I am worried about a potential security loophole when using Truecrypt.
Basically, if I move a file into a Truecrypt volume, doesn’t the data still
exist in unencrypted form in its original location? The analogy I am thinking
of here is that deleting a file just deletes the file index but not the
data.
What do I need to do ensure that no unencrypted remnants are left behind
when I move a file into a Truecrypt volume?
You raise a very important point for the security minded among us. Moving a
file into a TrueCrypt volume almost certainly leaves behind the very thing
you’re trying to secure.
In fact, your analogy isn’t an analogy at all – it’s pretty much exactly how
the scenario plays out.
To understand why that is we need to examine the whole concept of “moving” a
file, how it works, and why it works the way it does.
And, of course, give you an extra step to keep your information secure.
]]>
<
Rather than wiping all the free space on the source drive, which could take a LONG time… just copy the file to the truecrypt volume and then do a secure delete on the original file… that way only the file has to be wiped, rather than (potentially) terabytes of mostly nothing.
Wow, I am so glad for this article. I’ve used TC for a long time, and then use a search to find the original file still in place and visible. Now I understand why.
phillip, what is a ‘secure delete’ compared to regular ‘delete’?
When I move a file from an unencrypted drive to an encrypted drive I copy the file to the encrypted drive and then securely wipe the original file with a file shredding utility.
Yes, my utilities suite (TuneUp) adds a secure delete command to a file’s context menu.
Presumably the file’s remains would be unlikely to survive a defrag, and doesn’t Windows 7 defrag continuously by default?
Incidentally, it’s curious that in Outlook Express (not sure about other email clients) deleting a message actually doubles the amount of space it occupies on the hard drive, as in effect it is copied to the deleted items folder. The space is only reclaimed (and the message completely eliminated) after its original folder is compacted and the deleted items folder is emptied.
15-Dec-2012
Thanks for the info re TrueCrypt. Really good to know — but it raises all sorts of related questions that I had ever considered before. May I assume that the processes you describe also apply to DropBox and BoxCrypt as they also are virtual drives? When I move a file into Dropox, it is deleted from the disk drive? When I encrypt a file by moving it into BoxCrypt, the origial file is deleted from the original disk? When a file in DropBox is opened from a remote device and is then worked on, there is a copy left on the remote device? And what about individual files that are encrypted but not ‘moved’ to another drive — such as a when I use Office to password protect an Excel file, is the data still in the clear some where? Or when I use AxCrypt to password protect an idividual file and work on it, is the data left on the disk drive somewhere?
15-Dec-2012
Re: AxCrypt @ DickW
I believe AxCrypt shreds the plain original on encryption. Therefore, it might even be used to encrypt a file first, then move it onto the TruCrypt mounted volume without leaving any traces behind.
Great article Leo and as simple as you could put it. Just one little question..Would Defraggler overwrite the original file (Especially if you defrag Freespace and allow fragmentation under advanced options), or would that not be secure enough ?. I myself do overwrite Freespace fairly often so am probably OK.
15-Dec-2012
Sorry Leo
Did overlook BAW30s post. I myself do delete the original file/folder to the recycle bin and then overwrite with CCleaner.
Hi Leo,
Thanks for uncovering the ‘dark secrets’ of Windows! Like any layman, I have been believing that once my file/data is deleted, I’m safe!
Mmm..! Not any more!
One “qucik & dirty” way to – erm – make things more difficult to retrieve, is to just do a “Copy”, and then fire up the original file (e.g. an Word or Excel file), delete everything in it, and then save it again under the same name, then delete that “new” file.So anyone retrieving that file would get an empty file…
However… when the program saves, it actually saves a NEW copy, before THEN deleting the old one… so I guess THAT old version is still there waiting to be recovered… Hmmm.
18-Dec-2012
Oh, And another thing…. S’pose I have a file that, when saved, is say half a cluster long. In the middle of that cluster is now an “EoF” marker. But what follows it ? When the new file is saved, is the rest of the cluster (after the EoF marker) filled with zeros; or is it left unchanged ?
And similarly… if the old version extended, say, to five clusters, and the new version is less than one cluster long, are the remaining four now-redundant clusters over-written, or are they left unchanged?
@Robin
That part of those clusters which remains unwritten is called slack space or cluster tips. Whether a program fills these with zeros or random data would be a function of each individual program. As far as I know, most programs probably don’t do this. There are utilities which wipe slack space, but not being that paranoid, I haven’t use any of them.
As for the second part of your question, neither. The old file really isn’t overwritten at all. A new version of the file is written, and the old one is simply deleted, and could be recovered by a file recovery utility.