DEFCON Annual Hacking Convention Documentary

DEFCON 16

DEFCON 16 (Photo credit: foxgrrl)

If you’re one of those who is into hacking stuffs, then I probably don’t need to tell you about DEFCON Convention.  If you’re not one of those who is into hacking stuffs, then it’s not a surprise that DEFCON might ring hollow to you.  Still, if you’re interested in knowing what is DEFCON, then the documentary right after the break about DEFCON might entice you to participate a DEFCON phenomenon.  What I get out of this documentary is that DEFCON is fun, crazy, insane, but most of all it’s a unique event where you might gain some really good knowledge and get to meet up with some really smart people in technology field.  It’s like if you are serious about a field such as top chefs have their special knowledge exchange convention or whatever, in technology we have conventions such as DEFCON.  I don’t know much about DEFCON, but after watching this documentary I have to wonder what have I been missing really!  Anyhow, the DEFCON documentary right after the break reveals some windows into DEFCON’s past, present, and future.  Enjoy it!!!

Even The FBI, CIA, And NSA Admit That Full Disk Encryption Is Hard To Crack

Category:WikiProject Cryptography participants

Image via Wikipedia

According to Extremetech’s article “Full disk encryption is too good, says US intelligence agency,” a study with a title “The growing impact of full disk encryption on digital forensics” suggests that CSI teams from intelligence agencies (e.g., FBI, CIA, NSA) are facing many difficulties in gathering evidences against criminals who use full disk encryption to lock out incriminatory data.  So, when the elite federal intelligence agencies within the United States think that full disk encryption is making their jobs too hard, then everybody should know full disk encryption can protect data appropriately against most hackers.  Just don’t let the hackers social engineering you to give out the password to unlock the encrypted data, OK?

Surprisingly, full disk encryption can be done so easily, but I doubt that many good citizens are willing to do so.  Sure, full disk encryption can take a very long time if the disk is huge, but by being patience enough to wait out for the encryption process to finish can actually pay off in the end in regarding to safeguard one’s data.  TrueCrypt is the best free software known to date which allows users to truly encrypting disks and files easily.  TrueCrypt is compatible to Mac, Windows, and Linux.  Besides TrueCrypt, Windows 7 Ultimate and Enterprise editions have full disk encryption known as BitLocker Drive Encryption; Mac OS X Lion has FileVault 2; and Linux has various free software to do full disk encryption.  So, it’s clearly that one can do a full disk encryption on any computer platform easily.

Nowadays, web services and businesses encourage customers and computer users to store data online (i.e., inside cloud networks).  As more people store their data online, it’s obvious that such data should be encrypted.  Online data can be stored in network structure known as cloud network.  Cloud network is like a farm of servers that work tightly together to store and compute data with ease.  Since cloud network provides a central hub to store data, and so it’s enormously attractive to hackers.  Hackers love to go after cloud networks; once they break through the cloud networks’ security measures, one fell swoop can reward the hackers with enormous amount of data.  What if the majority of information that store in any cloud network aren’t that valuable, does this mean hackers are wasting their time?  Not really, because stealing few important data from a cloud network might still yield more booties than targeting small banks of data one at a time.  So cloud network users, you all should encrypt your data before uploading such data to the cloud.

In summary, the bad guys love to use full disk encryption for protecting their illegal activities, and so the good guys too should take note and do the same to protect their valuable information from hackers.  Of course, the difference between the two is that the good guys are willing to give the authorities their passwords to unlock encrypted data when such requests are made.  Just make sure not to do the same for the hackers, OK?  It’s not hard to encrypt one’s data since there are too many freely downloaded free tools that allow full disk encryption.  A perfect example of a very good free tool which allows full disk encryption is TrueCrypt.

Source:  http://www.extremetech.com/computing/105931-full-disk-encryption-is-too-good-says-us-intelligence-agency