We’ll assume that neither the NSA nor criminals are really interested in your collection of cat photos or your daughter’s term papers. Which files should be encrypted and where? (And you must ensure that unprotected bits of those files don’t remain on your hard drive.) You also need to protect the encryption key with a long, complex password that’s extremely difficult to crack - and be wary of phishing scams and other deceits that might trick you into handing over the key. Going back to that house analogy, encrypting sensitive files is like locking your front door - a reasonable and generally sufficient line of defense. That doesn’t mean you shouldn’t take precautions. But it reserves the hard work for the few people of interest. It might soak up everyone’s cellphone metadata because that’s relatively easy. Even the NSA, which has the ability to crack all but the best encryption, probably won’t bother. It takes a lot of time and skill to crack encryption, and most criminals are looking for an easy score. To a large extent, the same rules apply to data. Few of us have anything in our homes that would attract the sort of professional thieves who might steal a Van Gogh. Why? Well, for one thing, you can’t afford it. But your security system most likely doesn’t match those used by New York’s Metropolitan Museum of Art or the Getty Center in Los Angeles. You might have an alarm system or even bars on the windows. You probably keep your front door locked - at least at night and when you’re away. I will recommend two file-encryption programs that might take TrueCrypt’s place. In this follow-up article, I’ll discuss my own approach to protecting sensitive files, and I’ll explain why I - unlike Susan - typically don’t recommend Microsoft’s BitLocker. It had dubious legal foundations, its developers were unknown, and its support was primarily relegated to forums that are now missing.” In last week’s (June 12) Top Story, “The life and untimely demise of TrueCrypt,” Susan Bradley reviewed the application’s history and stated, “It’s a mystery that we gave TrueCrypt such an extraordinary level of trust. So did I.īut now that the popular disk-encryption app is effectively dead - at least for the foreseeable future - it’s time to look for a replacement. ![]() It seems as if everyone who kept sensitive files secure did it with TrueCrypt. But VeraCrypt is the future, so if you’re setting up a new encrypted volume, it’s probably the way to go.TOP STORY Data-encryption alternatives to TrueCrypt If you’re using an old version of TrueCrypt, it isn’t incredibly urgent that you switch-it’s still pretty solid. VeraCrypt has fixed some of the minor problems brought up in TrueCrypt’s code audit, not to mention audits of its own code. It’s improvements to TrueCrypt’s base have set the stage for it to be a real successor, and while it’s a bit slower than TrueCrypt, but plenty of security experts like Steve Gibson say it’s a good time to make the jump. Technically, you can still use older versions of TrueCrypt if you like, and you can even follow along with this very guide, since TrueCrypt and VeraCrypt are nearly identical in interface. RELATED: 3 Alternatives to the Now-Defunct TrueCrypt for Your Encryption Needs VeraCrypt is ideal for creating encrypted volumes for groups of files, rather than encrypting your entire boot drive. VeraCrypt can encrypt your entire drive too, at least on some PCs, but we generally recommend Windows’ built-in Bitlocker for this purpose instead. VeraCrypt takes care of everything, keeping the files temporarily in the RAM, sweeping up after itself, and ensuring your files remain uncompromised. When you’re done working with them, you can just unmount the volume. ![]() All the files within the container are encrypted, and you can mount it as a normal drive with VeraCrypt to view and edit the files. With VeraCrypt’s on-the-fly system, you can create an encrypted container (or even an entirely encrypted system drive). RELATED: How to Set Up BitLocker Encryption on Windows TrueCrypt is now discontinued, but the project has been continued by a new team under a new name: VeraCrypt.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |