Blockchain
How To Encrypt Files And Documents

With all the snoops trying to get their hands on, well, every bit of information they can, encrypting sensitive content makes perfect sense. But there are various kinds of encryption you can use to protect yourself and your data, each with its pros and cons. In this article, we will look at two types of […]
How To Encrypt Files And Documents was originally found on Blokt – Privacy, Tech, Bitcoin, Blockchain & Cryptocurrency.
With all the snoops trying to get their hands on, well, every bit of information they can, encrypting sensitive content makes perfect sense. But there are various kinds of encryption you can use to protect yourself and your data, each with its pros and cons.
In this article, we will look at two types of encryption:
- Disk encryption – The encryption of a Disk drive (or another storage device). To read any data on the disk, you need to know a password or a secret key.
- Document encryption – The encryption of a complete document (or another file). To read the document, you need to know a password or a secret key.
We’ll take a quick look at how each type of encryption works, and talk about when you would want to use each type.
How To Encrypt Files With Disk Encryption?
Disk encryption works by encrypting part or all of a disk drive or other storage device. When you encrypt the entire disk, it is known as Full Disk Encryption (FDE). When only parts of the disk are encrypted, you have Encrypted Partitions on the disk.
FDE Basics
In a system using FDE, all the data on the disk is encrypted. When a user starts the system, they enter the encryption key, and the encryption software uses the key to encrypt/decrypt data on the fly.
Whenever data is read from the disk, it is decrypted before being used. Likewise, whenever data is written to disk, it is encrypted. Since the data on the disk is always encrypted, it is always inaccessible to anyone without the proper key, even if they physically take possession of the disk. And since the entire disk is encrypted, there is no way that sensitive data can find its way to an unencrypted file on the disk.
Encrypted Partition Basics
In a system using Encrypted Partitions, data automatically gets encrypted/decrypted only when it is stored on an Encrypted Partition. The user must take care to store documents and other files in the proper partitions.
The necessity to decide whether or not each file belongs on an Encrypted Partition means there is a chance that the user will make a mistake and leave sensitive data exposed. It is also possible for data stored in an Encrypted Partition to simultaneously appear in unencrypted form in a cache or swap file elsewhere on the disk.
Should I Encrypt My Disks?
In most cases, the answer is yes. You should encrypt your disks using FDE. It provides a basic level of protection with little or no performance impact once the disk is encrypted. Since the encryption is automatically applied to everything on the disk, you can’t forget to encrypt something, and the encrypted data can’t appear in an unencrypted file on the disk.
However, FDE does have some weaknesses. Perhaps most important, if the key is lost, the entire disk becomes unreadable. This makes the loss of the key much more damaging than when each document is encrypted individually with its own key. Some sort of key management system is almost mandatory to avoid eventual data loss.
Another weakness is that the system is vulnerable to hostile software while it is running. Reading and writing the encrypted disk is transparent to software once the disk is unlocked.
Finally, remember that FDE only protects files while they are stored on the encrypted disk. Sending a document to another computer by email, or even to an unencrypted disk on the same computer will leave the document unencrypted at its destination.

How To Encrypt Individual Files With Document Encryption
Document encryption (more properly file-level encryption) involves encrypting each document before it is saved. Ideally, every file will be encrypted with a unique key. This has several advantages over FDE or Encrypted Partitions.
Document encryption gives you fine control over who has access to which documents. Users only have access to the specific documents for which they have a key. On a system using FDE or Encrypted Partitions, a user with access to the disk or partition has access to every file on that disk or partition.
Encrypted documents remain encrypted when you email them or copy them to another disk. Only someone with the correct key can read an encrypted document, regardless of where it is located.
But the strength of document encryption is also a weakness. Anyone who needs to decrypt the document needs a copy of the key. Within an organization, distributing keys shouldn’t be a problem. Large companies and many small ones have Enterprise Content Management (ECM) Systems, Digital Asset Management Systems, or other tools that handle encryption and internal key distribution transparently.
But sending encrypted documents to external destinations can create a strange situation. While an encrypted document can be sent without worries, the key for decrypting it must be sent securely. Encrypting the key using PGP or some other Public-Key encryption system and the related Public Key Infrastructure (PKI) to send the key to the destination is one approach.

When Should I Encrypt My Documents And Other Files?
This is a hard one to answer. If you are in a corporate environment, this is all probably handled for you, or there are policies in place to tell you what to do.
On a personal level, you should ask yourself questions like these:
- How good is my current network security?
- How valuable is my data to outsiders?
- How sensitive is the information in any particular document?
- Is FDE sufficient, or do I need to take it further?
- Will I be storing any sensitive documents online, sending them through email or social media, or storing them in the cloud?
While you will need to figure out an approach that is right for you, we have some general suggestions:
- If a document contains sensitive information, and it will be leaving your computer or network, encrypt it.
- If it is so sensitive that it could impact your career, your marriage, or your bank balance, encrypt it.
- If you have reason to believe that you are being specifically targeted by someone or some government agency, encrypt it.
- If it contains random information of little value or information that is already out on social media, you probably don’t need to bother encrypting it.
Beyond those suggestions, figuring out the right balance is up to you.
Increasing Your Privacy with a VPN or Tor
There is one last thing to consider before you decide on your document encryption policies. NSA documents released by Edward Snowden show that they consider anything that is encrypted to be suspicious. They can keep copies of any encrypted document as long as they like.
This reasonably raises the concern that sending an encrypted document somewhere simply paints a target on your back for the spies. While we aren’t sure whether that is true or not, there is something you can do to reduce your risks: use a VPN or Tor when sending encrypted documents anywhere.
While neither type of tool provides perfect protection, both VPNs and Tor encrypt all data passing to and from your computer. Because anyone monitoring the connection between your computer and the Internet can see only encrypted data passing back and forth, they have no way to tell you are transmitting encrypted documents as well. NordVPN is worth looking into, should you decide to start using a VPN.
Should I use disk and document encryption together?
Here is a quick summary of the main strengths and weaknesses of disk encryption (FDE) and document encryption:
FDE | Document Encryption | |
Protects all data stored on a disk automatically | Yes | No |
Protects data that leaves your computer or network | No | Yes |
Result if key lost | Entire disk inaccessible | Specific document inaccessible |
Vulnerable if an attacker has access to the computer while it is running | Yes | It depends on how document keys are distributed or managed. |
Computer security experts recommend using disk encryption and document encryption together. By using FDE and document encryption together, you are creating a defense in depth. Using both types of encryption takes advantage of the strengths of each approach while minimizing some of their weaknesses.
An attacker would need to get past your disk encryption to even see that you have an encrypted document on the disk. Then the attacker would have to get past the document encryption to actually read any sensitive data.
Blockchain
Blockchain and crypto will challenge current finance, Nigeria VP says


Nigeria’s vice president, Yemi Osinbajo, delivered a speech at an economic summit on Friday in which he spoke positively of crypto and blockchain.
“There is no question that blockchain technology generally, and cryptocurrencies in particular, will in the coming years, challenge traditional banking, including reserve banking, in ways that we cannot yet imagine,” Osinbajo said on Friday during the Central Bank of Nigeria, or CBN, Bankers’ Committee Economic Summit. “We need to be prepared for that seismic shift, and it may come sooner than later,” he said.
The Nigerian vice president also noted the broadness of the crypto industry, mentioning decentralized finance, or DeFi, in the mix. “Decentralized finance, using smart contracts to create financial instruments, in place of central financial intermediaries, such as banks or brokerages, is set to challenge traditional finance,” he said.
Osinbajo’s speech, which included a number of other points, is posted on his YouTube channel. The Nigerian vice president also tweeted out a video clip highlighting of some of his crypto comments from his talk.
“The point I’m making, is that some of the exciting developments we see call for prudence and care in adopting them and these have been very well-articulated by our regulatory authorities,” he said, adding:
“But we must act with knowledge and not with fear. We must ensure that we are in a position to benefit and in a position to prevent any of the adverse side effects, or any of the possible, even criminal, acts that may arise in consequence of adopting or taking any of these options.”
The comments come in contrast to recent developments in Nigeria. Earlier in February, Nigeria forbade banking interactions with crypto exchanges, as per a ruling from its central bank. The CBN’s governor also called crypto assets illegitimate. Bitcoin recently traded at a significant premium in the region.
Blockchain
‘Bitcoin could reach $1 million or $1, and may do both of those’


While many analysts predict that either Bitcoin could increase to a million or fall to a dollar, a popular businessman and investor based in the US thinks that the asset could do both!
In a recent interview with Joe Kernen at CNBC’s Squawk Box, Internet analyst Henry Blodget of the dot com era fame said:
Bitcoin could go to $1 million… it could also go to $1. And in fact it may do both of those
In addition, Blodget, who also served as the head of the global Internet research team at Merrill Lynch, is unconvinced about the asset’s value proposition. He claimed that Bitcoin as an inflationary hedge and the narrative surrounding its value as ‘digital gold’ were “stories”. He further added:
But the stories that we tell about why relative to the value of gold or other currencies, they’re ludicrous.
In his opinion, Bitcoin can trade just about anywhere because it does not have any fundamental backing. He said that unlike traditional stocks, “which usually does have some relationship ultimately to a fundamental,” of a company, “Bitcoin doesn’t, so that means it can trade anywhere.”
The entrepreneur thinks that crypto exchange Gemini’s CEO Tyler Winklevoss could eventually be “exactly right,” in his forecast that the asset could surge to a million. However, Blodget said:
If people were to decide that for the next couple of hundred years Bitcoin is where you park your money when you take it out of the fiat system, OK, it’s possible.
Interestingly, while crypto Twitter and Bitcoin enthusiasts, in particular, called out the analyst’s criticism, they commended the interviewer’s counter-argument. CNBC’s Joe Kernen seemed to even “speak the language” of the crypto space as one twitter user named @HodlBells noted:
@JoeSquawk I didn’t think you understood the value prop of bitcoin. You do! You’re way ahead of the bulk of your generation. Particularly those who have profited the most off the petro-dollar. Look forward to you speaking their language and translating the future for them! Thx!
— Hodl Bells (@HodlBells) February 26, 2021
Source: https://ambcrypto.com/bitcoin-could-reach-1-million-or-1-and-may-do-both-of-those
Blockchain
Crypto platform NetCents to offer users access to DeFi protocols thru Vesto


NetCents, a cryptocurrency payments company, today announced it has signed an agreement with Vesto.io to pave the way for DeFi access in the NetCents platform.
Vesto, is a San Francisco-based company that has created a platform allowing users to choose from multiple DeFi protocols in a virtual supermarket. NetCents (with regulatory approval) intends on enabling a portal to the Vesto infrastructure from the NetCents wallet in order to facilitate user’s adoption of DeFi investing in an efficient and easy-to-understand interface.
“We have seen the DeFi space explode over the past year, but for it to reach the next level – the tools and the process has to be attainable by the novice crypto investor. We will be adding a layer of simplification to the process so that individuals can have their savings actually working for them without the complexity of the current platforms. Individuals have the right to lend their money at market-based rates instead of getting 1% interest on their savings that the commercial banks are offering.”
– Clayton Moore, NetCents Founder & CEO
LOI
The Letter of Intent (LOI) contemplates a Joint Venture between parties and an option for NetCents to invest in Vesto and hold a significant ownership stake in the company at a future date.
Management of NetCents also informed investors that many of the concepts embraced by these DeFi platforms have not been vetted by the many authorities that regulate financial products. NetCents intends to work together with regulators to navigate this landscape and resolve it with a compliant product.
For Example: Fintech businesses seeking to bring a novel product or service to the market can seek regulatory relief through regulatory sandboxes such as the Ontario Securities Commission’s LaunchPad or the British Columbia Securities Commission’s SandBox.
Furthermore, businesses that distribute, trade, or advise in crypto assets that are securities are required to comply with securities laws (in particular, registration and prospectus requirements), which can be onerous. There are many exemptions for specific types of distributions, trades, and other activities and NetCents intends to research these exemptions rigorously. These exemptions, at a high level, may limit the types of investors that can participate or the investment amounts, or may require the preparation of disclosures to investors and filing of a disclosure document.
-
Blockchain4 days ago
Ankr adds Eth2 futures (fETH) to its staking system
-
Blockchain1 week ago
Motley Fool adding $5M in Bitcoin to its ‘10X portfolio’ — Has a $500K price target
-
Blockchain1 week ago
The Graph adds support for Polkadot, NEAR, Solana and Celo
-
Blockchain5 days ago
Ripple now registered as a Wyoming business
-
Blockchain5 days ago
Former BoE, BoC Governor Mark Carney joins Stripe board of directors
-
Blockchain4 days ago
Peter Schiff Now Discusses Bitcoin More Often Than His Beloved Gold
-
Blockchain1 week ago
Corporate FOMO
-
Blockchain1 week ago
Nvidia Announced the CMP HX Dedicated GPUs for Professional Crypto Mining