WEBVTT

00:01.100 --> 00:09.650
Let's move on and see how to unlock locks, encrypted drives with a key file decrypt and the locks enabled

00:09.650 --> 00:14.600
devices may hold up to 10 different key files or passwords.

00:15.750 --> 00:23.940
In the last lecture, we have encrypted the USB disk using a passphrase, so next to having the already

00:23.940 --> 00:30.720
setup password, we are going to add a secret key file is an additional authorization method.

00:31.140 --> 00:36.960
Let's generate the key file that there are more approaches, but I'll choose the easiest one.

00:37.440 --> 00:43.300
I'm going to use the document and therefore you send them to generate a random key.

00:43.800 --> 00:45.300
So did I.

00:45.330 --> 00:57.450
If they have your random output file equals, let's say you file the name of the file, buycks one hundred

00:57.660 --> 01:00.240
twenty four and count for.

01:01.210 --> 01:08.880
This will create a file with random content with the size of four thousand ninety six Bicks.

01:10.070 --> 01:12.750
Which is like a 30, 40 character password.

01:13.010 --> 01:20.750
By the way, you can use any file is key file, but I think one with random content is a very good,

01:20.770 --> 01:21.530
insecure one.

01:22.780 --> 01:23.410
Perfect.

01:23.500 --> 01:25.270
This is the random key Cepheid.

01:28.900 --> 01:30.580
It's not the Muskie file.

01:36.250 --> 01:43.870
Optionally for extra security, you can encrypt the key file symmetrically using GBG, and they will

01:43.870 --> 01:46.680
make the file readable only by about.

01:47.850 --> 01:56.100
If a hacker gets access to the key file that the user, the hacker is already logged in is what and

01:56.100 --> 01:57.830
you have a bigger problem anyway.

01:59.480 --> 02:03.770
Change mode four hundred and the fight.

02:07.670 --> 02:10.550
These are the right permissions for the file.

02:11.900 --> 02:20.670
We have a USB disk that's already set up for decrypt and locks, and it was encrypted using a password.

02:21.410 --> 02:28.400
I'm going to get the key file is an additional authorization method creep setup.

02:31.050 --> 02:32.750
Locks it key

02:35.790 --> 02:41.210
the name of the drive, slash dev, slash HDB.

02:42.210 --> 02:44.530
Don't forget to use the correct name.

02:44.970 --> 02:46.640
I want to check it again.

02:51.490 --> 02:52.300
I must be good.

02:54.650 --> 02:56.870
OK, the name is is Debbie.

02:58.550 --> 03:01.820
And the path to the key file would key file.

03:04.100 --> 03:09.050
And I'm prompting to enter an existing password to unlock the drive.

03:09.380 --> 03:14.660
This is the password from the previous lecture when we've set up the drive.

03:21.380 --> 03:22.550
And it's done.

03:22.760 --> 03:27.050
The key was added is an additional authorization method.

03:27.590 --> 03:36.860
Now the driver is locked, so let's try to unlock it using the secret key, the secret file set setup

03:37.280 --> 03:40.840
locks open the name of the disk.

03:41.640 --> 03:51.380
There has to be the name of the member file, let's say secret and then minus minus key.

03:51.380 --> 03:52.580
Minus file.

03:55.500 --> 04:00.300
And the correct path to the Kilfoyle route Cepheid.

04:04.850 --> 04:12.500
And it was unlocked, I can mount the encrypted partition anywhere on the main file system and use it

04:12.500 --> 04:13.040
normally.
