{"id":28157,"date":"2014-12-19T11:40:42","date_gmt":"2014-12-19T16:40:42","guid":{"rendered":"http:\/\/www.opensource.im\/?p=28157"},"modified":"2014-12-19T11:40:42","modified_gmt":"2014-12-19T16:40:42","slug":"keep-encrypted-files-encrypted-when-you-back-them-up-to-the-cloud","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/keep-encrypted-files-encrypted-when-you-back-them-up-to-the-cloud.php","title":{"rendered":"Keep encrypted files encrypted when you back them up to the cloud"},"content":{"rendered":"<p><p>    After reading my article    on     encrypting sensitive data, Ian Cooper asked if    it was safe \"to use one of these encryption tools in    conjunction with an online backup service?\"  <\/p>\n<p>    In that previous article, I    discussed two separate ways to encrypt a folder filled with    sensitive files: Windows own Encrypted File System (EFS) and    VeraCrypt, a    free, open-source fork of the well-remembered TrueCrypt. This    time around, I'll look at how files encrypted with either of    these work with two popular online backup services, Mozy and Carbonite.  <\/p>\n<p>    [Have a tech    question? Ask PCWorld Contributing Editor Lincoln Spector. Send    your query to <a href=\"mailto:answer@pcworld.com\">answer@pcworld.com<\/a>.]  <\/p>\n<p>    Both Mozy and Carbonite    encrypt your files and keep them encrypted on their servers.    However, the default settings provide a backdoor to that    encryption. It's therefore theoretically possible for a hacker,    a disgruntled employee, or the NSA to access your files.  <\/p>\n<p>    Both companies offer a more    secure option where you and only you have the key, and    therefore, there's no backdoor. Mozy calls this a     Personal Encryption Key; Carbonite calls it aPrivate    Encryption Key. The problem, of course, is that if you lose    the key, you lose your backup.  <\/p>\n<p>    But even if the backup    service has the key to your files, they don't have the key to    your EFS encryption. And the files are useless without that.    When I tested this, Carbonite wouldn't let me download    EFS-encrypted files onto another computer. Mozy let me download    the files, but those files just contained gobbledygook.  <\/p>\n<p>    VeraCrypt's container    approach makes this a non-issue. Remember that VeraCrypt keeps    your sensitive files in one or more encrypted container files.    Open a container with the password, and your files become    available in a virtual drive. Close the container, and your    files exist only in the encrypted container.  <\/p>\n<p>    The simple solution: Don't    back up the virtual drive. Just back up the container. That    will effectively back up the files, but they'll be encrypted    before Mozy, Carbonite, or any other online service will ever    see them.  <\/p>\n<p>        Your message has been sent.      <\/p>\n<p>        There was an error emailing this page.      <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>View original post here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.pcworld.com\/article\/2853741\/keep-encrypted-files-encrypted-when-you-back-them-up-to-the-cloud.html\/RK=0\/RS=Ufz6QYvjShLiPWGVBXucx4_wrt0-\" title=\"Keep encrypted files encrypted when you back them up to the cloud\">Keep encrypted files encrypted when you back them up to the cloud<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> After reading my article on encrypting sensitive data, Ian Cooper asked if it was safe \"to use one of these encryption tools in conjunction with an online backup service?\" In that previous article, I discussed two separate ways to encrypt a folder filled with sensitive files: Windows own Encrypted File System (EFS) and VeraCrypt, a free, open-source fork of the well-remembered TrueCrypt. This time around, I'll look at how files encrypted with either of these work with two popular online backup services, Mozy and Carbonite. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-28157","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/28157"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=28157"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/28157\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=28157"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=28157"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=28157"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}