{"id":29113,"date":"2015-02-09T23:41:18","date_gmt":"2015-02-10T04:41:18","guid":{"rendered":"http:\/\/www.opensource.im\/uncategorized\/five-best-file-encryption-tools.php"},"modified":"2015-02-09T23:41:18","modified_gmt":"2015-02-10T04:41:18","slug":"five-best-file-encryption-tools","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/five-best-file-encryption-tools.php","title":{"rendered":"Five Best File Encryption Tools"},"content":{"rendered":"<p><p>    Keeping your personal data safe doesnt have to be difficult,    as long as you keep sensitive information encrypted and under    your control. Thats why this week were looking at the five    best file encryption tools you can use to encrypt your data    locally.  <\/p>\n<p>    Title photo by     andrey_l (Shutterstock)  <\/p>\n<p>    For the purposes of this roundup, were focusing on desktop    file encryption tools  the ones you use on your own computer    to encrypt your own private data. Were not examining cloud    services that promise to encrypt your data, or business    services that say they offer encryption. The goal here is to    find the best tools you can use to lock down your sensitive    files  whether theyre photos, financial documents, personal    backups, or anything else  and keep them locked down so only    you have the key. For those unfamiliar with the topic, we have        a great guide on how encryption works, and how you can use    it to keep your own data safe.  <\/p>\n<p>    With that out of the way, here are your top five, in no    particular order:  <\/p>\n<p>    VeraCrypt is a fork of and a successor to TrueCrypt, which    ceased development last year (more on it later.) The    development team claims they have addressed some of the issues    that were raised during TrueCrypts initial security audit,    while largely maintaining its familiar interface. Like the    original, its free, with versions available for Windows, Mac    and Linux.  <\/p>\n<p>    VeraCrypt supports AES (the most commonly used choice), TwoFish    and Serpent encryption ciphers, and allows the creation of    hidden, encrypted volumes within other volumes. Its code is    available to review, although its not strictly open source    (because so much of its codebase came from TrueCrypt.) The tool    is also under constant development, with regular security    updates and an independent audit in the planning stages    (according to the developers.)  <\/p>\n<p>    AxCrypt is a free, open source, GNU GPL-licensed encryption    tool for Windows that prides itself on being simple, efficient    and easy to use. It integrates nicely with the Windows shell,    so you can right-click a file to encrypt it, or configure    timed, executable encryptions, so the file is locked down for    a specific period of time and will self-decrypt later, or when    its intended recipient gets it. Files with AxCrypt can be    decrypted on demand or kept decrypted while theyre in use, and    then automatically re-encrypted when theyre modified or    closed.  <\/p>\n<p>    Its fast, too, and allows you to select an entire folder or    just a large group of files and encrypt them all with a single    click. Its entirely a file encryption tool however, meaning    creating encrypted volumes or drives is beyond its    capabilities. It supports 128-bit AES encryption only, offers    protection against brute force cracking attempts, and is    exceptionally lightweight (less than 1MB.) It also has a lot of    command line options, so you can fire up the command prompt in    Windows and perform more complex action sequences.  <\/p>\n<p>    BitLocker is a full-disk encryption tool built into Windows    Vista and Windows 7 (Ultimate and Enterprise), and into Windows    8 (Pro and Enterprise), as well as Windows Server (2008 and    later). It supports AES (128 and 256-bit) encryption, and while    its primarily used for whole-disk encryption, it also enables    encrypting other volumes or a virtual drive that can be opened    and accessed like any other drive on your computer.  <\/p>\n<p>    It supports multiple authentication mechanisms, including    traditional password and PINs, a USB key, and the more    controversial     Trusted Platform Module (TPM) technology, which uses    hardware to integrate keys into devices. BitLockers    integration with Windows makes it accessible to many people,    and a viable disk encryption tool for individuals looking to    protect their data. One concern? Since the code is locked into    Windows, you cant review it, and its sometimes asserted that    government agencies have backdoor access to decrypt data    (though Microsoft denies this).  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Go here to read the rest:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.lifehacker.com.au\/2015\/02\/five-best-file-encryption-tools-2\" title=\"Five Best File Encryption Tools\">Five Best File Encryption Tools<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Keeping your personal data safe doesnt have to be difficult, as long as you keep sensitive information encrypted and under your control. Thats why this week were looking at the five best file encryption tools you can use to encrypt your data locally<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-29113","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/29113"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=29113"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/29113\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=29113"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=29113"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=29113"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}