0

I'm about to do a trip in which the risk of computer being stolen is much higher than usual (train, car, let my bag with computer by friends of friends, and obviously I won't take my computer while I'm swimming in the sea etc.).

What I've done so far:

  • master password at boot (in Lenovo BIOS)

  • backups of my hard drive in different places (even in different cities, by my parent's, etc.)

But even if the master password blocks the computer from booting, the hard drive can be easily removed from a Lenovo, and then all my data could be easily taken.

What other options are there?

  • encryption: I was thinking about this, but would this require to rewrite all the 650GB of data of my 1TB SSD ? This would probably be very long...

  • geolocalization: have a software running in background sending a ping with IP and approximate location to a server?

  • or even a keylogger that sends data to a server, so that if it gets stolen, I can have information? or even a software that would connect to my server once every minute from which I could send a "Wipe everything" signal in case of computer being stolen? (ok this looks crazy, but I have been stolen recently -- not a computer -- that's why I want to prevent it to happen again).

I'm mostly on Windows 7 x64 bit, but I sometimes boot on Linux, and access to the D:\ from Linux.

Note: this question is close, but doesn't exactly address all the concerns here.

Basj
  • 1,489
  • 7
  • 47
  • 90
  • 4
    Use full disk encryption – Ramhound Aug 06 '17 at 15:02
  • How on Windows 7 x64 Integral? Will this require to rewrite all the 650 GB of data? If not, how much time does it take? Is it easily possible to disable the encryption later? – Basj Aug 06 '17 at 15:07
  • 1
    If you're only worried about a few files, or you don't have bitlocker, you can try enabling EFS on the files you're worried about, though the names would be visible still I think. – jiggunjer Aug 06 '17 at 16:49
  • @jiggunjer does EFS also work if we move the hard drive to another computer? does it need to rewrite all the data? – Basj Aug 06 '17 at 18:30
  • EFS only rewrites the files you encrypt so it should save time, but it is an NTFS feature so your linux files need another solution. It's unlike bitlocker in that only the Windows user who encrypted the files can access them. There is no password involved. – jiggunjer Aug 07 '17 at 02:33
  • @jiggunjer oops so it means if the computer crashes, I cannot move the hard drive to another computer if EFS doesn't use a password to re-identify myself on another computer? – Basj Aug 07 '17 at 08:11
  • Probably, but you might be able to export a separate recovery key (store it on a usb at home), I'm not sure what the options are. – jiggunjer Aug 07 '17 at 08:18
  • When EFS is used to encrypt an already-existing file, a **new** encrypted file is created. The unencrypted version is "deleted", which means recovery software can potentially recover it. On magnetic medium disks this can be resolved by wiping free space after enabling EFS, but on SSD disks this becomes more complicated since SSDs don't expose all disk sectors to the host. **Bottom line:** Use FDE if you want to ensure your data is protected. – I say Reinstate Monica Aug 07 '17 at 23:57

1 Answers1

2

Use full disk encryption, such as BitLocker (Windows 7 Ultimate) or TrueCrypt/VeraCrypt. Encrypting your existing storage will take a while, but with modern CPUs and SSDs it shouldn't take more than a few hours (limiting factor likely being how fast your SSD can write).

In case your laptop gets lost, your data will be safe assuming your system is in locked state (powered off).

sebasth
  • 810
  • 5
  • 12
  • So this means it rewrites all the data bytes of the disk? I ask this because after the trip, I'd like to unencrypt, because I don't want to have to write a password each day / or having a 10%-slower I/O system because of encryption. – Basj Aug 06 '17 at 15:45
  • If so, isn't there a "lighter encryption"? (I heard the recent ransomware WannaCrypt did use encryption, this was probably a fast unnoticeable encryption, right?) – Basj Aug 06 '17 at 15:46
  • 1
    @Basj There will be no performance hit with full disk encryption – Ramhound Aug 06 '17 at 15:47
  • Yes, full disk encryption encryption is used to encrypt whole partitions/disks. You can remove encryption later as described in the software documentation. Performance impact is negligible with modern CPUs which have native AES instructions (your bottleneck will still be your disk). – sebasth Aug 06 '17 at 15:49
  • Thanks @sebasth. Even with a fast SSD? Also if I move the disk *myself* to another computer, can I still access the data? Can I set an memorizable password or forced to use a random alphanumeric sequence that I could loose? – Basj Aug 06 '17 at 18:36
  • 1
    Your encryption software has recommendations on password length/complexity and backup plans (usually a separate recovery key). Using disk on different machine might vary a bit depending on TPM etc, with VeraCrypt you can use the disk on another computer (same password and VeraCrypt installed). SandyBridge era i5 CPUs benchmarks by AnandTech http://www.anandtech.com/bench/CPU/335 already exceed 1GB/s throughput, so its unlikely your CPU being the bottleneck. – sebasth Aug 06 '17 at 18:50