![]() ![]() ![]() Preferably keep them UNencrypted, but secure in some other way, in case you lose your encrypted volume or forget your pass phrase. If you’ve chosen a good passphrase, without it the data is not recoverable.ĭata encryption is an important part of an overall security strategy. That being said, make sure you have secure backups, updated regularly.An encrypted volume does you no good if the files you care about are also elsewhere on your machine.Use a multi-word phrase that you can remember to be the key to your encrypted data, and it’ll be much, much more difficult to break. This is why we talk about pass phrase instead of pass word. If you choose an obvious pass phrase, an attack can certainly be mounted that could unlock your encrypted volume. Encryption does not make a bad pass phrase any more secure.I do have to throw out a couple of important caveats: #Truecrypt 7.1.a portable macEven using other operating systems such as Mac or Linux. In fact, you can copy your encrypted file to another machine entirely and mount it with TrueCrypt. TrueCrypt is not tied to any one platform, your user account or anything else just the pass phrase. In my case, I keep spreadsheets, public and private keys, documents, and even my Roboform password database on it, all securely encrypted when not in use. When I need the data thereon, I simply mount it, specify my pass phrase to unlock it, and use the files that are stored within it however I need. I keep a bunch of my personal information in a TrueCrypt container that I regularly copy between machines, onto a thumbdrive, and I even back it up to the internet. I tend to prefer container based encryption for its portability, and for the fact that you need only mount the encrypted drive when you need access. TrueCrypt can be a key part of that strategy. Once the drive is unmounted, the data is once again unrecoverable without knowing the pass phrase.ĭata encryption is an important part of an overall security strategy. Reading from and writing to that “drive” automatically and transparently decrypts and encrypts the data. You then “ mount” that file using TrueCrypt, supplying the correct pass-phrase to decrypt it after which the contents of that file appear as another drive on your system. Container Encryption – with this approach you create a single file on your computer’s hard drive that is encrypted.Once your machine is turned off, the data is unrecoverable without knowing the pass phrase. Once booted, data is automatically and transparently encrypted and decrypted as it travels to and from the disk. Whole Drive Encryption – you can use TrueCrypt to encrypt your entire hard disk, including the partition you boot from. In order to boot the machine, you must first supply your pass phrase to enable decryption.There are two approaches to using TrueCrypt: While I still use and recommend TrueCrypt, please also read Is TrueCrypt Dead? for what happened, and any late-breaking updates. IMPORTANT: On May 26th, 2014 TrueCrypt development was abruptly and somewhat mysteriously halted. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |