TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

"Forensics for Prosecutors" mentions backdoor in TrueCrypt (page 15) [pdf]

134 pointsby jhicknerover 11 years ago

18 comments

EvanAndersonover 11 years ago
The reference to the names &quot;Detective Stu Pitt&quot; and &quot;Detective Laughlin Foo&quot; on the last page has me wondering about this. They both really, really sound like joke names. The similarity to the presenter&#x27;s name (first slide) from the real North Dakota State Attorney&#x27;s Association (NDSAA) presentation (<a href="http://www.ndsaa.org/Computer_Forensics_for_Prosecutors.pdf" rel="nofollow">http:&#x2F;&#x2F;www.ndsaa.org&#x2F;Computer_Forensics_for_Prosecutors.pdf</a>) also seems suspicious.<p>It has the look that somebody took the real NDSAA presentation, tweaked it up, and released it as a hoax.<p>Edit:<p>Here&#x27;s a site that seems to be hosting the same PDF as part of an article dated 1 April 2013: <a href="http://www.techarp.com/showarticle.aspx?artno=770" rel="nofollow">http:&#x2F;&#x2F;www.techarp.com&#x2F;showarticle.aspx?artno=770</a>
评论 #6325563 未加载
评论 #6325595 未加载
WestCoastJustinover 11 years ago
A few gems in here besides the TrueCrypt statement, mainly that Apple iCloud and Dropbox are named, and the legal framework is touched upon.<p><pre><code> All cloud stored content are automatically hash-scanned and image-analyzed by their service providers and infringing content reported to NCMEC (p16) Mobile content are automatically scanned when they are synced with cloud storage like Apple iCloud or Dropbox. Mobile devices that are not cloud-synced can be accessed by their respective vendors (p16) </code></pre> If I am reading this correctly, when you upload something to Apple iCloud or Dropbox, there is a background process which generates a hash of your content, then compares that hash with infringing content? What defense do companies have? What about proof that these claims are true (sources, etc)? Can anyone just leak a document that claims XYZ tech company spies on its users and everyone takes this as fact?<p><pre><code> Vendors are legally and commercially prevented from acknowledging their backdoors. Defense will not be able to prove their existence (p16) </code></pre> Great, <i>blanket denial either way</i>! I hope this is a hoax!
评论 #6325488 未加载
评论 #6325492 未加载
评论 #6325572 未加载
评论 #6325577 未加载
评论 #6325534 未加载
necubiover 11 years ago
Are we all just going to take this seriously? It&#x27;s pretty obviously a fake. Just look at the names at the end. Detective Laughlin Foo? Stu Pitt? Neither of which, incidentally, return anything in google aside from this presentation. There&#x27;s also a clear divergence in style on the backdoor slides, and it reads like a parody.<p>But the most obvious problem: if the NSA or whoever had a backdoor to truecrypt and Android and iOS, they would not send that information to a local DA office to be leaked.<p>Please don&#x27;t set aside critical thinking just because something confirms your biases.
评论 #6325609 未加载
nitrogenover 11 years ago
Page 16 has some wonderful lines:<p><pre><code> • “Fruit of the poisonous tree” can be circumvented • The use of backdoors cannot be detected or proven • Vendors are legally and commercially prevented from acknowledging their backdoors. Defense will not be able to prove their existence • The files can be described as “forensically obtained”</code></pre>
评论 #6325494 未加载
评论 #6325474 未加载
评论 #6325584 未加载
c0achmcguirkover 11 years ago
This article is pretty interesting:<p><a href="http://www.privacylover.com/encryption/analysis-is-there-a-backdoor-in-truecrypt-is-truecrypt-a-cia-honeypot/" rel="nofollow">http:&#x2F;&#x2F;www.privacylover.com&#x2F;encryption&#x2F;analysis-is-there-a-b...</a><p>It claims TrueCrypt is a CIA honeypot.
tylerkahnover 11 years ago
<a href="http://en.wikipedia.org/wiki/Cold_boot_attack" rel="nofollow">http:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Cold_boot_attack</a><p>There&#x27;s your backdoor.
评论 #6325571 未加载
DannyBeeover 11 years ago
If you use the link to the last year&#x27;s presentation on the last page, and download it, you can see last year&#x27;s presentation was made by &quot;micah smith&quot; (who apparently has become &quot;michael smith&quot; this year).<p>The entire presentation is clearly a copy of the previous year presentation, with some words changed by some moron with an agenda whose understanding of criminal procedure came from watching too many law and order episodes.
Karunamonover 11 years ago
So there&#x27;s a few possible ways to interpret this..<p><pre><code> * There is an actual hereto-unknown flaw in TrueCrypt&#x27;s algorithms or implementations of algorithms that can be exploited. * They are referring to the only known attack, wherein keys can be recovered from RAM if the volume isn&#x27;t unmounted correctly. * This is FUD designed to push people away from less-breakable encryption and onto software which actually &#x2F;does&#x2F; have backdoors. * This is a hoax (pay special attention to the detective&#x27;s names on the slide)</code></pre> I&#x27;m not sure what to make of it.
frengerover 11 years ago
Truecrypt is open source. Can anyone find the backdoor?
评论 #6325454 未加载
评论 #6325466 未加载
noname999_666over 11 years ago
Anybody ever heard of the &quot;zSearch&quot; software mentioned in the pdf?<p>After some more digging, found this document: <a href="http://www.ndsaa.org/Computer_Forensics_for_Prosecutors.pdf" rel="nofollow">http:&#x2F;&#x2F;www.ndsaa.org&#x2F;Computer_Forensics_for_Prosecutors.pdf</a><p>Which states:<p>Free product by SA Eric Zimmerman<p>Random Access Memory Analysis:<p>* FBI - Salt Lake City, UT<p>* Distribution - eric[at]feeble-industries.com<p>* Plug-in live triage via USB<p>* Virtualization, encryption, mass storage, P2P, Gigatribe, picture &amp; video preview, password gathering, and MORE!<p>Looks LE agents can request a copy by registering for the guy&#x27;s phpbb form here (judging by the registration terms, it&#x27;s not open to the public):<p><a href="https://feeble-industries.com/forums/ucp.php?mode=register" rel="nofollow">https:&#x2F;&#x2F;feeble-industries.com&#x2F;forums&#x2F;ucp.php?mode=register</a>
评论 #6325675 未加载
peter_l_downsover 11 years ago
Worth mentioning that truecrypt volumes can be hidden inside playable video files. Yes, it&#x27;s security through obscurity, but hey, it makes me feel a little safer.<p><a href="http://keyj.emphy.de/real-steganography-with-truecrypt/" rel="nofollow">http:&#x2F;&#x2F;keyj.emphy.de&#x2F;real-steganography-with-truecrypt&#x2F;</a>
评论 #6325427 未加载
评论 #6325592 未加载
xarballover 11 years ago
This really doesn&#x27;t sound legit. I suspect they might be thinking of backdooring the truecrypt <i>client</i>, which, really wouldn&#x27;t make it much of a feat.<p>The container format itself is really just a giant mathematical mess -- there really isn&#x27;t anything to backdoor there.<p>And then the client doesn&#x27;t exactly dial-out to anything when you mount an encrypted volume. Therefore I would suggest that this is probably a matter of using alternative means of access to the machine in order to patch the client itself.<p>That wouldn&#x27;t exactly be worthy of the attention of the NSA, given that truecrypt <i>is</i> open-source.
评论 #6325513 未加载
评论 #6325471 未加载
NDizzleover 11 years ago
I was going to add that you can link directly to the page like this: <a href="http://cryptome.org/2013/09/computer-forensics-2013.pdf#page=15" rel="nofollow">http:&#x2F;&#x2F;cryptome.org&#x2F;2013&#x2F;09&#x2F;computer-forensics-2013.pdf#page...</a><p>Works in FF and Chrome in-browser readers.<p>Then I realized you should really skim every single page, rather than going straight to 15.
andrewpiover 11 years ago
Wouldn&#x27;t any backdoor used in a criminal prosecution have to be disclosed to the defense?
评论 #6325442 未加载
评论 #6325481 未加载
评论 #6325441 未加载
azelfrathover 11 years ago
EDIT: Ignore that. I figured a slide show would not skip slides when you use arrow keys for navigation.<p>Can I get a direct quote? I&#x27;m not seeing any mention of TC on p15 or any other page.
评论 #6325461 未加载
pekkover 11 years ago
Not everything that looks like it comes from the government really does.
throwaeayqover 11 years ago
<a href="https://github.com/bwalex/tc-play" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;bwalex&#x2F;tc-play</a> this guy probably knows a thing or two about if it&#x27;s safe
eruditelyover 11 years ago
I laugh at &#x27;white hat&#x27; prosecution based culture, there is a serious lack of ethics in the computer security profession.