How to protect your Zoo Porn..? Or other important junk...

Really? I had absolutely no idea that you could do that! That's amazing! Do you have a link to a page on it I could read?
The file is used as "cryptographic salt". Trying to give details in a message here would be futile (there have been volumes written on the subject - google cryptographic salt if you want the full story - I promise you'll find not only more than you'll be able to read on the subject in a lifetime, but more than you had any clue (unless you're a cryptographer, and maybe even then) was even theoretically possible) but in its simplest form, the "salt" is operationally like using the whole damned file as part of the password, part of the actual crypto-key that the password unlocks, or both. There are other - MANY other - ways crypto-salt gets used, but currently, that's the simplest and most common application of the concept.
 
The file is used as "cryptographic salt". Trying to give details in a message here would be futile (there have been volumes written on the subject - google cryptographic salt if you want the full story - I promise you'll find not only more than you'll be able to read on the subject in a lifetime, but more than you had any clue (unless you're a cryptographer, and maybe even then) was even theoretically possible) but in its simplest form, the "salt" is operationally like using the whole damned file as part of the password, part of the actual crypto-key that the password unlocks, or both. There are other - MANY other - ways crypto-salt gets used, but currently, that's the simplest and most common application of the concept.

Sorry I wasn't clear I meeant I didn't know you could do that with Veracrpyt specifically.
 
Thank you all for this actionable info. What about those USB drives with hardware passcode buttons? Seems like could be a safe stash, no?Image result for usb stick with hardware buttons425 × 510

Never seen them before. It would likely keep most average Joes out, but I imagine that they likely have an override code that more powerful and official individuals can access easily.
 
This is how I protect my zoo stuff.

A big plot of land, fenced and barned.
With my zoo group, anyone not in the group that wanders on property will be told once to leave, if they refuse they get a kneecap blow out and or off.

Then an ambulance escort off my land.
It is legal for me to shoot to stop.
If they die from the injury,they die.

I shot to stop, not to kill.

I know, I am harsh and a redneck.
However I am a redneck that protects whats mine and has no want to become part of superficial scociety.
 
This is how I protect my zoo stuff.

A big plot of land, fenced and barned.
With my zoo group, anyone not in the group that wanders on property will be told once to leave, if they refuse they get a kneecap blow out and or off.

Then an ambulance escort off my land.
It is legal for me to shoot to stop.
If they die from the injury,they die.

I shot to stop, not to kill.

I know, I am harsh and a redneck.
However I am a redneck that protects whats mine and has no want to become part of superficial scociety.

That works a lot less well if the person not in the group is the feds...
 
Good writing! VeraCrypt is a fork of TrueCrypt, which ceased to exist a few years ago. The reasons were never made clear but word goes they were forced by LEA. TrueCrypt in it's days was seen as uncrackable by LEA. Just before they stopped, the code of TrueCrypt was audited to see if there were any flaws. Apart for some minor things, it was rocksolid and to this day, nobody has cracked it. VeraCrypt went on where TrueCrypt stopped, and addressed the minor flaws found in the audit. Some other improvements were also made.

Password cracking can be done on 2 levels, a so called Dictionary Attack and Brute Forcing. A Dictionary Attack works with a word list. All the words are tried, even in combinations. Something is being used as an input, and if your password matches one of those, they know. "Friday13th!" would not be wise to choose. The thing is, it needs to be an exact match. If it isn't, it's not accepted as correct password. I do not agree that a sentence like "Iwouldlikeahamburgerforlunchtomorrow!" is a bad password. It will take a long time to find. Adding the so called keyfile, which could just be a picture or bunch of pictures of your favorite pet, makes it almost impossible.

For those interested, for several systems the hashes are precompiled and stored in a large database. Each possible password is calculated, and the hash is stored. Find a database with hashes and you can simple find the corresponding password. Rainbow Tables are such a technique. VeraCrypt is not one of them.

Going to Brute Forcing. Take a look at your car. Each km or mile you drive, one is added. Now imagine you get the car brand new, nothing on the clock. Furthermore, it does not count just to 9, it also counts from a-z, A-Z and every other symbol on your keyboard. Each combination is tried until the password is found.

To conclude : combining all computing power of all 3 letter agencies combined, none of them have ever ever ever succeeded in cracking a TrueCrypt volume. Giving a good password it is impossible, or too expensive or too time consuming. You would be dead before they knew. There is a tool for cracking TrueCrypt. It is called HashCat. It uses a bunch of video cards to produce a whopping 230.000 hashes per second (2013). That looks amazing and surely TrueCrypt would fall. But the total amount of possible hashes is 1.46*10^48. And I'm guessing there are more interesting storage volumes than ours.

One other thing no one mentioned. Our Operating Systems. Yes I'm looking at you Windows 10! You can store your video files in a TrueCrypt container and watch them when no one is home. But your OS keeps track of everything you do and watch. Windows 10 even sends data to Microsoft. They claim it is to improve Windows, but it is actually spying on you. Linus explains it in a nice video :
So, in order to keep yourself out of trouble, using VeraCrypt is a good start. Best is to use it also on your Operating System. Shut it down and nobody knows what you have been up to. There are way more advanced things you can do but I'll leave it at this.
 
From my years of experience of hiding my gay porn from my homophobic parents, I have the perfect method:

1. Get an SD card big enough for your porn collection.
2. Split it in 2 partitions.
3. On the first partition, put regular-looking files so it looks like it's just a regular SD card.
4. Now, create about 5/6 encrypted disk images using a program and lock them all with the same password.
5. Put your porn in one of them.
6. Rename all the disk images to files that look like system files (like System32 or WindowsCache) so that even if there's a rare occurrence that someone finds them, they won't mess with them since they'll think that the images are important system files.
7. Using Windows Explorer, turn all the disk images to hidden files.
8. Transfer all the disk images to the second partition of the SD card.
9. The last step: Hide your SD card somewhere, but make it look like you "lost it there" so even if a person finds it, they won't instantly be suspicious and wonder why you hid it. For this I recommend: Putting it behind your clock, putting it deep in a box of stuff, or you can just put it somewhere that it'll be impossible to find (maybe something really ridiculous like disassembling an old phone and putting it in there).
10. You're done!
This method mixes all parts of data hiding: digital encryption, social engineering and physically hiding it, so it should be very hard to find the porn collection.
 
I am fortunate that I live in a state where "Possession of Obscene Material" is not illegal. As for protecting your stash, I have noticed that a simple flash drive is good enough. Flash drives are only good for 2-5 years though so transferring your data every six months is a good idea.
 
If you're using a PC there's always 7-zip. You just create an archive like a windows .zip or .rar file that you can protect with a password. HTH.

You can find it here.
 
Nice guide!

I have all my disk, System, Files, and External (the last one without automatical unlocking), encripted with Bitlocker (without key cloud backup). Still, I only have furry, feral and MLP porn there, not zoo (I deleted all my real zoo porn a few years ago). The problem is that when I unlock my external disk, all the porn is in there too (even if is hidden, I never unlock the disk in other people's computer just in case they have a keylogger). I used to have multiple partitions, but is too evident (since they are mounted automatically in a new computer and ask for the keys) and also a pain to manage free space between partitions.

So, what you post about making a hidden partition protected with Veracrypt could be a good way to improve my security. But could yo do this inside a Bitlocker partition, instead of a unhidden Veracrypt one?. And I still use very long passwords (composed with words and numbers), since I need to remember them and can't risk losing it like happened to me before. For web accounts I have 16 chars random keys stored in a key manager and also in a file in the encrypted drive, but I don't want to keep my "physical" passwords there.
 
Back
Top