2016-06-27 21:45:18

I will be traveling over the next couple of months, so my computer won't always be in a secure location as it is when I'm at home.

My Windows account is password protected, but as most of us know, Windows isn't all that secure.

Before I lost my vision and was still working, my last employer issued most of their employees a laptop which was their work computer. As long as you had your laptop with you you could work if needed, such as helping with an emergency while on vacation.

To protect customer and company proprietary data, the laptop hard drive were all encrypted. I can't recall the name of the program they used, but it was like TrueCrypt except that it could be managed over the company network.

When you boot a computer protected this way you have to enter a password before the system can be booted because the entire hard drive is encrypted.

I was thinking that this would be a good way to protect my data and source code. Does anyone know if something like an accessible TrueCrypt exists? So far my searches are only returning links to problem reports from people using drive encryption and having trouble accessing their hard drive.

2016-06-27 22:16:19 (edited by livrobo 2016-06-27 22:18:28)

As far as I know, TrueCrypt is completely accessible. Is there something you're having a problem with?

If a helicopter falls in the field and no one's around, it doesn't make a sound.

2016-06-27 22:57:28

You are going to run into at least one major problem. I think it is one you can see. If the drive is fully encrypted, you will need to decrypt before accessing the data. This means that you have to punch in your password before the OS loads. Of course the OS needs to load before your screen reader load. I need to see about going to find a program that is just as good as TrueCrypt is seeing that TrueCrypt is left out in the cold per say. There is one that branched off from the TrueCrypt source code, but I forgotten the name… I heard about it on security now.

All that is gold does not glitter, Not all those who wander are lost; The old that is strong does not wither, Deep roots are not reached by the frost. From the ashes a fire shall be woken, A light from the shadows shall spring; Renewed shall be blade that was broken, The crownless again shall be king.
DropBox Referral

2016-06-28 01:39:36

NTFS is the files system that windows uses. You can compare that to the table of contents of a book. NTFS is one table, and HFS is another table per say. Now that is out of the way, I would say that zip or seven zip might work, but it comes down to how bad you do not want any one to have access to the file or files. If you wan true encryption, you do want to be able to have someone of whom you trust to be able to verify that the program you are using works in this regard. That is why you might use a open source program like what Truecript was. As for just encrypting just a few files or the whole drive, that depend on how you wish to protect your data. If you cover the whole drive, you could possible claim that you don't have the password to the system, but you could run the risk of someone just wiping the drive. Then again, I could see someone doing full disk encryption on thumb drives just incase you misplaced it, and only encrypting the stuff you carried about on the computer. Anyway, no matter what you do for encryption, you do have some worry when it comes to your key being in ram. if you don't have the system powered up, your encryption key will not be in ram because of your ram require power to hold stuff. In short, I think that full disk encryption is good when you want to make sure that you got everything, and not uses full disk encryption when you know that there is a few things you wish to protect. HTH.

All that is gold does not glitter, Not all those who wander are lost; The old that is strong does not wither, Deep roots are not reached by the frost. From the ashes a fire shall be woken, A light from the shadows shall spring; Renewed shall be blade that was broken, The crownless again shall be king.
DropBox Referral

2016-06-28 04:11:06

The spinoff of TrueCrypt is called VeraCrypt. I've heard that it's fully accessible, but haven't tried encrypting an entire hard drive with it.

Does anyone know when, exactly, the password would need to be entered if you do this? I asked this question on an email list once before but got no answer. If that can actually be done accessibly, i.e. you can memorize when the prompt appears, and it's a standard enter the password into the box and press enter affair, I wouldn't mind encrypting my whole drive either. Although I've heard that you could potentially sacrifice some system performance this way, but it might be worth it if you want your data to be kept safe.

The glass is neither half empty nor half full. It's just holding half the amount it can potentially hold.

2016-06-28 12:20:07

I don't really know, but I would think that it would be a very short time after you boot. Just remember, if you do decide on a full drive encryption, to shut your system completely down when it is not in use to get the full use out of the encryption. I think it could be a good idea seeing that you may not even want anyone to access the temp files. I know that when I unzip something, the zip program I use sometimes use the temp folder on my system for storage until the whole file is unzip. Just something that might should be taken in to account. I wonder if encryption programs would do the same if you are just doing a group of files instead of the whole drive.

All that is gold does not glitter, Not all those who wander are lost; The old that is strong does not wither, Deep roots are not reached by the frost. From the ashes a fire shall be woken, A light from the shadows shall spring; Renewed shall be blade that was broken, The crownless again shall be king.
DropBox Referral

2016-06-28 15:13:21

As I understand it, in whole drive encryption like TrueCrypt, encryption is done during writes to the drive and decryption is done during reads, making the encryption and decryption invisible to the user.

My concern is that the log in screen that is presented before Windows loads won't have a screen reader, so it would have to have some kind of audio cues.

As far as I know, NTFS encryption, BitLocker, is available only in the Pro and Ultimate versions of Windows 7 and I have Home Premium.

If I can do it, I'd rather encrypt the whole drive, that way I know that everything on the laptop is secure.

@Livrobo

The last time I looked at TrueCrypt, the log on screen was totally silent. Not a problem if the log on goes smoothly, but without audio cues of some kind, that could be a problem if I mistype something during the log in.

From what others have said, it sounds like the log on screen could still be a problem.

@CW

My intention is to protect the contents of the laptop from someone using the laptop without my consent and from thieves that might steal the laptop. I will of course have off line encrypted backups of everything.

@TurtlePower17

Thanks, I'll take a look at VeraCrypt.

2016-06-28 15:33:53 (edited by livrobo 2016-06-28 15:38:51)

If you're going to use full drive encryption, it would be impossible to have speech at the login screen. Question: is your drive an HDD? If so, you could probably enter the password, then listen for activity. If there doesn't appear to be anything going on, you could assume that you entered it incorrectly and try again. If your drive is an ssd, it shouldn't take long at all to get you from TrueCrypt's bootloader to the logon screen if you've entered the password correctly. I don't think it would present much of a challenge to get through that screen without speech or audio prompts. Also, I agree with @Turtlepower17. I use VeraCrypt every day to encrypt my USB drives and some folders in Dropbox.

If a helicopter falls in the field and no one's around, it doesn't make a sound.

2016-06-28 17:06:00

I realize that speech on the log in screen would gbe imposible, but audio cues with the PC speaker would be. The problem with PC speaker beeps is that most computers these days don't come with one.

So knowing exactly how the log in screen behaves would help. For example, if you mistype your user name or password, does it display an invalid log on dialog with an OK button, or does it simply clear the input fields and leave the cursor in the user name field?

2016-06-28 18:22:48 (edited by livrobo 2016-06-28 18:33:16)

TrueCrypt and VeraCrypt only require a password, so you wouldn't have to worry about entering a username. As for the behavior of what happens when you enter the wrong password, I'm not sure. I was going to try it out in a virtual machine but unfortunately I don't have any on this laptop. That might be a good way to try it out though if you can.

If a helicopter falls in the field and no one's around, it doesn't make a sound.

2016-06-28 19:11:13

Ah, I didn't even consider trying it out in a virtual machine first. If I feel like setting one up, I'll let you guys know how that goes. I'm thinking that, initially, I'll use TapTapSee to read the screen during the boot process so that I know when the password prompt appears.

The glass is neither half empty nor half full. It's just holding half the amount it can potentially hold.

2016-06-28 21:07:14

I would think an OCR app would be better than TapTapSee for reading computer screens. I have tried using TapTapSee to read displays on things like a thermostat and my sleep number bed's remote. Sometimes you get what the display says, sometimes you don't. Frustrating when each attempt cost money, not so bad now that it's free.

I am currently reading through the VeraCrypt user's guide, this sounds like a very nice program, but I have run across one item that may not be very blind user friendly in the volume creation steps.

VeraCrypt user's guide wrote:

STEP 11: Move your mouse as randomly as possible within the Volume Creation Wizard window at least until the randomness indicator becomes green. The longer you move the mouse, the better (moving the mouse for at least 30 seconds is recommended). This significantly increases the cryptographic strength of the encryption keys (which increases security).

I can hook up a mouse to my laptop or enable the touchpad to provide a mouse, but how am I supposed to know when the pointer is within the Creation Wizard window, and how am I supposed to know when the randomness indicator turns green? Consider that I am using JAWS so any NVDA specific techniques won't work.

For audio cues, I can write a short program to generate speaker beeps to see if my laptop has a speaker, then since VeraCrypt allows you to customize the log on screen text, imbed some control 'G's in the text to beep the speaker.

I could install VMWare Player and create a virtual machine with Windows 7, but would the virtual machine be accessible as is, or would I need to install a screen reader in the virtual machine too?

2016-06-28 21:21:53 (edited by livrobo 2016-06-28 21:26:57)

NVDA will indicate how much you've moved the mouse using the progress sounds, so I'd assume Jaws would do it as well. I just use the command to put the mouse in the window, then move it until I get the 100 percent sound from NVDA. Also, moving the mouse isn't a requirement and it'll let you create the volume without doing so, but doing it strengthens the encryption keys.

If a helicopter falls in the field and no one's around, it doesn't make a sound.

2016-06-28 22:38:42

@livrobo

Oh! So the randomness indicator is just a color changing progress bar? JAWS will read that! The VeraCrypt manual gives the impression that it was just a graphic that turned green.

The closest thing JAWS has to NVDA's mouse simulator is their touch cursor which is just a way to navigate through all the objects on the screen regardless of whether they are controls for the user or if they are in the tab order sequence. But if the randomness indicator is just a progress bar, I could just keep moving the mouse around the screen until JAWS announces 100%. That will work. Thanks!

@Wanderer

Thanks! That answers the question. So virtual machines have to have their own screen reader, the screen reader on the host won't read the virtual machine's screen. If I was creating a virtual machine I'd be using for a while, I'd install JAWS, but for a quick try of VeraCrypt, Navigator will do.

There's no description of how the preboot log on screen behaves in the manual, but if it's like the program my last employer used to secure their laptops, a wrong log on attempt just takes you back to the log on screen. After Windows loads, if there were any unsuccessful log on attempts, you'll get a windows showing a log of the failed attempts.

2016-06-28 23:49:06

Yep, it's just a progress bar. It actually changed in the latest version of VeraCrypt. It wasn't usable before.

If a helicopter falls in the field and no one's around, it doesn't make a sound.

2016-06-29 02:47:05

At Figment, I've actually had quite a bit of success using TapTapSee to read computer screens. i was trying to figure out why a laptop wouldn't boot, and I was able to get it to tell me when Windows was loading files when I was booting into a talking PE, as well as getting it to tell me why it originally wouldn't start to begin with. Apparently the OS had gotten corrupted somehow, because it asked for the insertion of a recovery disk. I'm glad you don't need to pay to use it anymore, because it's been a really useful app in a few other circumstances as well.

The glass is neither half empty nor half full. It's just holding half the amount it can potentially hold.

2016-06-29 03:17:13

@Livrobo

Well, that's good news that that is accessible now. Color changing progress bars look fancy, but aren't very hard to create. VeraCript's randomness indicator probably only goes from red to green which is easy because only two of the three primary colors is used. A few years ago I created one that used the entire spectrum of colors from brown to violet, the hardest part of that was finding the formula to convert from percent to RGB, and that wasn't very difficult either.

I figured out a way to make sure the mouse pointer is inside the Wizard window before I start moving it around. In the control panel, under mouse options, there is an option to have the pointer automatically moved to a dialog's default button, just turn it on.

@TurtlePower17

It's possible that What you want is more obvious with a picture of a computer screen than it is with a picture of a thermostat or a remote in my hand displaying a number.

As I recall, the company behind TapTapSee said that profits from other products or projects allowed them to make it free to benefit the visually impaired. Even so, for what it did, it was worth the price they were asking. I used the 100 picture pack at $7.99 so each picture only cost me $0.08.

Now I just need to find out how the pre boot log on screen behaves, a question I'll ask the VeraCrypt people, and I should be able to get it working.

Thanks to all for your input, it is very much appreciated!

2016-06-29 14:10:41

At figment, just a little thing i noticed once. If you use jaws OCR feature on the window where you have a virtual machine open, you don't have to have a screen reader running on the virtual machine. While the text might be a little scrambled, it's nice to get through login screens, on linux distress for example. You might try it to monitor the behavior of the failed password screen for your program of choice. Hope this makes sense, just woke up lol.

2016-06-29 14:54:44

@Arqmeister

LOL! Haven't had your morning jo yet? No worries, despite that what you said was perfectly understandable. Probably because I haven't had my morning jo either!