• We’re currently investigating an issue related to the forum theme and styling that is impacting page layout and visual formatting. The problem has been identified, and we are actively working on a resolution. There is no impact to user data or functionality, this is strictly a front-end display issue. We’ll post an update once the fix has been deployed. Thanks for your patience while we get this sorted.

SecureStar broken?

I was reading this and it seems it has been hacked, yet SecureStar is offering $100,000 if it can be decrypted. So why hasn't anyone claimed the prize?


The reason I'm interested in SecureStar is because Truecrypt can't encrypt systems with a UEFI BIOS as of this posting. I have read that you could change the boot to MBR in a UEFI system. How do you do that?
 
I was reading this and it seems it has been hacked, yet SecureStar is offering $100,000 if it can be decrypted. So why hasn't anyone claimed the prize?

A quick glance at it seems it indicate that they were "ONE OFF" time limited competition(s), in the past.

I.e. You can't hack/crack it and claim $100,000, at any time.

Also the stuff I have just read about that product/company, seems to indicate that there is at least a small chance you may not be able to trust them to actually pay you the $100,000. (Speculation/opinion on my part).

(I.e. there seem to be claims about lack of integrity surrounding that product/company, and since the source(s) are on the internet, I "DON'T KNOW" who is right, as it was just a quick glance).
 
Last edited:
Proprietary encryption can't be trusted, period. If the code can't be looked at, it can't be trusted.

You change from UEFI to MBR in BIOS.
 
Proprietary encryption can't be trusted, period. If the code can't be looked at, it can't be trusted.

I saw that they allowed their code to be analyzed in the faq I provided, but they said a competitor stole it so you have to sign a NDA to get it.



You change from UEFI to MBR in BIOS.

It really is that simple? So I can continue to use Truecrypt on newer hardware using UEFI BIOS?
 
You would have to install the OS again if you switch from UEFI to MBR.

So take a backup and go into the BIOS and change to legacy boot. Then reinstall the operating system.

All I know about drive crypt is that max vision used it to protect his servers when he was stealing credit cards. The FBI managed to get the key from RAM as they busted him while his servers were on. That vulnerability is the same for all FDI products though.
 
I saw that they allowed their code to be analyzed in the faq I provided, but they said a competitor stole it so you have to sign a NDA to get it.

That's not open, peer reviewed code AFAIC. /Everybody/ should be able to view the code, and not just the elite few that give them lots of $. They say competitors "stole" their code, and locked it into proprietary software. That would have been prevented by using GPL3. Their error in licensing doesn't justify closed software, especially when dealing with security.

They can make all the claims they like, just as everyone else does. The proof's in the code.
 
You would have to install the OS again if you switch from UEFI to MBR.

So take a backup and go into the BIOS and change to legacy boot. Then reinstall the operating system.

All I know about drive crypt is that max vision used it to protect his servers when he was stealing credit cards. The FBI managed to get the key from RAM as they busted him while his servers were on. That vulnerability is the same for all FDI products though.


Yeah, I know about the firewire port problem with Trucrypt, In fact I have a program to do just that. But that only works when the computer is on. I have no firewire ports.


I don't have a UEFI BIOS yet, but I will be setting to legacy mode before I install the OS. Thanks!
 
Back
Top