The latest release of Passware claims that TrueCrypt and VeraCrypt have characteristics that might aid in the decryption of partition and drives like encryption keys windows stores in the hibernation file, and others. Is this true and something we should worry about?
The latest release of Passware claims that TrueCrypt and VeraCrypt have characteristics that might aid in the decryption of partition and drives like encryption keys windows stores in the hibernation file, and others. Is this true and something we should worry about?
https://www.passware.com/
https://support.passware.com/hc/en-us/articles/360050713974-Tips-for-Efficient-TrueCrypt-VeraCrypt-Decryption
See the documentation below.
https://www.veracrypt.fr/en/Security%20Requirements%20and%20Precautions.html
That's why I think Veracrypt should come with keys in RAM encrypted by default.
The code could determine if the Windows OS is 64-bit. I think the reason is due to last two bullets in the release notes.
https://www.veracrypt.fr/en/Release%20Notes.html
1.24 (October 6th, 2019):
Windows
Implement RAM encryption for keys and passwords using ChaCha12 cipher, t1ha non-cryptographic fast hash and ChaCha20 based CSPRNG.