Connect with us

Blockchain

How To Encrypt Files And Documents

How to encrypt files with securedoc

With all the snoops trying to get their hands on, well, every bit of information they can, encrypting sensitive content makes perfect sense. But there are various kinds of encryption you can use to protect yourself and your data, each with its pros and cons. In this article, we will look at two types of […]

How To Encrypt Files And Documents was originally found on Blokt – Privacy, Tech, Bitcoin, Blockchain & Cryptocurrency.

Republished by Plato

Published

on

With all the snoops trying to get their hands on, well, every bit of information they can, encrypting sensitive content makes perfect sense. But there are various kinds of encryption you can use to protect yourself and your data, each with its pros and cons.

In this article, we will look at two types of encryption:

  • Disk encryption – The encryption of a Disk drive (or another storage device). To read any data on the disk, you need to know a password or a secret key.
  • Document encryption – The encryption of a complete document (or another file). To read the document, you need to know a password or a secret key.

We’ll take a quick look at how each type of encryption works, and talk about when you would want to use each type.

How To Encrypt Files With Disk Encryption?

Disk encryption works by encrypting part or all of a disk drive or other storage device. When you encrypt the entire disk, it is known as Full Disk Encryption (FDE). When only parts of the disk are encrypted, you have Encrypted Partitions on the disk.

FDE Basics

In a system using FDE, all the data on the disk is encrypted. When a user starts the system, they enter the encryption key, and the encryption software uses the key to encrypt/decrypt data on the fly.

Whenever data is read from the disk, it is decrypted before being used. Likewise, whenever data is written to disk, it is encrypted. Since the data on the disk is always encrypted, it is always inaccessible to anyone without the proper key, even if they physically take possession of the disk. And since the entire disk is encrypted, there is no way that sensitive data can find its way to an unencrypted file on the disk.

Encrypted Partition Basics

In a system using Encrypted Partitions, data automatically gets encrypted/decrypted only when it is stored on an Encrypted Partition. The user must take care to store documents and other files in the proper partitions.

The necessity to decide whether or not each file belongs on an Encrypted Partition means there is a chance that the user will make a mistake and leave sensitive data exposed. It is also possible for data stored in an Encrypted Partition to simultaneously appear in unencrypted form in a cache or swap file elsewhere on the disk.

Should I Encrypt My Disks?

In most cases, the answer is yes. You should encrypt your disks using FDE. It provides a basic level of protection with little or no performance impact once the disk is encrypted. Since the encryption is automatically applied to everything on the disk, you can’t forget to encrypt something, and the encrypted data can’t appear in an unencrypted file on the disk.

However, FDE does have some weaknesses. Perhaps most important, if the key is lost, the entire disk becomes unreadable. This makes the loss of the key much more damaging than when each document is encrypted individually with its own key. Some sort of key management system is almost mandatory to avoid eventual data loss.

Another weakness is that the system is vulnerable to hostile software while it is running. Reading and writing the encrypted disk is transparent to software once the disk is unlocked.
Finally, remember that FDE only protects files while they are stored on the encrypted disk. Sending a document to another computer by email, or even to an unencrypted disk on the same computer will leave the document unencrypted at its destination.

How to encrypt files with securedoc
How to encrypt files with SecureDoc

How To Encrypt Individual Files With Document Encryption

Document encryption (more properly file-level encryption) involves encrypting each document before it is saved. Ideally, every file will be encrypted with a unique key. This has several advantages over FDE or Encrypted Partitions.

Document encryption gives you fine control over who has access to which documents. Users only have access to the specific documents for which they have a key. On a system using FDE or Encrypted Partitions, a user with access to the disk or partition has access to every file on that disk or partition.

Encrypted documents remain encrypted when you email them or copy them to another disk. Only someone with the correct key can read an encrypted document, regardless of where it is located.

But the strength of document encryption is also a weakness. Anyone who needs to decrypt the document needs a copy of the key. Within an organization, distributing keys shouldn’t be a problem. Large companies and many small ones have Enterprise Content Management (ECM) Systems, Digital Asset Management Systems, or other tools that handle encryption and internal key distribution transparently.

But sending encrypted documents to external destinations can create a strange situation. While an encrypted document can be sent without worries, the key for decrypting it must be sent securely. Encrypting the key using PGP or some other Public-Key encryption system and the related Public Key Infrastructure (PKI) to send the key to the destination is one approach.

Pros and cons of file-level encryption
Pros and cons of file-level encryption

When Should I Encrypt My Documents And Other Files?

This is a hard one to answer. If you are in a corporate environment, this is all probably handled for you, or there are policies in place to tell you what to do.

On a personal level, you should ask yourself questions like these:

  • How good is my current network security?
  • How valuable is my data to outsiders?
  • How sensitive is the information in any particular document?
  • Is FDE sufficient, or do I need to take it further?
  • Will I be storing any sensitive documents online, sending them through email or social media, or storing them in the cloud?

While you will need to figure out an approach that is right for you, we have some general suggestions:

  • If a document contains sensitive information, and it will be leaving your computer or network, encrypt it.
  • If it is so sensitive that it could impact your career, your marriage, or your bank balance, encrypt it.
  • If you have reason to believe that you are being specifically targeted by someone or some government agency, encrypt it.
  • If it contains random information of little value or information that is already out on social media, you probably don’t need to bother encrypting it.

Beyond those suggestions, figuring out the right balance is up to you.

Increasing Your Privacy with a VPN or Tor

There is one last thing to consider before you decide on your document encryption policies. NSA documents released by Edward Snowden show that they consider anything that is encrypted to be suspicious. They can keep copies of any encrypted document as long as they like.

This reasonably raises the concern that sending an encrypted document somewhere simply paints a target on your back for the spies. While we aren’t sure whether that is true or not, there is something you can do to reduce your risks: use a VPN or Tor when sending encrypted documents anywhere.

While neither type of tool provides perfect protection, both VPNs and Tor encrypt all data passing to and from your computer. Because anyone monitoring the connection between your computer and the Internet can see only encrypted data passing back and forth, they have no way to tell you are transmitting encrypted documents as well. NordVPN is worth looking into, should you decide to start using a VPN.

Should I use disk and document encryption together?

Here is a quick summary of the main strengths and weaknesses of disk encryption (FDE) and document encryption:

FDE Document Encryption
Protects all data stored on a disk automatically Yes No
Protects data that leaves your computer or network No Yes
Result if key lost Entire disk inaccessible Specific document inaccessible
Vulnerable if an attacker has access to the computer while it is running Yes It depends on how document keys are distributed or managed.

Computer security experts recommend using disk encryption and document encryption together. By using FDE and document encryption together, you are creating a defense in depth. Using both types of encryption takes advantage of the strengths of each approach while minimizing some of their weaknesses.

An attacker would need to get past your disk encryption to even see that you have an encrypted document on the disk. Then the attacker would have to get past the document encryption to actually read any sensitive data.

Blokt is a leading independent privacy resource that maintains the highest possible professional and ethical journalistic standards.

Source: https://blokt.com/guides/how-to-encrypt-files

Blockchain

Blockchain and crypto will challenge current finance, Nigeria VP says

Republished by Plato

Published

on

Nigeria’s vice president, Yemi Osinbajo, delivered a speech at an economic summit on Friday in which he spoke positively of crypto and blockchain. 

“There is no question that blockchain technology generally, and cryptocurrencies in particular, will in the coming years, challenge traditional banking, including reserve banking, in ways that we cannot yet imagine,” Osinbajo said on Friday during the Central Bank of Nigeria, or CBN, Bankers’ Committee Economic Summit. “We need to be prepared for that seismic shift, and it may come sooner than later,” he said.

The Nigerian vice president also noted the broadness of the crypto industry, mentioning decentralized finance, or DeFi, in the mix. “Decentralized finance, using smart contracts to create financial instruments, in place of central financial intermediaries, such as banks or brokerages, is set to challenge traditional finance,” he said. 

Osinbajo’s speech, which included a number of other points, is posted on his YouTube channel. The Nigerian vice president also tweeted out a video clip highlighting of some of his crypto comments from his talk.

“The point I’m making, is that some of the exciting developments we see call for prudence and care in adopting them and these have been very well-articulated by our regulatory authorities,” he said, adding:

“But we must act with knowledge and not with fear. We must ensure that we are in a position to benefit and in a position to prevent any of the adverse side effects, or any of the possible, even criminal, acts that may arise in consequence of adopting or taking any of these options.”

The comments come in contrast to recent developments in Nigeria. Earlier in February, Nigeria forbade banking interactions with crypto exchanges, as per a ruling from its central bank. The CBN’s governor also called crypto assets illegitimate. Bitcoin recently traded at a significant premium in the region.

Source: https://cointelegraph.com/news/blockchain-and-crypto-will-challenge-current-finance-nigeria-vp-says

Continue Reading

Blockchain

‘Bitcoin could reach $1 million or $1, and may do both of those’

Republished by Plato

Published

on

While many analysts predict that either Bitcoin could increase to a million or fall to a dollar, a popular businessman and investor based in the US thinks that the asset could do both!

In a recent interview with Joe Kernen at CNBC’s Squawk Box, Internet analyst Henry Blodget of the dot com era fame said: 

Bitcoin could go to $1 million… it could also go to $1. And in fact it may do both of those

In addition, Blodget, who also served as the head of the global Internet research team at Merrill Lynch, is unconvinced about the asset’s value proposition. He claimed that Bitcoin as an inflationary hedge and the narrative surrounding its value as ‘digital gold’ were “stories”. He further added: 

But the stories that we tell about why relative to the value of gold or other currencies, they’re ludicrous.

In his opinion, Bitcoin can trade just about anywhere because it does not have any fundamental backing. He said that unlike traditional stocks, “which usually does have some relationship ultimately to a fundamental,” of a company, “Bitcoin doesn’t, so that means it can trade anywhere.”

The entrepreneur thinks that crypto exchange Gemini’s CEO Tyler Winklevoss could eventually be “exactly right,” in his forecast that the asset could surge to a million. However, Blodget said:

If people were to decide that for the next couple of hundred years Bitcoin is where you park your money when you take it out of the fiat system, OK, it’s possible.

Interestingly, while crypto Twitter and Bitcoin enthusiasts, in particular, called out the analyst’s criticism, they commended the interviewer’s counter-argument. CNBC’s Joe Kernen seemed to even “speak the language” of the crypto space as one twitter user named @HodlBells noted:  


Sign Up For Our Newsletter


Source: https://ambcrypto.com/bitcoin-could-reach-1-million-or-1-and-may-do-both-of-those

Continue Reading

Blockchain

Crypto platform NetCents to offer users access to DeFi protocols thru Vesto

Republished by Plato

Published

on

NetCents, a cryptocurrency payments company, today announced it has signed an agreement with Vesto.io to pave the way for DeFi access in the NetCents platform.

Vesto, is a San Francisco-based company that has created a platform allowing users to choose from multiple DeFi protocols in a virtual supermarket. NetCents (with regulatory approval) intends on enabling a portal to the Vesto infrastructure from the NetCents wallet in order to facilitate user’s adoption of DeFi investing in an efficient and easy-to-understand interface.

“We have seen the DeFi space explode over the past year, but for it to reach the next level – the tools and the process has to be attainable by the novice crypto investor. We will be adding a layer of simplification to the process so that individuals can have their savings actually working for them without the complexity of the current platforms. Individuals have the right to lend their money at market-based rates instead of getting 1% interest on their savings that the commercial banks are offering.”
– Clayton Moore, NetCents Founder & CEO

LOI

The Letter of Intent  (LOI) contemplates a Joint Venture between parties and an option for NetCents to invest in Vesto and hold a significant ownership stake in the company at a future date.

Management of NetCents also informed investors that many of the concepts embraced by these DeFi platforms have not been vetted by the many authorities that regulate financial products. NetCents intends to work together with regulators to navigate this landscape and resolve it with a compliant product.

For Example: Fintech businesses seeking to bring a novel product or service to the market can seek regulatory relief through regulatory sandboxes such as the Ontario Securities Commission’s LaunchPad or the British Columbia Securities Commission’s SandBox.

Furthermore, businesses that distribute, trade, or advise in crypto assets that are securities are required to comply with securities laws (in particular, registration and prospectus requirements), which can be onerous. There are many exemptions for specific types of distributions, trades, and other activities and NetCents intends to research these exemptions rigorously. These exemptions, at a high level, may limit the types of investors that can participate or the investment amounts, or may require the preparation of disclosures to investors and filing of a disclosure document.

Source: https://www.cryptoninjas.net/2021/02/27/crypto-platform-netcents-to-offer-users-access-to-defi-protocols-thru-vesto/

Continue Reading
Blockchain4 days ago

Ankr adds Eth2 futures (fETH) to its staking system

Blockchain4 days ago

Peter Schiff Now Discusses Bitcoin More Often Than His Beloved Gold

Blockchain4 days ago

Long Blockchain Corp has officially been delisted by SEC

Blockchain5 days ago

DeFi Protocol Primitive Finance Self Hacks to Prevent Exploit

Blockchain4 days ago

NFT Platform Ethernity to Launch IDO on Polkastarter

Blockchain1 day ago

NextGen Blockchain Platforms Self-Organize to Win Government Contracts

Blockchain4 days ago

Bitcoin falls to $45K in sequel to 20% BTC price crash

Blockchain4 days ago

New report predicts NFTs will explode in popularity during 2021

Blockchain3 days ago

Optimized Ethereum Mining Settings for Nvidia RTX 3060 Ti, RTX 3070, RTX 3080 and RTX 3090 GPUs

Blockchain4 days ago

Kraken users demand refunds over flash-crash liquidations

Blockchain4 days ago

Elon Musk Reacts to Tesla Losing $15 Billion After Investing in Bitcoin

Blockchain5 days ago

Bitcoin Cash, Dogecoin, Monero Price Analysis: 22 February

Blockchain4 days ago

MoneyGram suspends Ripple partnership, citing SEC lawsuit

Blockchain5 days ago

Bitcoin Price Analysis: 22 February

Blockchain5 days ago

XRP Price Analysis: 22 February

Blockchain4 days ago

$24 million lost in second-largest day of DeFi liquidations

Blockchain1 day ago

Gemini collaborates with The Giving Block and others, adds donations option

Blockchain5 days ago

Leading DeFi Projects to Follow in 2021

Blockchain5 days ago

Charted: Ripple (XRP) Rallies 20%, Why Dips Could Be Attractive

Blockchain5 days ago

Ethereum, Ontology, BitTorrent Price Analysis: 22 February

Trending