-
-
Notifications
You must be signed in to change notification settings - Fork 207
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
Showing
25 changed files
with
196 additions
and
56 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,10 @@ | ||
title: hat.sh | ||
type: Recommendation | ||
logo: /assets/img/encryption-software/hat-sh.png | ||
logo-dark: /assets/img/encryption-software/hat-sh-dark.png | ||
description: | | ||
**Hat.sh** is a web application that provides secure client-side file encryption in your browser. It can also be selfhosted and is useful if you need to encrypt a file but cannot install any software on your device due to organizational policies. | ||
website: 'https://hat.sh' | ||
downloads: | ||
- icon: fab fa-github | ||
url: 'https://github.com/sh-dv/hat.sh' |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,16 @@ | ||
title: Kryptor | ||
type: Recommendation | ||
logo: /assets/img/encryption-software/kryptor.png | ||
description: | | ||
Kryptor is a free and open source file encryption tool that simplifies the use of [age](https://github.com/FiloSottile/age) and [minisign](https://jedisct1.github.io/minisign/). | ||
privacy_policy: '' | ||
website: 'https://www.kryptor.co.uk' | ||
downloads: | ||
- icon: fab fa-windows | ||
url: 'https://www.kryptor.co.uk' | ||
- icon: fab fa-apple | ||
url: 'https://www.kryptor.co.uk' | ||
- icon: fab fa-linux | ||
url: 'https://www.kryptor.co.uk' | ||
- icon: fab fa-github | ||
url: 'https://github.com/samuel-lucas6/Kryptor' |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,9 @@ | ||
title: Tomb | ||
type: Recommendation | ||
logo: /assets/img/encryption-software/tomb.png | ||
description: | | ||
Tomb is an is a commandline shell wrapper around LUKS. It includes uses some [third party tools](https://github.com/dyne/Tomb#how-does-it-work) to provide [steganography](https://en.wikipedia.org/wiki/Steganography). | ||
website: 'https://www.dyne.org/software/tomb' | ||
downloads: | ||
- icon: fab fa-github | ||
url: 'https://github.com/dyne/Tomb' |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,16 @@ | ||
title: VeraCrypt | ||
type: Recommendation | ||
logo: /assets/img/encryption-software/veracrypt.svg | ||
description: | | ||
**VeraCrypt** is a source-available freeware utility used for on-the-fly encryption. It can create a virtual encrypted disk within a file or encrypt a partition or the entire storage device with pre-boot authentication. VeraCrypt is a fork of the discontinued TrueCrypt project. It was initially released on June 22, 2013. According to its developers, security improvements have been implemented and issues raised by the initial TrueCrypt code audit have been addressed. | ||
privacy_policy: '' | ||
website: 'https://veracrypt.fr' | ||
downloads: | ||
- icon: fab fa-windows | ||
url: 'https://www.veracrypt.fr/en/Downloads.html' | ||
- icon: fab fa-apple | ||
url: 'https://www.veracrypt.fr/en/Downloads.html' | ||
- icon: fab fa-linux | ||
url: 'https://www.veracrypt.fr/en/Downloads.html' | ||
- icon: fab fa-github | ||
url: 'https://www.veracrypt.fr/code' |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,26 @@ | ||
title: GNU Privacy Guard | ||
type: Recommendation | ||
logo: /assets/img/encryption-software/gnupg.svg | ||
description: | | ||
**GnuPG** is a GPL-licensed alternative to the PGP suite of cryptographic software. GnuPG is compliant with RFC 4880, which is the current IETF standards track specification of OpenPGP. Current versions of PGP (and Veridis' Filecrypt) are interoperable with GnuPG and other OpenPGP-compliant systems. GnuPG is a part of the Free Software Foundation's GNU software project, and has received major funding from the German government. | ||
privacy_policy: 'https://gnupg.org/privacy-policy.html' | ||
website: 'https://gnupg.org' | ||
downloads: | ||
- icon: fab fa-windows | ||
url: 'https://gpg4win.org/download.html' | ||
- icon: fab fa-apple | ||
url: 'https://gpgtools.org' | ||
- icon: fab fa-linux | ||
url: 'https://gnupg.org/download/index.html#binary' | ||
- icon: fab fa-freebsd | ||
url: 'https://www.freshports.org/security/gnupg' | ||
- icon: pg-openbsd | ||
url: 'http://openports.se/security/gnupg' | ||
- icon: pg-netbsd | ||
url: 'http://pkgsrc.se/security/gnupg' | ||
- icon: fab fa-google-play | ||
url: 'https://play.google.com/store/apps/details?id=org.sufficientlysecure.keychain' | ||
- icon: pg-f-droid | ||
url: 'https://f-droid.org/app/org.sufficientlysecure.keychain' | ||
- icon: fab fa-git | ||
url: 'https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git' |
22 changes: 22 additions & 0 deletions
22
_data/software/encryption-multi-platform/3_cryptomator.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,22 @@ | ||
title: Cryptomator | ||
type: Recommendation | ||
logo: /assets/img/encryption-software/cryptomator.svg | ||
description: | | ||
**Cryptomator** makes it easy for for you to upload files ot the cloud in an virtual encrypted filesystem. The software was [audited](https://cryptomator.org/open-source/) by [cure53](https://cryptomator.org/audits/2017-11-27%20crypto%20cure53.pdf). | ||
privacy_policy: 'https://cryptomator.org/privacy' | ||
website: 'https://cryptomator.org' | ||
downloads: | ||
- icon: fab fa-windows | ||
url: 'https://cryptomator.org/downloads/' | ||
- icon: fab fa-apple | ||
url: 'https://cryptomator.org/downloads/' | ||
- icon: fab fa-linux | ||
url: 'https://cryptomator.org/downloads/' | ||
- icon: fab fa-google-play | ||
url: 'https://play.google.com/store/apps/details?id=org.cryptomator' | ||
- icon: fab fa-app-store-ios | ||
url: 'https://apps.apple.com/us/app/cryptomator-2/id1560822163' | ||
- icon: fab fa-android | ||
url: 'https://cryptomator.org/android' | ||
- icon: fab fa-github | ||
url: 'https://github.com/cryptomator' |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,6 @@ | ||
title: Bitlocker | ||
type: Recommendation | ||
logo: /assets/img/encryption-software/bitlocker.png | ||
description: | | ||
Bitlocker is the default full volume encryption that comes with Microsoft Windows. Over the years there has been development since it was released in 2007. The main reason we recommend it is because of it's use of TPM. For more information about that see [Understanding BitLocker TPM Protection](https://blog.elcomsoft.com/2021/01/understanding-bitlocker-tpm-protection/) | ||
website: 'https://docs.microsoft.com/en-us/windows/security/information-protection/bitlocker/bitlocker-overview' |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,6 @@ | ||
title: Filevault | ||
type: Recommendation | ||
logo: /assets/img/encryption-software/filevault.png | ||
description: | | ||
**Filevault** is the on-the-fly disk encryption that comes with MacOS. The reason we recommend it, is because it tightly intergrates with the [Apple T2 Security Chip](https://support.apple.com/guide/security/volume-encryption-with-filevault-sec4c6dc1b6e/1/web/1). | ||
website: 'https://support.apple.com/en-us/HT204837' |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,30 @@ | ||
title: Linux Unified Key Setup (LUKS) | ||
type: Recommendation | ||
logo: /assets/img/encryption-software/luks.png | ||
description: | | ||
LUKS is the default full disk encryption method for Linux. It can be used to encrypt full volumes, partitions or create encrypted containers. | ||
## Creating encrypted containers | ||
<pre class=terminal> | ||
dd if=/dev/urandom of=/path-to-file bs=1M count=1024 status=progress | ||
sudo cryptsetup luksFormat /path-to-file | ||
</pre> | ||
## Opening encrypted containers | ||
We recommend opening containers and volumes with `udisksctl` as this uses [Polkit](https://en.wikipedia.org/wiki/Polkit). Most file managers, such as those included with popular desktop environments can now unlock encrypted files. Tools like [udiskie](https://github.com/coldfix/udiskie) can run in the system tray and provide a helpful user interface. | ||
<pre class=terminal> | ||
udisksctl loop-setup -f /path-to-file | ||
udisksctl unlock -b /dev/loop0 | ||
</pre> | ||
## Backup of volume headers | ||
We recommend you always [backup your LUKS headers](https://wiki.archlinux.org/title/Dm-crypt/Device_encryption#Backup_and_restore) in case of partial drive failure. This can be done with: | ||
<pre class=terminal> | ||
cryptsetup luksHeaderBackup /dev/device --header-backup-file /mnt/backup/file.img | ||
</pre> | ||
website: 'https://gitlab.com/cryptsetup/cryptsetup' | ||
downloads: | ||
- icon: fab fa-gitlab | ||
url: 'https://gitlab.com/cryptsetup/cryptsetup' |
This file was deleted.
Oops, something went wrong.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
File renamed without changes
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
File renamed without changes
File renamed without changes
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,50 @@ | ||
--- | ||
layout: evergreen | ||
title: Cloud Storage | ||
description: | | ||
Encryption of data is the only way to control who can access it. If you are currently not using encryption software for your hard disk, emails, or file archives, you should pick one here. | ||
--- | ||
|
||
## Multi platform | ||
The options listed here are multi platform and great for creating encrypted backups of your data. | ||
|
||
{% for item_hash in site.data.software.encryption-multi-platform %} | ||
{% assign item = item_hash[1] %} | ||
|
||
{% if item.type == "Recommendation" %} | ||
{% include recommendation-card.html %} | ||
{% endif %} | ||
{% endfor %} | ||
|
||
## Operating system Full Disk Encryption (FDE) | ||
Modern operating systems often include [disk encryption](https://en.wikipedia.org/wiki/Disk_encryption) and will of a [secure cryptoprocessor](https://en.wikipedia.org/wiki/Secure_cryptoprocessor) such as [Trusted Platform Module (TPM)](https://docs.microsoft.com/en-us/windows/security/information-protection/tpm/how-windows-uses-the-tpm) or [Secure Enclave](https://support.apple.com/guide/security/volume-encryption-with-filevault-sec4c6dc1b6e/1/web/1) | ||
|
||
{% for item_hash in site.data.software.encryption-operating-system %} | ||
{% assign item = item_hash[1] %} | ||
|
||
{% if item.type == "Recommendation" %} | ||
{% include recommendation-card.html %} | ||
{% endif %} | ||
{% endfor %} | ||
|
||
## Browser-based | ||
Web based encryption can be useful when you need to encrypt a file, and you cannot install software or apps on your device. | ||
|
||
{% for item_hash in site.data.software.encryption-browser-based %} | ||
{% assign item = item_hash[1] %} | ||
|
||
{% if item.type == "Recommendation" %} | ||
{% include recommendation-card.html %} | ||
{% endif %} | ||
{% endfor %} | ||
|
||
## Command-line | ||
Tools with commandline interfaces are useful for intergrating [shell scripts](https://en.wikipedia.org/wiki/Shell_script). | ||
|
||
{% for item_hash in site.data.software.encryption-commandline %} | ||
{% assign item = item_hash[1] %} | ||
|
||
{% if item.type == "Recommendation" %} | ||
{% include recommendation-card.html %} | ||
{% endif %} | ||
{% endfor %} |
This file was deleted.
Oops, something went wrong.