Sabbath wrote:If you are interested in future requests, once things have been stabilised, then the following is my personal wish list.
Boot LoaderProtection from Evil Maid, Hardware Keylogger, Brute Force of a Stolen Drive, Plausible Deniablity, and Easy Header Backup can be greatly improved with one change in operation.
Entire boot loader, supporting a keyfile option, on a USB Flash drive similar to
Diskcryptor. ntldr has demonstrated incredible possibilities with a standalone boot loader.
Very cool idea! Great ideas like this belong on a wish list somewhere. I don't know if/when we can get to this or if it makes the complexity/security feature cut, but it would be high on my list.
Sabbath wrote:Panic Button
Many users request a panic button, which wipes headers and backup headers from TrueCrypt WDE, encrypted volumes or containers.
The panic button would not be required if a standalone boot loader was on a separate USB flash drive, as there would be no headers on the hard drive itself. In this case, the standalone boot loader solves an additional problem and answers many requests.
Sounds like another good feature if it can be implemented securely. This also belongs on a wish list.
Sabbath wrote:Hashing.
User defined number of hashing rounds when creating a WDE disk or container. This allows users to choose an acceptable time delay themselves, on an individual basis.
When trying to decrypt a container or WDE TC will just keep hashing a given password until it works. There must be a "Stop" button provided in case a user inputs the wrong password.
The benefit of this is that it almost defeats the attackers brute force option altogether, should an adversary obtain the standalone loader. An attacker will never know if the password is wrong or if it has just not been hashed enough times.
TrueCrypt's poor password security is the main reason I got involved in password hashing. We should include Scrypt, IMO, in the short term, and the winner of the
Password Hashing Competition in the long term. Unfortunately, while the algorithm you propose is brilliant, it's patented. It's called a Halting Password Puzzle.
I do not believe the patent is valid, but I think we should avoid this algorithm anyway. It's sad. This is an algorithm the world should be using.
Sabbath wrote:GPT Large drive Support.I believe this will become increasingly important and frequently requested.
Plausible Deniablity EnhancementThere is still a realistic need for a plausible excuse to explain cryptographic random data on a given hard drive.
The most likely acceptable possibility, is a wiped drive, however few if any wipe programs provide a cryptographically random output and even fewer leave random data without zero'ing it out on a final pass.
I suggest a separate, but linked, development of a hard drive wiping tool which "coincidently" overwrites drives with cryptographically random data
More good ideas! We really need to create a wish list, starting with these. In general, I'm fairly adverse to feature creep, so if it were up to me (which is isn't) it might take a while or forever to add these, but they are some of the best ideas I've heard so far.