011 Further reading on quantum computing and its effect of cryptography - NIST Reports http://csrc.nist.gov/groups/ST/post-quantum-crypto/documents/pqcrypto-2016-presentation.pdf N.S.A. Able to Foil Basic Safeguards of Privacy on Web http://www.nytimes.com/2013/09/06/us/nsa-foils-much-internet-encryption.html?pagewanted=all 012 Inception https://github.com/carmaa/inception Inception over firewire attack - video https://www.youtube.com/watch?v=oW2ABJ0SN88 Passware Kit Enterprise - Hard Disk Decryption http://www.lostpassword.com/hdd-decryption.htm Windowsscope http://www.windowsscope.com/?page=shop.product_details&flypage=flypage.tpl&product_id=24&category_id=1&option=com_virtuemart&Itemid=34 Choose the Right BitLocker Countermeasure https://technet.microsoft.com/en-us/library/dn632181.aspx Intel? Virtualization Technology for Directed I/O (VT-d): Enhancing Intel platforms for efficient virtualization of I/O devices https://software.intel.com/en-us/articles/intel-virtualization-technology-for-directed-io-vt-d-enhancing-intel-platforms-for-efficient-virtualization-of-io-devices Wikipedia - Disk encryption https://en.wikipedia.org/wiki/Disk_encryption Cold Boot Attack Demo - Video https://www.youtube.com/watch?v=vWHDqBV9yGc nullcon Goa 2015: Cold Boot Attack on DDR2 and DDR3 RAM by Marko Schuba - Video https://www.youtube.com/watch?v=ZHq2xG4XJXM Report - Cold Boot Attack on DDR2 and DDR3 RAM http://nullcon.net/website/archives/ppt/goa-15/cold-boot-attack-on-ddr2-and-ddr3-ram.pdf Evil Maid goes after TrueCrypt! https://theinvisiblethings.blogspot.ru/2009/10/evil-maid-goes-after-truecrypt.html Security Pitfalls in Cryptography https://www.schneier.com/essays/archives/1998/01/security_pitfalls_in.html 013 Security Pitfalls in Cryptography https://www.schneier.com/essays/archives/1998/01/security_pitfalls_in.html 014 Truecrypt v7.2 (latest full version) - Download https://www.grc.com/misc/truecrypt/truecrypt.htm Veracrypt https://veracrypt.codeplex.com/ CipherShed https://www.ciphershed.org/ DiskCryptor https://diskcryptor.net/wiki/Main_Page Symantec Drive Encryption https://buy.symantec.com/estore/clp/productdetails/pk/drive-encryption BestCrypt Container Encryption http://www.jetico.com/products/personal-privacy/bestcrypt-container-encryption Windows BitLocker https://technet.microsoft.com/en-us/library/cc766295%28v=ws.10%29.aspx Comparison of disk encryption software From Wikipedia https://en.wikipedia.org/wiki/Comparison_of_disk_encryption_software 015 Windows BitLocker Drive Encryption Step-by-Step Guide https://technet.microsoft.com/en-us/library/cc766295%28v=ws.10%29.aspx What's new in Windows 10, versions 1507 and 1511 https://technet.microsoft.com/itpro/windows/whats-new/whats-new-windows-10-version-1507-and-1511 YUBIKEYS https://www.yubico.com/products/yubikey-hardware/ Every Windows 10 in-place Upgrade is a SEVERE Security risk http://blog.win-fu.com/2016/11/every-windows-10-in-place-upgrade-is.html 016 ENCRYPTING YOUR LAPTOP LIKE YOU MEAN IT https://theintercept.com/2015/04/27/encrypting-laptop-like-mean/ 017 Veracrypt https://veracrypt.codeplex.com/ IsTrueCryptAuditedYet? Yes! http://istruecryptauditedyet.com/ GERMAN GOVERNMENT AUDITS TRUECRYPT https://threatpost.com/german-government-audits-truecrypt/115441/ Truecrypt 7 Derived Code/Windows: Drive Letter Symbolic Link Creation EoP https://bugs.chromium.org/p/project-zero/issues/detail?id=538&redir=1 Truecrypt 7 Derived Code/Windows: Incorrect Impersonation Token Handling EoP https://bugs.chromium.org/p/project-zero/issues/detail?id=537&redir=1 http://www.openwall.com/lists/oss-security/2016/01/11/1 Nitrokey.com https://www.nitrokey.com/ yubico.com VeraCrypt - Operating Systems Supported for System Encryption https://veracrypt.codeplex.com/wikipage?title=Supported%20Systems%20for%20System%20Encryption Report - UEFI SECURE BOOT IN MODERN COMPUTER SECURITY SOLUTIONS http://www.uefi.org/sites/default/files/resources/UEFI_Secure_Boot_in_Modern_Computer_Security_Solutions_2013.pdf https://sourceforge.net/p/veracrypt/code/ci/master/tree/src/Boot/EFI/Readme.txt#l19 Veracrypt FAQ https://veracrypt.codeplex.com/wikipage?title=FAQ 018 https://diskcryptor.net/ https://www.ciphershed.org BestCrypt Volume Encryption http://www.jetico.com/products/personal-privacy/bestcrypt-volume-encryption Symantec Drive Encryption https://buy.symantec.com/estore/clp/productdetails/pk/drive-encryption Comparison of disk encryption software From Wikipedia https://en.wikipedia.org/wiki/Comparison_of_disk_encryption_software 019 VeraCrypt - Beginner's Tutorial https://veracrypt.codeplex.com/wikipage?title=Beginner%27s%20Tutorial 020 OS X Security and Privacy Guide - full disk encryption https://github.com/drduh/macOS-Security-and-Privacy-Guide#full-disk-encryption Use FileVault to encrypt the startup disk on your Mac - Apple https://support.apple.com/en-us/HT204837 Report - Infiltrate the Vault: Security Analysis and Decryption of Lion Full Disk Encryption https://eprint.iacr.org/2012/374.pdf 021 Startup key combinations for Mac https://support.apple.com/en-us/HT201255 DeepSleep - Hibernate your Mac http://www.axoniclabs.com/DeepSleep/ pmset -- manipulate power management settings - Man Page https://developer.apple.com/legacy/library/documentation/Darwin/Reference/ManPages/man1/pmset.1.html Report - Infiltrate the Vault: Security Analysis and Decryption of Lion Full Disk Encryption https://eprint.iacr.org/2012/374.pdf Report - Security Analysis and Decryption of FileVault 2 IFIP WG 11.9 https://www.cl.cam.ac.uk/%7Eosc22/docs/slides_fv2_ifip_2013.pdf Apple Technical White Paper - Best Practices for Deploying FileVault 2 http://training.apple.com/pdf/WP_FileVault2.pdf 022 Plain dm-crypt https://wiki.archlinux.org/index.php/Dm-crypt/Encrypting_an_entire_system#Plain_dm-crypt LUKS support for storing keys in TPM NVRAM https://github.com/shpedoikal/tpm-luks Two factor authentication with Yubikey for harddisk encryption with LUKS https://www.howtoforge.com/ubuntu-two-factor-authentication-with-yubikey-for-harddisk-encryption-with-luks Yubikey Two-factor Authentication Full-disk Encryption via LUKS https://askubuntu.com/questions/599825/yubikey-two-factor-authentication-full-disk-encryption-via-luks 023 The Debian Administrator's Handbook https://debian-handbook.info/browse/stable/sect.installation-steps.html Cryptsetup & LUKS https://gitlab.com/cryptsetup/cryptsetup zuluCrypt https://mhogomchungu.github.io/zuluCrypt/ Arch - dm-crypt/Encrypting an entire system https://wiki.archlinux.org/index.php/Dm-crypt/Encrypting_an_entire_system Arch - Disk encryption https://wiki.archlinux.org/index.php/Disk_encryption 024 Arch - Encrypted boot partition (GRUB) https://wiki.archlinux.org/index.php/Dm-crypt/Encrypting_an_entire_system#Encrypted_boot_partition_.28GRUB.29 Two factor authentication with Yubikey for harddisk encryption with LUKS https://www.howtoforge.com/ubuntu-two-factor-authentication-with-yubikey-for-harddisk-encryption-with-luks Yubikey Two-factor Authentication Full-disk Encryption via LUKS https://askubuntu.com/questions/599825/yubikey-two-factor-authentication-full-disk-encryption-via-luks 025 Report - Ten Reasons to Buy Self-Encrypting Drives https://www.trustedcomputinggroup.org/ten-reasons-buy-self-encrypting-drives/ 026 TRESOR Runs Encryption Securely Outside RAM https://www1.informatik.uni-erlangen.de/tresor Security Requirements and Precautions https://veracrypt.codeplex.com/wikipage?title=Security%20Requirements%20and%20Precautions 027 http://www.peazip.org/ http://www.kekaosx.com/en/ https://www.aescrypt.com/ https://www.gnupg.org/ 028 Key disclosure law From Wikipedia https://en.wikipedia.org/wiki/Key_disclosure_law veracrypt - Hidden Volume https://veracrypt.codeplex.com/wikipage?title=Hidden%20Volume Arch - Plain dm-crypt https://wiki.archlinux.org/index.php/Dm-crypt/Encrypting_an_entire_system#Plain_dm-crypt veracrypt - Plausible Deniability https://veracrypt.codeplex.com/wikipage?title=Plausible%20Deniability Appeals Court Upholds Constitutional Right Against Forced Decryption https://www.eff.org/press/releases/appeals-court-upholds-constitutional-right-against-forced-decryption https://xkcd.com/538/ - Cartoon 030 KINGPIN: How One Hacker Took Over the Billion-Dollar Cybercrime Underground https://www.kingpin.cc/ Darkmarket https://www.amazon.com/Darkmarket-Misha-Glenny/dp/1847921272 Hacking Godfather ?Maksik? Sentenced to 30 Years by Turkish Court https://www.wired.com/2009/01/hacking-godfath/
darkbull