easy and convenient to do. Kinda treat it like a locked safe to put all your super sensitive data into (banking stuff, browser-data, resumes, love letters, you name it) Functions just like a small extra HD that is locked away and hidden unless you mount it. Unfortunaly I also found a lot of free snakeoil type of encryption wares, that do more harm than good to the average user. Can vouch for Veracrypt though, I already liked TrueCrypt. Good for on the fly stuff.

    • @jamesedwards3923
      @jamesedwards3923 2 года назад

      I transitioned to VeraCrypt years ago. I tried to access a file. Did not remember what it was. A true or vera file. Currupted the data.
      Do you know of any program that fix it? Most of that data can be rebuilt, but that is time consuming.

  • @justanotherpxrson
    @justanotherpxrson 2 года назад

    if i did this, would I still be able to manage files across multiple operating systems? im thinking about switching to linux and this video was thrown in my recommended. more headache to think about for me right now... this just proves how ignorant I am with technology. i have so much to learn and dont know where to start.

  • @filmy3306
    @filmy3306 3 года назад +1

    great video

  • @bennypr0fane
    @bennypr0fane 3 года назад +1

    One very real risk to your data is also lost passwords, permanently locking yourself out of your device, with no one to reset the password for you. If you're gonna advise people to encrypt their hardware, this advice should come with proper warnings about recovery options in case of forgotten/lost passwords, and how to make sure to prevent these very, very common problems in the first place.

    • @jamesedwards3923
      @jamesedwards3923 2 года назад

      Passwords are easier to backup than entire drives.

    • @genkiferal7178
      @genkiferal7178 2 года назад

      @@jamesedwards3923 yeah, i got locked oout of a USB because i forgot to capitalize one letter. My memory came back, but it was a scary, sad week

    • @jamesedwards3923
      @jamesedwards3923 2 года назад +1

      That is part of the problem. In my experience most users. They know what to do. They do not want to do it. People prefer convenience over security.
      One of the biggest jokes in cyber security: Biometrics. Something that can not be changed or replaced. Stupid. Also, as part of a single factor is worse.

    • @jamesedwards3923
      @jamesedwards3923 Год назад

      @@genkiferal7178 I hope you chose a password manager. Then back it up.

  • @redouaneofficial
    @redouaneofficial 21 день назад

    What was that orange usb thing

  • @stephenjimenez5828
    @stephenjimenez5828 6 лет назад

    Awesome pls, post that video tutorial soon I'm hella scared now lol

  • @Canadian789119
    @Canadian789119 6 лет назад

    I use Gnu/linux. You can encrypt windows with Vera crypt but It's better just to store data in Gnu/linux. Windows is an open box anyway. I don't use web browsers on windows. I remove all of them for security. Or what little you have on windows to begin with.

    • @soldierofchrist7343
      @soldierofchrist7343 Год назад

      Every distro has LUKS built into which you can activate at installation. I has better encryption than Bitlocker lol.

  • @footage6402
    @footage6402 4 года назад +1

    How do you remember the password you set on your whole encrypted hard drive though?

    • @IngolfLau
      @IngolfLau 4 года назад +2

      It's called "a brain".

    • @footage6402
      @footage6402 4 года назад +2

      @@IngolfLau I have a mental disability tho

    • @IngolfLau
      @IngolfLau 4 года назад +3

      @@footage6402 Then write it down somewhere.

    • @genkiferal7178
      @genkiferal7178 2 года назад

      @@footage6402 use that sentence, "IHaveAMentalDisability"

  • @Malware01
    @Malware01 6 лет назад +1

    I don't know about Windows and MacOS.
    I setup like this
    BIOS-password protected
    Grub-password protected
    Disk Encryption
    Signal user mode

  • @btno222
    @btno222 2 года назад

    VERACRYPT CONTAINERS YOU CAN LOAD VIRTUAL MACHINES ALSO!!! CAN YOU DISABLE PORTS ON THE WINDOWS AND NOT SHARE YOUR WINDOWS OS 10 ON YOUR NETWORK AND THEN LOAD VIRTUAL BOX AND LOAD WINDOWS, AS THAT, IS THAT ON ITS OWN LIKE SANDBOXING???

    • @jamesedwards3923
      @jamesedwards3923 Год назад

      I have not played with Virtual Machines much. I know many IT guys and Linux use them. I am concerned about going totally Linux. Learning Virtual Machines for academic and or professional. Fine, for daily driver. I will try to run it on two seperate drives.
      A lot of new motherboards allow for costomized boot configurations.

  • @vipulkumar2845
    @vipulkumar2845 3 месяца назад

    how about secure boot

  • @stephenajulu
    @stephenajulu 5 лет назад

    @techlore i have a dynamic disk full of data and my external drive stopped working, how can i encrypt it without losing data. Bitlocker doesnt support full drive encryption on a dynamic disk, and i think the same applies for veracrypt

  • @nullmc3092
    @nullmc3092 4 месяца назад

    What about zip with 256 AES ?

  • @samkals
    @samkals 5 лет назад

    How can you encrypt your drive Beacuse I do not have Pro but doesn't it only have bitlocker

  • @lienartoism
    @lienartoism 3 года назад +1

    Hacker plan a virus, keylogger etc to your unencrypted computer is only true if they have physical access to your computer. The problem is most of the virus came from the internet. Clicking suspicious link, download suspicious attachment from email. Download crack/illegally software. Visiting website you should not etc. These kind of things encryptions don't protect.
    Encryption is useful, but it should be combined with another security measures.

  • @rclrcs8767
    @rclrcs8767 3 года назад

    How to make that pendrive.... Which can access all files

  • @shane_gentle
    @shane_gentle 5 месяцев назад

    The fact that windows charges more just to have your files encrypted is pure greed.

  • @Billy123bobzzz
    @Billy123bobzzz 5 лет назад +1

    Way out of date. All the newer versions of macOS ask you to set an encryption password (Filevault 2) when you first power it up ) so this is way out of date.
    If you have an older Mac that does not have FileVault or FileVault 2 turned on then do so now. Also set a password on your screensaver and a firmware password so that no one with physical access to your Mac cannot do anything with it.

    • @jamesedwards3923
      @jamesedwards3923 2 года назад

      The point of software encrypting a drive. Is in case someone has physical access to it.
      VeraCrypt.

    • @Billy123bobzzz
      @Billy123bobzzz 2 года назад

      @@jamesedwards3923 Veracrypt is not secure, it has been exposed to have dozens of security flaws that hackers could exploit effortlessly, so its useless, plus its unknown to the vast majority of users so its useless.

    • @jamesedwards3923
      @jamesedwards3923 2 года назад

      @@Billy123bobzzz VeraCrypt is open sources. All security applications have flaws. I own a bunch of old and new OPAL drives. That I secure with software encryption of course. At least you can learn what the flaws are. As opposed to closed source apps.
      In my experience users are too damn lazy. Even with basic security. Keep in mind. Even when they know better; most do! They do nothing.
      I can not help people who refuse to try. I have tried. They are too damn lazy.

  • @gansteryoyo
    @gansteryoyo 6 лет назад +5

    I'm am now woke. Thx

  • @williampaul8874
    @williampaul8874 3 года назад

    YOOO, those are HD600s in the background.
    My mans an audiophile.

  • @yeeeoooo1778
    @yeeeoooo1778 5 лет назад

    what about an virtual machine?

  • @virtumind
    @virtumind 3 года назад

    Does it affect gaming on windows

  • @reginalddubois5015
    @reginalddubois5015 5 лет назад +1

    eye opening, ths dude

  • @isyrk
    @isyrk 5 лет назад

    How do you encrypt a Chrome OS?

  • @Pitbullrex24
    @Pitbullrex24 6 лет назад

    What was the linux flash drive loaded with only ubuntu to be able to enter a none encrypted pc ?

  • @mechan1sm_
    @mechan1sm_ 3 года назад

    What about Self-encrypting drives (aka Hardware-based full disk encryption)?

    • @jamesedwards3923
      @jamesedwards3923 2 года назад

      I own a few of them. The OPAL standard is garbage. I use them as a layer. I software encrypt the partition. A common thief will think the drive is broke.
      Which means either they will wipe it and use it. Or will throw it out. Thinking it was garbage.
      Most common thieves will not know what to make of it.

  • @cyberp0et
    @cyberp0et 3 года назад

    Bios passwords will do.

  • @LordHog
    @LordHog 6 лет назад +1

    Do you have any videos on encryption programs? It's mentioned to use "PGP drive encryption tool", but after a cursory search I see most that land on the search page are commercial programs (e.g., Symantec Endpoint Encryption). What Gpg4win be an alternative?

    • @techlore
      @techlore  6 лет назад +2

      For drive encryption definitely go with Veracrypt. It is considered the go-to program right now. I am still due to make a tutorial on how to use it :( Coming soon!

    • @jamesedwards3923
      @jamesedwards3923 2 года назад

      I always recommend open source options. Yes, all software has flaws and zero days. However, with open source. You will have a much better opportunity to learn what they are.

  • @BennoKushnir
    @BennoKushnir 6 лет назад

    So how would you repaire your encrypted system?

    • @jamesedwards3923
      @jamesedwards3923 Год назад

      LOL, Fail Safe or Fail Secure.
      Depends on the damage. You might be able to use a recovery disk.

  • @cargopants4930
    @cargopants4930 Год назад

    who else wants that drive

  • @joshuamoe5485
    @joshuamoe5485 5 лет назад

    password protect bios removing the cmos battery does nothing on newer boards, encrypt drive, physically lock your doors, 2 factor authentication, phrase passwords 3-4 words that make no sense.

    • @genkiferal7178
      @genkiferal7178 2 года назад

      2FA using your phone is being hacked now by social engineers using a SIM card scam. I think I overheard my roommate doing this to her mom when the mother kicked the son out of the house. The two of them were having the greatest fun doing it. Now the trouble maker is living here with his sister and I am worried about my stuff!

  • @soldierofchrist7343
    @soldierofchrist7343 Год назад

    Good thing us Linux users have LUKS which is free and comes with basically every distro, and you can set it up at installation. Plus it's ironically better than Bitlocker witch you have to pay for. Seriously Microsoft not even basic encryption for your regular users? Your competitors which or free do a better job than you do?

  • @karmaakabane7679
    @karmaakabane7679 4 года назад

    What does your flashdrive contain btw?

  • @n.593
    @n.593 4 года назад

    Install windows 10 pro, use a script to activate it for free and enable bit locker and you’re all set.

  • @ZambonieDude
    @ZambonieDude 6 лет назад +3

    Only problem.
    Spent alot of money on an SSD & want to use a solution like Veracrypt?
    Say goodbye to your read/write speeds even if you remove the decryption the damage is still done.
    EDIT: a word

  • @weiyuan20
    @weiyuan20 3 года назад

    When I was little, I was actually able to gain access to and switch the password on my mom’s MacBook to watch RUclips and lock her out lmao. I was able to do that just with the apple service forums that I would look at on my daily allowance of computer time.

    • @jamesedwards3923
      @jamesedwards3923 2 года назад

      Does she know this now?
      Yet another example. In my experience there are two types of Apple Users. Ignorant or IT Cyber Expert. In my direct experience Apple Users enjoy being ignorant of their technology. They figured, 'I paid a fortune it must be secure.'
      You proved me right again.
      I normally meet graphical designers and a few IT Professionals. The vast majority of Apple users I have met or know. Barely know how to make a phone call with their device.

  • @realsn9ke216
    @realsn9ke216 5 лет назад

    Whats that USB that allows u access to any computer files without password

  • @Guilherme-gi3wk
    @Guilherme-gi3wk 4 года назад

    Will my laptop get slower with an encrypted drive?

    • @techlore
      @techlore  4 года назад +3

      Yes but negligibly

  • @ahmedyasser4350
    @ahmedyasser4350 6 лет назад

    If I use veracrypt on windows to encrypt everything, what happens when I make a new file? Do I need to keep reencrypting, if not, how does it work?

    • @techlore
      @techlore  6 лет назад

      No, once full disk encryption is setup you can modify it in any way and it won’t affect the encrypted volume.

    • @jamesedwards3923
      @jamesedwards3923 2 года назад

      Do not overthink it. You will be fine.

  • @tutacat
    @tutacat Год назад

    Evil maid attack

  • @patrickmaris
    @patrickmaris 5 лет назад

    Where can I find that USB drive

    • @techlore
      @techlore  5 лет назад

      You can make any USB drive just like mine.

  • @AshNonokPlays
    @AshNonokPlays 6 лет назад

    I don't need to encrypt my drive, because I've already encrypt my bios and I'm running mint!

    • @ryzyooritzz
      @ryzyooritzz 5 лет назад +2

      You could remove the drive and put it in another computer

    • @teemuvesala9575
      @teemuvesala9575 3 года назад +1

      You can't encrypt your BIOS. All you've done is password protect your BIOS which doesn't change the fact your hard drive could be physically taken and plugged into another computer. Only hard drive encryption protects your data in that case.

    • @jamesedwards3923
      @jamesedwards3923 2 года назад

      Wrong. Your u encrypted drive can be removed and read. A BIOS is a stop gap measure. Helps against minimal attacks. I always recommend password BIOS for laptops and tablets.

  • @user-kv3tq1vc5g
    @user-kv3tq1vc5g 6 лет назад

    hi techlore with all you said in your video about be more anonymous but you cant avoid google finger printing it always behind you am an android developer i need to open more developer account but every time google close them every time they tracking me is there any solution for that

    • @techlore
      @techlore  6 лет назад

      No, unfortunately not. I will have a video coming soon about a topic which ties to this though....some things are impossible to be "anonymous" for. You need to use your legit information. The purpose of creating pseudonyms and what not is to separate your different activities from your personal life so there is very little tied to your personal life. All we're doing when we're talking about anonymity is creating new identities.

    • @jamesedwards3923
      @jamesedwards3923 2 года назад

      Or you can buy digital locks with builtin cameras. If your system has video. Have them show their photo ID. A lot of systems have builtin logs. If you have to send them a digital key of some sort. Log their finger prints if you have bioscanner.
      Thumb print scanners are cheap. Keep it on file.

  • @elJim5
    @elJim5 6 лет назад

    if they get on your computer they can also just take out the fucking drives, i got my bios password protected, that way nobody can just boot a live os, my home pc isnt encrypted but my laptop is, because someone might actually steal that

  • @gomezadams9900
    @gomezadams9900 4 года назад

    I want to know how to install in 2nd level encryption on my Mac if that's possible. I have already enabled fire wall and fire vault but I still feel vulnerable to attacks from China's 50 cent army. (Believe me it's real!) They have already attacked my Facebook account. What is your suggestion?

  • @mihir.mishra
    @mihir.mishra 3 года назад

    Are there any other GNU/Linux nerds?

  • @ikaeye
    @ikaeye 2 года назад

    thats linux tho

  • @kiranprogamer
    @kiranprogamer 6 лет назад

    Im using kali Linux

    • @johanherrera6413
      @johanherrera6413 6 лет назад

      KiranProGamer as a standard OS? What for? Sure is a great pentesting OS solid based on Debían but for daily use? Too much of a hassle, other distros more friendly to daily life use are just as safe if not better! Kali was made for pentesting purposes and is optimized to do just that that's why it sucks as a daily runner.

    • @kiranprogamer
      @kiranprogamer 6 лет назад

      Johan Herrera Actually I'm a programmer,
      So kali linux is perfect for me.
      Yes it is difficult to switch to linux from windows environment but it gives us complete control on what we are doing..
      It is better to dual boot for gaming and for using other software..
      But Linux never betrays you like Windows (ransomware, malwares...)

    • @johanherrera6413
      @johanherrera6413 6 лет назад

      KiranProGamer well if you really know what you are doing then scratching Debían and Ubuntu repositories might patch Kali to make it usable as a daily runner.
      I'm an IT spec, although my area of expertise is more focused on hardware and automatization.
      May I ask why kali with all the hassle and not something like Arch? Is about the same ammount of work but the by the end you get modularity and more stability on you side. I mean with arch you can build almost anything including a daily runner productivity distro and black arch repositories have almost as many pentesting tools as kali. Some even better from the modular perspective.
      Best regards M8, have a good one.

  • @ooof5281
    @ooof5281 6 лет назад

    I just do fresh installs every 3 months

    • @techlore
      @techlore  6 лет назад +2

      This doesn't stop someone from gaining unauthorized access to your device though

  • @bob69927
    @bob69927 5 лет назад

    bios settings ;)

  • @kalidsherefuddin
    @kalidsherefuddin 3 года назад

    Please help me

    • @cyberp0et
      @cyberp0et 3 года назад

      GNU Linux can help you :)

  • @Gigachad-mc5qz
    @Gigachad-mc5qz 2 года назад

    all i have on my pc are games, if i need anything encrypted id do it but meh idc rn

    • @jamesedwards3923
      @jamesedwards3923 Год назад

      Do you have passwords?
      Do you have virtual memory enabled?
      Do you use the same passwords for everything?

    • @Gigachad-mc5qz
      @Gigachad-mc5qz Год назад

      @@jamesedwards3923 no i dont use zhe same password, i have a hardware key to open a database with all my passwords

    • @jamesedwards3923
      @jamesedwards3923 Год назад

      @@Gigachad-mc5qz Password Safe or KeePass?
      I go with KeePass, but you have tweak your file for each app you use. I prefer old school. Password and a keyfiles
      You can get addons. I decided for stuff like that. I will use Password Safe. More straight forward. Since Password Safe, did it from the ground up.
      The problem is I have had issues with the database conversion. Which means I have to rebuild the database from scratch for Password Safe.
      Yes, I tried the KeePass 1.x conversion .CSV. Except it did not work at all.

    • @Gigachad-mc5qz
      @Gigachad-mc5qz Год назад

      @@jamesedwards3923 keepassxc

    • @jamesedwards3923
      @jamesedwards3923 Год назад

      ​@@Gigachad-mc5qz I do not think its a bad app. It is oversimplifed.
      They give you almost no information on the security attributes of the file. I have played with it. I had to water down a lot of the security. I could not use most of the higher hashing functions and encryption.
      I have experimented with it.
      For Windows and Linux when I start learning how to use it. I will use KeePass 2.x. Android. I use two different applications. Never had a problem.
      It has PGP and the like. All good there.
      The GUI and lack of options in chosing the features. As well as the details are horrible.
      I only keep it on my rig as a backup measure. Not my daily driver.

  • @chombrita
    @chombrita 5 лет назад +1

    Magical XD

  • @luigicaracho401
    @luigicaracho401 6 лет назад

    My drives are hidden xD and not connected

    • @techlore
      @techlore  6 лет назад +1

      Do you keep them in your sock?

    • @luigicaracho401
      @luigicaracho401 6 лет назад +1

      Techlore you could say that, more or less

  • @user-on8tu8jt1m
    @user-on8tu8jt1m 5 лет назад

    I want this USB kkkkk

  • @mikkenieminen9603
    @mikkenieminen9603 5 лет назад

    I was like 666. Lol

  • @sarcophiIus
    @sarcophiIus 4 года назад

    I got hacked by MrSqar

  • @boudisam9321
    @boudisam9321 2 месяца назад

    You should stop reading from a board, it does not look professional !

  • @LummyTum
    @LummyTum 3 года назад

    6:53 wtf he's looking at attractive women, that's it, I'm calling the police

  • @Thiago-pj2iv
    @Thiago-pj2iv 6 лет назад

    Please IVPN review