Skip to main content

You are not logged in. Your edit will be placed in a queue until it is peer reviewed.

We welcome edits that make the post easier to understand and more valuable for readers. Because community members review edits, please try to make the post substantially better than how you found it, for example, by fixing grammar or adding additional resources and hyperlinks.

6
  • 22
    you should have stopped after "make sure your password isn't useful by itself!". i would never attach an usb-stick with sensitive data to a box i don't know and THEN DECRYPT IT.
    – akira
    Commented Aug 15, 2011 at 14:29
  • Well, depends on how sensitive the data is. And: If we're talking keyloggers only, this is definitely a way to overcome the issue of having passwords sniffed.
    – slhck
    Commented Aug 15, 2011 at 14:32
  • 4
    if you can not trust the medium: do not decrypt ANY information. not truecrypt containers, not keepass containers, nothing. if the data is not sensitive then why encrypt it in the first place? it's like protecting your credit card within a bulletproof box and then hand it over to a guy you dont know which 'just checks the card in the other room'...
    – akira
    Commented Aug 15, 2011 at 14:35
  • 2
    KeePass will not work in this situation - the 'auto-type' feature is just that - it injects characters into the same keyboard buffer that the key-logger is monitoring.
    – CJM
    Commented Aug 15, 2011 at 15:11
  • @CJM Yes, drag & drop would work though. It's not a perfect solution though, I'll admit that.
    – slhck
    Commented Aug 15, 2011 at 15:56