• We’re currently investigating an issue related to the forum theme and styling that is impacting page layout and visual formatting. The problem has been identified, and we are actively working on a resolution. There is no impact to user data or functionality, this is strictly a front-end display issue. We’ll post an update once the fix has been deployed. Thanks for your patience while we get this sorted.

"Using TrueCrypt is not secure..."

Page 4 - Seeking answers? Join the AnandTech community: where nearly half-a-million members share solutions and discuss the latest tech.
depends how you implement bitlocker, fully or partially. or to say, tied to the system drive and operated in concert with or independent of the system drive. or not tied to the system drive.

an example of the hard way after encryption:
BitlockerOn(off).bat
run as administrator> c:windows\system32\manage-bde -protectors -(enable)(-disable) d:

Well to me user friendly would be to have an option to lock the drive by, say, right clicking on the drive and selecting lock.
 
Capturebitlocker_zps7f943ebe.jpg
 
Why don't desktop BIOS's support ATA passwords like laptops? The option is there in the hard drive, but the BIOS never supports it. At least not on my circa '08 computer.
 
I don't get those options. 🙁

CsfFynu.jpg

well I guess we can assume your setup differs from mine.

I have setup bitlocker without any self entered password, excluding the tpm module. I use the bitlocker generated .bek file(hidden) on a usb, temporarily, just in case, during setup.

when encrypting c: bitlocker asks to save the key to a file, etc., etc. I point to the usb and bitlocker send the .bek(hidden) and the 48 digit recovery password text file. I do the same for d: & e: with the exception that I check off the box that allows automatic unlocking with c: the only password I've entered is for my windows account. as far as I know, while at my open desktop, locking e: (inaccessable) separately, from the desktop, is incompatible with automatic unlocking. terms like, turn off, disable, suspend mean different thing depending on the current state.

I copy my key files to a second usb and encrypt one with bitlocker and one with truecrypt using my own password.

if you mess with the bios you'll get locked out so suspend protection beforehand, reboot and resume. some software seems to have access to the bios, i vaguely recall it as such but if you find yourself locked out, go to the notebook pc or secreted hardcopy and get the 48 digit key. then suspend reboot and resume.








c: open
 
not sure what that means in W8 but for me it negates the need to enter big passwords.

more bitlocker settings can be found in gpedit.
It means that my desktop doesn't have a trusted platform module. I need to enter a password to unlock a bitlocker locked drive.
 
Back
Top