J_RaD - 4:16 am on Jun 5, 2011 (gmt 0)
mike.....dood, what in the heck kinda stuff are you doing. do you have window tappers?
TrueCrypt documentation states that TrueCrypt is unable to secure data on a computer if an attacker physically accessed it and TrueCrypt is used on the compromised computer by the user again
use truecrypt to create a hidden encrypted partition in your system on top of the whole drive encryption. the new hidden encrypted partition will be known ONLY to you, so if someone pokes around at your data too much they'll only be looking at what seems to be nothing....and will just start overwriting your hidden encrypted partition. So it doesn't matter who is standing at your hardware only YOU know what is there and isn't there.
The attacker having physical access to a computer can, for example, install a hardware/software keylogger, a bus-mastering device capturing memory, or install any other malicious hardware or software,
ok well 1st off there won't be any installing of SOFTWARE on a fully encrypted hard disk granted you did a full power off. hardware keyloggers? i'd hope you'd notice such a device on a laptop.
how about full power off then removing the drive from the laptop and storing them away from each other in other physically secure enclosures.