Symantec endpoint managed client not updating
The reason is there are so many facets to the problem it takes several years to get them under your belt, and by then MS or who ever has moved the File System forward in some way and don't release enough information for you to be able to evaluate the changes effectivly, then of course "attacks improve with time" as well so you end up on the "hamster wheel of pain" just trying to keep up, even if it is your full time job.• June 15, 2015 AM I have a question about the hidden volume in True Crypt/Vera Crypt.If caught with the software, they might just be one of the millions of ordinary users.But then someone decided to put a backdoor in the civilian version of the software, and the lead developers baulked and shut it down. Open source software is more vulnerable than corporation software, since the NSA can easily have some of its own people "volunteer" to work on the code.Encrypting your Windows hard drives is trivially easy; choosing which program to use is annoyingly difficult. But the anonymous developers weirdly abdicated in 2014 when Microsoft released Windows 8.I still use Windows -- yes, I know, don't even start -- and have intimate experience with this issue. I used it because I knew and trusted the designers. But big companies are always suspect, because there are a lot of ways for governments to manipulate them. I stuck with the program for a while, saying: But soon after that, despite the public audit of True Crypt, I bailed for Bit Locker.The only thing that stopped the pwnage were a good /etc/hosts file and NO WINDOWS!One little mistake is all it takes and people make mistakes all the time. I can't believe we're still having this discussion.
(Here's Niels's statement from 2006 on back doors.) It was a snap decision; much had changed since 2006.[There is no way that volunteers could make a program with such extensive capabilities in windows, mac, and linux.The number of person-hours of work is too high.] Then have intelligence operatives and assets use it.Currently, there are two possible headers in the total volume. Would it not be possible to put the (encrypted) header of the hidden volume at the end of the encrypted Volume? After decryption of the hidden volume, the end of decrypted hidden volume could then be another, nested hidden volume in the current hidden Volume.Such nested hidden volume(s) could only be opened by supplying the passwords for all the outer hidden volumes.
And I agree with his ultimate conclusion: Based on what I know about Bit Locker, I think it's perfectly fine for average Windows users to rely on, which is especially convenient considering it comes with many PCs.