Cryptomator for encryption software


There is no absolute security, only relative security!

introduce

  • Cryptomator is an open source, secure, no back door file encryption software; It can easily encrypt and decrypt files, and automatically exit the file directory after the file directory is locked, leaving no “trace”.

The characteristics of

  • Use with Dropbox, Google Drive, OneDrive, ownCloud, NextCloud, and any other cloud storage service that syncs with your local directory
  • Client: No account, no data shared with any online service
  • Fully transparent: just works on a virtual drive, like a USB flash drive
  • 256 bit key length AES encryption
  • File name encrypted
  • Use any number of pantries in your Dropbox, and each pantry has its own password
  • Security of 1000 commit data

Focus on

  • Cryptomator works well and can theoretically work with any “synchronous” web disk, including Dropbox, Baidu Web disk, BT Sync, ownCloud, SeaFile, etc. It can also be used as a standalone standalone encryption software.

Method of use

  • The installation
    1. It’s basically the next step.
    2. One thing to note is that at the end of the installation you will need to install an additional application to work with Crytomator — Dokan Library. The Dokan Library is similar to FUSE (Linux User Mode File System), which allows programmers to easily build user-level file systems on Windows systems without writing device drivers. A common occurrence seems to be in the plug-in installation of the game World of Tanks. To be clear, if you don’t mount the temporary disk as WebDAV, if you mount it as local disk, the speed and quality of access can vary greatly depending on how the file system is built.
  • Begin to use
    1. When you need to use your files, open Cryptomator and select your “file library”, enter the correct password, press “Unlock Vault” to Unlock it, the library will be automatically decrypted and loaded into a new drive via WebDav (presumably like inserting a USB drive), and you can work as usual. Feel free to save, delete, or modify files on this disk without any difference in usage.
    2. When you’re done using it, just press the “Lock Vault” button and the drive will be closed, and “all files in the drive will be automatically encrypted” and saved back to your library (file names will also be encrypted). And Cryptomator also adds some random data to obfuscate file sizes for security.
    3. Because Cryptomator’s encrypted file library is really just a regular folder, it’s compatible with almost any web disk synchronization tool. These files are synchronized/uploaded to any network disk or cloud storage space, even if the account is leaked, your data is safe, which is very useful for some heavy reliance on network disk synchronization to office, but also worried about important files being leaked friends! Moreover, Cryptomator uses high strength AES-256-bit encryption algorithm, and the whole encryption is carried out on the client side, without registering an account or any online service, so “even offline state can also be used barrier-free”. Both safety, availability and convenience are worthy of praise. If you lose your password, no one can help you. Use 1Password or KeePass to record your password properly.
    4. Cross-platform, easy to use your encrypted files on your phone
      • I believe that many partners encounter such a problem, some software in some platforms have not in some platforms. One of the biggest advantages of web disk is that you can get your files on different devices across platforms. Cryptomator not only provides Win, Mac, Linux and other computer versions of the client, but also supports iOS and Android platforms, which can easily decrypt and use your files on mobile phones.

conclusion

  • Compared with most common file encryption software, the biggest advantage of Cryptomator is that it can be used with the existing cloud storage network disk, synchronization software and other perfect combination, automatic encryption and decryption, avoid the trouble of manual encryption and decryption every time, and fast.

    Open source, free, cross-platform, no account registration, no network, AES-256 encryption and other features make Cryptomator more reliable. If you often need to synchronize important files to a network disk, Cryptomator is a powerful security guarantee for you. Really, it is so easy to use that it is worth the effort to amway!

download

Cryptomator-free Cloud Encryption for Dropbox & Co


Encryption software veracrypt


introduce

  • If you’re looking for a simple and powerful way to encrypt any file from your system drive to your backup media and store it anywhere in between, VeraCrypt is open source software that helps you lock down protected files. Read on and we’ll show you how to use it.
  • The characteristics of
    • With VeraCrypt’s instant encryption system, you can create an encrypted volume (or even a fully encrypted system drive). All files in the encrypted volume are encrypted, and you can use VeraCrypt to install it as a normal drive to view and edit files. When you are finished working on it, you can unmount the volume. VeraCrypt handles all transactions, temporarily stores files in memory RAM, and then automatically cleans them up and makes sure they are not damaged.
    • VeraCrypt can also encrypt your entire drive, at least on some PCS, but we generally recommend using Windows’ built-in Bitlocker feature to encrypt the entire disk. VeraCrypt is ideal for creating encrypted volumes for groups of files, rather than encrypting the entire boot drive, and Bitlocker is a better choice in this regard.

Method of use

  • Get a free copy of VeraCrypt for download. Run the installation as an administrator of your computer.

  • That’s all! You can obtain a version of VeraCrypt for Windows, Linux, or Mac OS X and install it as an administrator (you cannot run VeraCrypt with restricted /guest account permissions). In this tutorial, we will use the Windows version of VeraCrypt and install it on a Windows 10 machine.

  • VeraCrypt download website address is: www.veracrypt.fr/en/Downloa

    • In China, the download address of the official website may be slow and may fail several times. You can download it from the well-known foreign open source website sourceforge.net at sourceforge.net/project
  • The latest version of Windows is 1.24-Update7, officially released on August 7, and the latest version of MacOS is 1.24-Update8, officially released a week ago on November 28. As with any other application, download and install VeraCrypt. Simply double-click the downloaded exe file VeraCrypt Setup 1.24-update7.exe. You are advised to right-click the file, select Run as administrator, and follow the instructions in the wizard.

  • During the installation, you can select install options, such as Install for all Users and associate the.hc file extension with VeraCrypt. You can use the default. At the end of the installation, you will be prompted whether to disable The Windows Quick Start function. Because VeraCrypt has some unknown problems when The Windows Quick Start function is enabled, you are advised to disable VeraCrypt and restart the PC as prompted to take effect.

How do I create an encrypted volume

  • After the application completes installation and restarts the computer, navigate to the Start menu and start VeraCrypt. You should see the following screen:

  • The first thing you need to do is create an encrypted volume, so click the Create Encrypted Volume button. This launches the Encrypted Volume Creation Wizard and prompts you to select one of the following volume types:

  • A volume can be as simple as a file volume placed on a drive or disk or as complex as full encryption of an operating system. For this guide, we try to keep things simple and focus on setting up native containers that are easy to use. The default option is “Create file encrypted Volume”, we just need to click next.

    Next, the wizard asks you whether you want to create a standard or hidden volume. Again, for the sake of simplicity, we’ll skip the discussion of “hidden volumes” at this point. This in no way degrades the encryption level or security of the volume we are creating, because “hiding the volume” is just a way of obfuscating the location of the encrypted volume.

    • Click next. Next, you need to select a volume to do any name and any location. The only important parameter here is that the host drive has enough space to create the volume you want to use (that is, if you want to use a 100GB encrypted volume, you need to select a drive with more than 100GB of free space). It is recommended that the drive be stored in a non-system disk other than drive C to avoid data loss during system reinstallation. As shown in the following figure, we will place the encrypted volume in the directory of drive D, which cannot be deleted by mistake, and name it do-not-del. The file name is arbitrary and does not need the extension, that is, D:\backup\do-not-del.

    • Now it’s time to choose your encryption scheme. You really can’t go wrong here. Yes, there are many options, but all of them are very reliable encryption schemes and are interchangeable for practical purposes. In 2008, for example, the FBI spent more than a year trying to decrypt AES encrypted hard drives of Brazilian bankers involved in financial fraud. If you are paranoid about data protection and have the condition to seek the advice of data forensics experts, you can select different encryption algorithms and hashing algorithms through the drop-down menu according to the acronym name to improve the encryption level, you will rest assured that your data is secure. Normally, we click next by default.

    • In the next step, you will select the volume size. You can set the values in KB, MB, or GB. We created a 5GB test volume for this example.

    • Click Next, and the password setting box as shown below appears. One thing to keep in mind here: short passwords are a bad idea. You should create a password at least 20 characters long. We recommend that you create a password that is strong and hard to forget. A great trick is to use a passphrase instead of a simple password. Here’s an example: In2NDGradeMrsAmerman $aidIWasAGypsy. This is better than using weak passwords like password123 and day.

    • If you use a weak password, such as a password with too few characters, the wizard will give you a warning window:

    • After you have set your password for security strength, click Next and the Create wizard will ask you if you intend to store large files before creating the actual volume. If you plan to store files larger than 4GB in the volume, click and select yes and it will adjust the file system to better meet your needs.

    • On the “Encrypted Volume Formatting” screen, you need to move the mouse around to generate some random data.

    • Once enough randomness has been generated, click the “Format” button.

    • You can also select the format of the file system to be formatted, such as NTFS, before formatting. For compatibility, you are advised to use the default exFAT format without selecting the format.

      After the formatting process is complete, the wizard will pop up indicating that the creation of the encrypted volume is complete:

      Click OK to return to the wizard page:

      If you need to create a new encrypted volume, click Next to repeat the above process. If no, click exit to return to the main screen of VeraCrypt.

      Now, no matter where your encrypted volume is placed, it is simply a file that you need to mount and use in VeraCrypt.

How do I mount an encrypted volume

  • Click the “Select File” button in the VeraCrypt main window, and navigate to the directory where the VeraCrypt encrypted volume is stored. After selecting the encrypted volume file we just created, “Never keep history” is selected by default for security reasons. It is not recommended to deselect this check box, and then select an available drive letter from the box above. We select X and click Load.

  • Enter the encrypted volume password as prompted, and click OK.

  • You need to be patient for a while, as shown below:

After loading successfully, the main interface is shown as follows:

Let’s look at “My Computer” and see that our encrypted volume has loaded successfully:

  • Oh yeah! Success! The 5GB encrypted volume is presented to you, as sweet as a dessert made by our mother. Now you can go into the encrypted volume and copy into it all the sensitive files you want to protect from prying eyes.

  • After copying sensitive files to an encrypted volume, do not forget to safely erase them. Regular file system storage is insecure, and unless space is properly erased, traces of encrypted files will remain on unencrypted disks. Also, don’t forget to “unload” encrypted volumes in VeraCrypt when you don’t need them.

conclusion

  • Veracrypt is designed to encrypt and manage files locally, even the entire drive or the entire drive. There are many additional features, all in all, it is very playable, but there is also a risk that some unknown bug may appear, causing the loss of their own data.
  • Friendship link: B station also has a similar explanation of the video is also good, you can see:

It would take 400 billion years to crack Tianhe-2! VeraCrypt is a free and open source data encryption software.

Two software comparison


  • First of all, I think that if anyone has the patience to read through this article, they already know that they are right for that.
  • Secondly, I personally prefer itCrytomatorAfter all, in the net disk why not?
    • Veracrypt is relatively complex and can only be used to encrypt and decrypt local files. It cannot be used to synchronize files on web disks.
  • Finally, I hope this article is helpful to everyone! Find their own sense of security! And can improve their work efficiency!