Best free disk/file encryption with no backdoors?

Discussion in 'privacy technology' started by The Count, Aug 14, 2016.

  1. The Count

    The Count Registered Member

    Joined:
    Jun 13, 2016
    Posts:
    38
    Location:
    France
    What is the best free disk/file encryption with no back doors? Government subpoena resilient. And your reasons?Would open source product necessarily be better? Your views?

    Thanks in advance.
     
  2. amarildojr

    amarildojr Registered Member

    Joined:
    Aug 8, 2013
    Posts:
    1,963
    Location:
    Brasil
    For which OS? If it's for Windows 7 and 8 there's TrueCrypt 7.1a which has been verified to be free of backdoors. There's also DiskCryptor which is GPL licensed, and VeraCrypt, but neither of these have been audited yet so there's no real guarantee they're free of backdoors. I don't know if TrueCrypt works on Windows 10 with MBR, but it definitely won't work with GPT.

    I use VeraCrypt for Windows 10, and LUKS/Cryptsetup for Linux (already built-in).
     
  3. The Count

    The Count Registered Member

    Joined:
    Jun 13, 2016
    Posts:
    38
    Location:
    France
    For now I need it for Windows 8.1 but for later Linux. Two OS on one
    laptop. I also need to secure my usb sticks and individual files on HD.

    Thanks in advance.
     
  4. mirimir

    mirimir Registered Member

    Joined:
    Oct 1, 2011
    Posts:
    6,028
    In Linux, use LUKS. But if you're dual booting, getting TrueCrypt or VeraCrypt to play nice with LUKS is not so easy. Maybe Palancar will chime in :)
     
  5. Palancar

    Palancar Registered Member

    Joined:
    Oct 26, 2011
    Posts:
    1,591
    Chiming in ---- LOL!

    Both TC and VC play very nice with Linux. Since I am using a Linux OS obviously the applications for me (TC and VC) are archival not system disk. For my linux system disks its is LVM on LUKS.

    Opinions may vary but I have looked through as much code as I can, and that is significant on these software products. I prefer to abandon LUKS for my encrypted archives for security accordingly: In my case I commonly store extensive archives off premises to protect against fire, theft, and ultimately adversary acquisition of my data. TC or VC allow for a superb construction of a solid decoy volume, which offsets my risks should an archive end up in the wrong hands. Since I don't own the premises where archives are stored this allows me to be comfortable knowing that any pressure to an "associate" storing this data for me can be eliminated by opening the shell volume. I am masterful at constructing a volume that appears beyond super sensitive. The hidden and true sensitive data will never be discovered unless I make a serious operator error. I would like to think I am beyond those at this point of my software development. [crossed fingers]

    In the strict sense of the word all three encryption models listed in the thread so far appear to be unbreakable if applied correctly. Attacks have been made on all three and they are proven to withstand adversarial assault.

    I would be remiss if I didn't mention a reminder note that YOU the user must be aware of the OS you are using while handling any encryption sofware. If your adversary has access to the OS used while handling those archives the security is all but useless. Examine full encryption of the OS if the encrypted archives and the OS are on the same premises. My .02
     
Loading...