Originally posted by: ATLien247
If someone were to encrypt the contents of their hard drive using a software-based encryption tool, would any unencrypted information be retrievable from the slack space?
I'm thinking that there would be, since there is a good chance that some of the resources used to encrypt would entail using virtual memory.
Any thoughts? And if so, can you point me to your source(s)?
Define "slack space".
Normally, when you "encrypt" a file, the same disk blocks are overwritten with the encrypted data. If you do some sort of encryption/compression combination (so maybe the encrypted file is smaller than the original one), you need to make sure to zero out the disk blocks that used to be occupied by the plaintext but are no longer needed.
When working with encrypted files, care must be taken that the data and/or encryption keys are never be written to disk in the clear, including as part of the virtual memory (unless you can be sure that the virtual memory is securely wiped before the system shuts down, but even then a hard crash could leave unencrypted data on the disk).
Competent encryption implementations should lock any sensitive data into physical RAM so that it will not be paged out to disk.