![]() What you care is that they can’t see the actual data… and most programs are just fine for scrambling that. With a tool like VeraCrypt, you can easily encrypt partitions or create files that may be. Do you really care if someone knows how many files and what the file size or last mod date is? Probably not, there’s not much they can do with that data. You can check it out for yourself by downloading and using Cryptomator. So, Cryptomator would actually be just as vulnerable to the problem you stated as Veracrypt. They have fingerprinting programs that can make a reasonable guess what you have encrypted in a folder just by number of files, file sizes, MAC times, etc… But if you have a collection of random docs and spreadsheets that you made (and are thus unique). The only difference is that Veracrypt puts everything into a single file, while Cryptomator encrypts the files individually. If you are trying to hide a collection of illegal MP3s from the RIAA or movies from the MPAA then indeed this might be a concern. ![]() They just blindly follow what someone else said on a forum somewhere because it sounded smart (without really digesting the info to know if it was indeed even relevant to their situation). Maybe people say that Volume based are better because they don’t let the attacker know about the size of files or how many, etc… But most people out there aren’t really informed of the risks vs benefits. Often the argument comes down to: How much metadata about your file are you willing to leak for convenience.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |