File and disk encryption download






















Tomb is written in code that is easy to review and links commonly shared components. Tomb generates encrypted storage folders to be opened and closed using their associated keyfiles, which are also protected with a password chosen by the user. A tomb is like a locked folder that can be safely transported and hidden in a filesystem; its keys can be kept separate, for instance keeping the tomb file on your computer harddisk and the key files on a USB stick.

If you are already familiar, download the tar. Tomb is a simple shell script, you can just download the source distribution and copy it in your path, it will check for requirements installed. Tombs are operated from a terminal commandline and require root access to the machine or just sudo access to the script.

Please note that user permission problems are due to the fact they are not using sudo. We do recommend using it. Tomb can do much more, like execution hooks, steganography of keys and fast search over filenames and contents: have a look at the manpage. We believe that complexity hides insecurity, therefore Tomb is open source and basically just a script you can read and check for what it does. We do our best to keep it short and easy to read. Plus there is no cloud service connected and no network connection needed: Tomb works entirely off-line, of course.

Our target community are desktop users with no time to click around, sometimes using old or borrowed computers, operating in places endangered by conflict where a leak of personal data can be a threat. The internet offers plenty of free services, on the wave of the Web2. While this distinction is always the outcome of continuous cultural negotiation, it continues to be critical, for where nothing is private, democracy becomes impossible.

It is important to keep in mind that no-one else better than you can ensure the privacy of your personal data. Server hosted services and web integrated technologies gather all data into huge information pools that are made available to established economical and cultural regimes. This software urges you to reflect on the importance of your privacy.

World is full of prevarication and political imprisonments, war rages in several places and media is mainly used for propaganda by the powers in charge. Some of us face the dangers of being tracked by oppressors opposing our self definition, independent thinking and resistance to omologation.

TrueCrypt makes use of statically linked libraries so that its code is hard to audit, plus is not considered free by operating system distributors because of liability reasons, see Debian , Ubuntu , Suse , Gentoo and Fedora. Here below some articles that are useful to understand Tomb more in detail and to get in touch with the difficult job of a Crypto Undertaker:.

With Tomb we try to overcome all these limitations providing strong encryption, encouraging users to separate keys from data and letting them transport tombs around easily. Also to facilitate auditing and customization we intend to:.

If you believe this is a worthy effort, you are welcome to support it. Do not use the latest Git version in production environments, but use a stable release versioned and packed as tarball. The stable version will always ensure backward compatibility with older tombs: we make sure it creates sane tombs and keys by running various tests before releasing it.

Please contact us to see how to get full disk encryption. Request encryption. Add full disk encryption to your IT security solution as an add-on feature. Cost-effective licensing Flexible licensing A separate license key gives you freedom to purchase extra security only for the devices you need to encrypt. When to use full disk encryption? And in many cases, you simply want to encrypt select files or folders quickly and easily. Regardless, quick and simple file encryption is something every user should have in their toolbox.

Below are some of the top free tools to help. Encrypto has versions for both Windows and MacOS. Cryptomator is a free and open source file encryption software, although its main use is to encrypt files for uploading them to the cloud.

Cryptomator provides you with a virtual hard drive so you can access your files as you would normally. Meanwhile, the encrypted files are actually stored in your cloud folder, for example, within Dropbox or Google Drive. Cryptomator updates files on an individual basis, so when your cloud storage system goes to sync, it only needs to update specific files — ones that have been modified since the last sync. This can save on time and is especially important if you have data upload limits imposed by your cloud storage provider or ISP.

BoxCryptor offers a simple way to encrypt files and keep them all easily accessible. You just create a folder on your computer and drop in files you want to encrypt. You can also put the folder in a sync folder for your cloud storage systems, such as Dropbox or Google Drive. AESCrypt is a free and open source software that enables you to encrypt files and folders. It uses bit AES encryption to secure data and is very easy to use.

This one is ideal if you only need to encrypt a few select files. For example, you may be traveling and want to ensure that if your computer is left open or goes missing that no one can read the contents of certain files.

It can also be useful if you want to encrypt specific files or folders before uploading to the cloud. Depending on the OS, encrypting files might be a simple case of a few clicks and a password entry or dragging the file into the AESCrypt program. Aside from strong encryption it uses bit AES , this software offers a powerful suite of sharing features.

This software enables you to control who accesses files and how long access is available for. You can even adjust settings after the files have been sent. You also get an audit trail of activity related to encrypted files, including read-receipt notifications when a file is accessed or modified. EncFSMP lets you create an encrypted folder anywhere on your computer and drop in the files you want to encrypt. This hints at how secure this tool is and how useful it can be for protecting user privacy and anonymity.

The Tor network provides users with a means to browse the web anonymously as well as access parts of the web that are normally inaccessible through standard browsers. The simplest way to connect to the Tor network is by downloading the Tor browser. There are also many Tor-related projects under continuous development, including a live operating system Tails and a traffic obfuscation service Pluggable Transports.

While the Tor browser can protect your anonymity, it is flawed in the sense that the entry node operator can see your IP address. In fact a VPN is a good idea for anyone browsing the web, whether you use Tor or not. A VPN encrypts all of the traffic going and to and from your device and tunnels it through an intermediary server. The encryption factor means that if anyone were to intercept your traffic, it would be unreadable.

This is particularly useful if you want access streaming sites like US Netflix, online banking sites, or any other geo-restricted content from abroad. There are a ton of free VPNs available, but beware, many use some seriously shady business tactics. Make sure to go for a VPN with strong encryption and a reputation for sticking to a no-logging policy. A couple of other decent free options are TunnelBear and Speedify. Even if you decide to pay for a VPN, you can usually find a great selection that will only set you back a few bucks per month.

Just bear in mind that these only encrypt the traffic going to and from that particular browser , not your entire device. Also, before you use such a service, be sure to check the privacy policy carefully. Many of these companies make their money by tracking user activity and selling customer profiles to advertisers.

A no-logs policy where no personally identifiable information is stored is preferrable. So what can you do about this?



0コメント

  • 1000 / 1000