Boxcryptor - data encryption for shady services. How to encrypt data on a PC, mobile device in the dark Encrypting files in the dark

Golovna / I'll build a cleaning

During the rest of the hour, all employees become mobile, freelancers become essential, and companies move to distant working places. In our minds, the accessibility of these data is as important as ever, if it’s always possible, and if I’ll build it (both stationary and mobile). At the same time, the grown-up will drink on the gloomy services of saving data, like from the side of the okremy koristuvachiv, and the companies.

Vikoristannya gloomy collections allow you to publish your files, edit them and share them with friends and colleagues. For additional services of gloomy collections, you can not only save the files themselves, but also the history of their changes, as well as synchronize data on your attachments.

In the midst of a growing interest to gloomy gatherings, blame and need from the defenders of data, which are saved from the gloomy. Active providers of dark services provide the ability to backup and encrypt data independent services, which will secure the protection of data for the hour of their accommodation at the gloomy shovischi. Just about one of these services, which supports the majority of providers in gloomy collections, - the Boxcryptor service - we rozpovimo in this article. This service is provided by the German company Secomba GmbH (Werner-von-Siemens-Str. 6, 86159 Augsburg).

System Widgets Boxcryptor

The Boxcryptor service provides a binaries representation in the following formats:

  • Plugin for Google browser Chrome.
  • Portable version.
  • The version that will require local installation.

The article looks at the version, which will require local installation. Service supporting larynx on the next platforms:

  • Windows XP SP3 is even better (because of the .NET Framework 4.0).
  • macOS X 10.7.5 is even better.
  • iOS 7 and above (iPhone/iPad/iPod).
  • Android 4.0.3 is better.
  • Windows phone.
  • Windows RT.
  • Blackberry 10.

For the interchange of the local version of the service with the gloomy treasures, the presence is required:

  • Cloud records of a koristuvach for gloomy treasures, it is planned to trim the encrypted versions of files.
  • Vіlnogo mіstsya at the local shovishchі in the volume, scho vіdpovidaє obsyagu files, placements at the gloomy shovіshі and pіdlyagayut ciphering. On the whole, free place on the local disk can be balanced with obsyagom mіstsya, which hopes for gloomy treasures, for example:
    • Yandex.Disk over 10GB;
    • Dropbox - 2GB
    • Google Drive - 15GB;
    • Box - 10GB;
    • OneDrive - 15GB;
    • Amazon S3 - 5GB
    • CloudMe - 3GB;
    • iCloud Drive- 5GB;
    • Telekom - 25GB etc.

Functionality

Warehouse available functionality the service should be deposited according to the type of bathhouse (license).

table1 . FunctionalityBoxcryptor deposit type prepayment

Functionality Short description Availability at the warehouse prepayment
FreeUnlimited PersonalUnlimited Businesscompany package
Alternative encryption algorithms AES-256 and RSAEncryption in place of files, placement in a gloomy shovishchiSoSoSoSo
Safe accessGiving third party access to their encrypted filesSoSoSoSo
Support for mobile supplementsPossibility of spitting out programs on mobile attachmentsSoSoSoSo
Filename encryptionMasking the name of the file that is located in the gloomy collectionHiSoSoSo
Support of the uncircumcised set of gloomy platformsPossibility of defending data not on one, but on a kіlkoh gloomy gossip HiSoSoSo
Water supplyPossibility of roaring the service more low on two annexesHiSoSoSo
Technical supportAvailability of non-fenced technical support from the side of the pickerHiSoSoSo
Creation of groups of koristuvachivsPossibility of sharing files with the group for further exchange of files with the group as a wholeHiHiSoSo
Commercial victoriaPossibility of choosing a service for corporate purposesHiHiSoSo
Personal whistleblowerPossibility of victoriousness is less than one shorthandSoSoSoHi
Vikoristannya pripiski more nizh one koristuvachPossibility to add an unrestricted number of koristuvachiv for winning one subscription (license).HiHiHiSo
master keyPossibility of decrypting files in the company, available to її spіvrobіtnik, without knowing their passwordsHiHiHiSo
Discounting passwords for correspondent companiesThe ability to drop data and change the passwords of the company's encrypted files, which are broken during encryption, without losing access to data in the company's encrypted filesHiHiHiSo
Pidtrimka Active Directory Synchronization of Boxcryptor's files with boxes from the company's Active DirectoryHiHiHiSo
Appointed politicianCreation of a security policy, with a method of security for internal and external passwords (password double, encryption of file names only)HiHiHiSo
Keruvannya with coristuvachi and outbuildingsCentralized management of koristuvachami and configuration parametersHiHiHiSo
AuditWatch out for the behavior of koristuvachs with the method of revealing suspected ills of safety (uncharacteristic for a koristuvach, try the entrance, disrupting the established policies too soon) and reacting to themHiHiHiSo
Two-factor authenticationStopping 2-Factor Authentication of Correspondents for a Helping Duo Security SolutionHiHiHiSo

Overpayment options on Boxcryptor

The prepayment options on Boxcryptor are as follows:

  • Free - no cost.
  • Unlimited Personal - 36€ ($48) per river.
  • Unlimited Business - 72 € ($ 96) per river.
  • Company Package:
    • 8 € for one koristuvach for a month - with a bill for 1 river.
    • 6.4 € for one koristuvach for a month - if you pay for 3 nights.

On full prepayment special victoria(Unlimited Personal) the scribe gives a discount for students at a rate of 25%.

Subscriptions "Free", "Unlimited Personal" and "Unlimited Business" are recognized only for one subscriber:

  • Free and Unlimited Personal - zastosuvannya only for special purposes (protection of special information) with only one koristuvach. Tsі subscriptions are recognized for okremyh physical osіb;
  • Unlimited Business - zastosuvannya not only for the protection of special, but also for corporate information, but again, I'm still only one shorty. Tsya overpayment is oriented, as a rule, for practical legal entities or for individual entrepreneurs. I’ll just look at those who have their own subscription (license) for the skin specialist.

On the basis of personal subscriptions, the "Company Package" subscription allows for one license to add an unrestricted number of coristuvachs.

Robot with Boxcryptor

Installing the desktop version of the Boxcryptor service

The service is easy to use, especially for the stock of functions, which are available as part of the Free and Unlimited Personal prepayment types. Although the same two types can be the most popular among Russian coristuvachi. In order to speed up the promotional functions, it is necessary to purchase a distribution kit for the specific platform from the site of the builder.

Within the framework of this article, the robot service was reviewed on the distribution kit for the widest Russian platforms: Microsoft Windows that Android. At the time of preparation of the material, the version of Boxcryptor 2.3 is available on the compiler's website for the Microsoft Windows operating system, and version 2.1 for Android (as well as Beta version 2.49.559). For other platforms, the warehouse of functions is similar. report description The function of the service for the skin platform was introduced by the virobnik on its website in the official helpers of the koristuvach.

When installing the product, you are prompted to recognize and accept For licensed pleasure”, which fits between the Secomba GmbH and the final koristuvach, as well as the “Policy for the protection of data”.

After installation, the launch will need to go through authentication, for the presence of a physical record by Boxcryptor, or create such a physical record.

baby1 . Registration for the desktop versionBoxcryptor onWindows

When you create a public record (profile), you will be informed about those that you need to remember the password, otherwise access to all encrypted files will be lost. Having waited for a while and accepted the vin confirmation about saving the password, you can continue the registration.

Immediately within the framework of the creation of the profile, it will be necessary to select the type of subscription (license).

baby2 . Select subscription type for desktop versionBoxcryptor onWindows

You can select only three types, the fourth and the most recent type of Company Package subscription available for selection only on the site (it also requires a profile for this type). Virobniks offer a choice of subscriptions for the "Company Package" and "Unlimited Business" types of upcoming trial periods:

  • Company Package – a trial period of 30 days to familiarize yourself with the functionality.
  • Unlimited Business - cost-free testing for 1 day.

Activation of these capabilities is only available through a web interface from the Boxcryptor public record.

If you have selected a subscription type Unlimited Personal or Unlimited Business, the browser will launch and the payment page will be displayed.

After that, as all the procedures for choosing and paying for the fee, the service itself starts.

For the version installed on smartphones with operating system Android system, you will also need to go through authentication.

baby3 . Authentication inBoxcryptor onAndroid

On first run:

  • At the bottom right corner of the screen in the field of information, there is a special icon.
  • "Pidruchnik" for work with the service is called.
  • The service automatically creates a search for gloomy treasuries connected with the outbuilding, which, at the time of the day, shows up in the window with the installations.
  • "Providnik" has creations virtual disk, which is used to encrypt files and synchronize them with dark files.

baby4 . First launch of the desktop versionBoxcryptor onWindows

If Windows is already connected, be it a gloomy thing, it will show up in the Boxcryptor Explorer in the virtual disk area.

baby5 . Virtual disk capacityBoxcryptor in the desktop version onWindows

Further on, the encryption of the decryption of files (directories) is created within the framework of the Boxryptor virtual disk with gloomy folders (for example, Dropbox).

The first launch on an add-on with the Android operating system will also mean a bad thing, as you can match with Boxcryptor.

baby6 . First launchBoxcryptor onAndroid

Setting up Boxcryptor

To configure the parameters of the service, it is necessary to select the main item (“Setup”) from the context menu, as it clicks on the end in the alert area (div. baby 4). All the main extensions and settings are displayed within the main tabs of the "Boxcryptor Settings" window.

baby7 . Desktop version upgradeBoxcryptor onWindows

The designation of local directories, which are victorious for saving important information, which is used for encryption for the help of Boxcryptor, is victorious against the onslaught of "Add" on the tab "Roztashuvannya" and the offensive choice of the catalog to click.

In order to attach a gloomy treasure, indicated on the “Roztashuvannya” tab, to Boxcryptor, simply press the word “Send” and fill in the required configuration forms.

baby8 . Binding of a gloomy treasure in the desktop versionBoxcryptor onWindows

As a result, adding the local directory and linking the gloomy collection to the list will show up in the list.

baby9 . Catalog of that gloomy treasure, connected to the desktop versionBoxcryptor onWindows

The parameters of the oblique record, for which the overpayment for the service is fixed, can be adjusted on the "Profile" tab. Parameters that can be edited ("First Name", "Prizvische", "Email" and "Password") are marked with a symbol. In addition, this tab should:

  • Information about the type of prepayment.
  • The possibility of generating a master key, which is necessary for updating access to the company's encrypted data from, for example, a doctor's call, which is valid for data. This option is only available for the Company Package subscription.
  • Possibility of exporting the keys for the security of the work with the service for the availability of hemstitching (in online mode).

baby10 . Configurable parameters of the public record in the desktop versionBoxcryptor onWindows

In order to give access to an encrypted file, which is taken from the dark, for example, colleagues in robots, it is necessary to form a group and add them to the group. However, there is one nuance: you can add to the group only quietly, which is also the short Boxcryptor (with the same type of subscription). As part of qih nalashtuvan, you can:

  • Add that include the participants in the group.
  • Leave the group.
  • Reassign (re-click) the new member of the group to the member of the group (turning the member to that context menu).

baby11 . Creation of a group in the desktop versionBoxcryptor onWindows

More precisely, you can adjust the settings for additional parameters in the configuration, the “Dodatkovo” tab. The main set of parameters allows you to change the name of the virtual disk created by the Boxcryptor service and to match it to your letter, as well as to improve the possibility of an one-hour launch of the service with the operating system, rewriting the update and encryption of file names. It is recommended to activate the encryption of file names in the file names themselves only in the case, if it is necessary in the current case, because this type of encryption affects the productivity of the system (especially when there is a large number of files). For more fine adjustment, it is necessary to select the item “More adjustment”.

baby12 . Extended customization of the desktop versionBoxcryptor onWindows

The expanded warehouses can have the following parameters enabled/disabled:

  • "Turn on the name of the cat" - vouch for the access to files and catalogs of cats, the stars of the stench can be updated.
  • "Connect yak hard drive» - When installing Boxcryptor, it creates a virtual disk for encrypting files and directories, and this option allows you to give the disk the status of a physical point of view of the system.
  • "Switch on for all correspondents" - notification for the availability/unavailability of the Boxcryptor disk to our correspondents, the appearance of the records of which are present on the working area, deactivate the service.
  • "Turn on the support of the old paths" - allows you to remove / install the exchange of the old path up to the file of 256 characters. However, it is possible to cause problems within systems that do not promote greatness.
  • “Connect with the Manager Windows Volumes- allows you to add a Boxcryptor virtual disk to Windows Volume Manager.
  • "Don't show files and folders that start from dots" - enable/disable this warehouse visible files tі, scho start from the point. Such files are formed, as a rule, by the services of gloomy collections, and in the wrong way, encryption can lead to inaccurate reports.
  • "Attach files from that folder, since their names cannot be decrypted" - this option allows you to attach those files with encrypted names, which do not have rights to their decryption.
  • "Don't show OneDrive advance" - allows you to turn on advance, which are formed when working with services of the shabby OneDrive storage, so that in this shabby storage it is possible to save files in darkness without synchronization with local storage, and the Boxcryptor file is not encrypted.
  • "Automatically assign new disks" - allows you to designate those that are connected remember your nose information about the location to come to Boxcryptor.
  • "Automatically designate partitioned disks" - allows you to designate partitioned disks as a location that will come to Boxcryptor.

Boxcryptor on Android has a more modest warehouse of configuration parameters. Automatically activated є: encryption of file names, resetting the service after three recent authentication attempts, as well as forward revision files. This function "Install PIN-code protection" - it allows you to protect the service from unauthorized access and by entering the PIN-code, in order to call the service from the moment it works in the background.

baby13 . Warehouse nalashtuvanBoxcryptor onAndroid

Having completed the service for the improvement of the needs, you can decompose this password without intermediary using the method of encryption and decryption.

Encryption and decryption of files and directories with Boxcryptor

Hot principle encryption, implementation in this service, guessing a fairy tale about Koshchiy the Immortal: the death of Koshchiy in the neck, the head in the egg, the egg in the pitching, the pitching in the hare and so on. In this service, as such, the components of the cryptographic keys appear, the skins of which are closed (encrypted) by the algorithmic encryption processes. Zagal can see a list of cryptographic entities (keys/passwords):

  • Password.
  • AES key.
  • RSA key pair:
    • Open key.
    • Lock key.

And already in the fallacy of the initiator of cryptographic transformations, AES and RSA keys are assigned for:

  • Koristuvach.
  • Companies (Groups of Koristuvachs).

The keys are formed without intermediary on the extension of the koristuvach at the hour of the creation of the oblіkovogo record of the koristuvach or the company (groups of koristuvachіv). All keys are added to the Boxcryptor server, except for the password of the koristuvach, and the stench is transmitted encrypted (with a vinnyat open key RSA).

baby14 . The fundamental principle of encryption of files, implementationsBoxcryptor

All operations for encrypting/decrypting files are no longer executed locally on the computers of the coroners, and later on the synchronization with the gloomy treasure is performed. The procedure for encrypting a file is in:

  • Formation of an individual key for a file (AES key).
  • Encryption of the file with the same key.
  • Encryption of the key to the file on the RSA key of the hardcoded key. The number of coristuvachs will be given access to the file;
  • Adding the encrypted keys to the file for the skin koristuvach at the end of the encrypted file together - this is how the file is encrypted.
  • Encryption of the private keys of the RSA koristuvach on the basis of the koristuvach's password.
  • Keeping all secrets on the Boxcryptor server.

The decryption of the file is carried out at the exit sequence, instead of replacing the RSA hard key, it is closed. However, the mustache of transformation is attached to the eyes of a koristuvach.

This service is supported by the simplicity of yogo vikoristannya for encryption and decryption. All operations are completed in one click. It is necessary for the help of "Explorer" within the framework of the virtual disk of Boxcryptor to select a file, place it in a gloomy store, click on its name in the context menu and press "encrypt" or "decrypt" (deposit for purposes). At the time of encryption, the name of the file has a green square with a lock, which means the fact that encryption has been completed.

baby15 . File encryption in desktop versionBoxcryptor onWindows

In the middle of the most gloomy collection, the file will be renamed for the help of adding the “.bc” extension. Change and old look In order to make it easier, click on the encrypted file from the context menu and select the “Show Dropbox Exit Code” item. When an encrypted file is opened, the darkness will be prompted about the need for its transformation and coding. A fragment of such a summary of testimony is below.

baby16 . Displaying an encrypted file in the desktop versionBoxcryptor onWindows tadrop box

A similar order is used to encrypt catalogs. When the directory is encrypted, the suffix “_encrypted” is added to its name, and the directory is recognized in the “Explorer” with a green square with a lock.

Another way to encrypt a file is to move/copy it to the previously encrypted directory. In this rank, the vin is automatically encrypted.

baby17 . Automatic file encryption in desktop versionBoxcryptor onWindows

As it was thought earlier, this service can encrypt it for gloomy treasures, but also for locally hosting files. Submit similar. Encrypted and external files are saved from gloomy stores, locally on the extension of the box (when protecting locally hosted files) and on the Boxcryptor virtual disk. Files are not sent to the Boxcryptor server from the same view. Reading the encrypted file from the reader can only be done within the Boxcryptor virtual disk, or after copying from that disk. At the end of the encryption area, the file will be displayed in unreadable form, with additional warnings (information about the need for this transformation and choice of coding).

At the time of the presence of the treadmill, the files can be encrypted within the Boxcryptor virtual disk, and the sync icon “” will appear on the image, and when the treadmill appears, the sync with the hackneyed files will be displayed.

Decryption is required for additional selection of the “Decrypt” item and it will be produced until the output file is finished. As soon as the decryption zastosovuєtsya to the directory, all files are automatically decrypted, which are located in the new.

baby18 . Decryption of the file in the desktop versionBoxcryptor onWindows

When vikoristanny service on outbuildings with an operating system Android encryption vikonuєtsya is also easy to finish. It is necessary within the framework of the service to go to the directory of the gloomy collection, what to click, and for the help of the button "" select the file on the extension for your entanglement in the gloom. At the moment when the service is busy, you will see notifications about the need to sign up - what can be encrypted.

baby19 . Encrypting the file inBoxcryptor onAndroid

Managing access rights to an encrypted file/directory in Boxcryptor

Access to the encrypted directory is provided through the context menu, as if it were called to the encrypted file. Access can be given to a group of koristuvachiv (additions at the stage of setting up the service) or to an okrem koristuvachiv (indicating the address of yoga email). I know the same nuance - you can give access only to those who are boxcryptor, and you can give it, obviously, to the one who has the necessary rights.

baby20 . Managing access rights to an encrypted object in the desktop versionBoxcryptor onWindows

When registering with operating system s іnshoy face record access to the Boxcryptor virtual disk will be limited. Vіdpovіdno, іnshі koristuvachіv, for vіdsutnostі vіdstіvіnі nebіdnіhі ponovazhenі, including і і vіdnіvіv і vіd nastuvannі servіsu (option "Pіdklyuchi і іkhіkh koristuvаchіv" - div. malunok 12) just don't get ahold of such a resource. In fact, on the same disk, the files are encrypted for further placement at the external site (and on the virtual disk itself, the stench is saved from the open source).

Adding an encrypted file to a person, as not to a boxcryptor

If it is necessary to transfer the encryption file to a person, if not the boxcryptor, then it is possible to achieve a clear integration of the product with the Whisply service. You can implement such a transfer by clicking on the shortcut menu item, like clicking on the encrypted file from the "Explorer".

baby21 . Secure transfer of a file encrypted in the desktop versionBoxcryptor onWindows via serviceWhisply

If the browser says a side to the Whisply service, it is related to the transfer of the file. To complete the transfer, you will need to go through the following steps:

  1. Verify the correctness of the file.
  2. Set the access parameters to the file: hour, after which the file becomes unavailable to anyone; the possibility of zdіysnennya capturing the file only once, or more often.
  3. Enter a password.
  4. Send a message for the advance (including the method of sending it: to the email address, SMS notification or copying the exchange buffer for the next payment to the addressee).
  5. Send a password (for the analogy with editing the request for downloading).

baby22 . Work with serviceWhisply to transfer a file encrypted inBoxcryptor

As a result, vikonannya tsikh krokiv oberzhuvach otrimaє ciphering the file with the possibility of its reading. In addition, when changing an encrypted file in the dark, the addressee will be able to take it for himself current version file, but by stretching the term di ssilannya.

Encryption of filenames with Boxcryptor

Encryption of file names, like encryption/decryption of a file, is set via the context menu. As a result of the encryption of the name - the name of the file in the gloomy folder will be presented with a bunch of hieroglyphs (with the extension ".bc").

baby23 . Encryption of the file name in the desktop versionBoxcryptor onWindows

You can rotate the file name normally for additional help by specifying the encrypted name through the context menu.

Boxcryptor boxcryptor master key

This function allows you to retrieve encrypted files of the company, even if you forget your password, or if you call, without transferring your updates to other employees. To generate such a key, you need to go to the “Profile” tab in the Boxcryptor settings and click “Generate” next to the “Master Key” row. You must enter passwords for the new key and generate the key itself. After the creation of the formations, the key must be entered through the web interface in the validation policy.

baby24 . Generation of the master key of the Koristuvach in the desktop versionBoxcryptoron theWindows

When you need a different master key, you just need to unblock it by entering the password on the "Profile" tab at the setup service. Do not allow a second person to gain access to all encrypted files in your company.

Visnovki

We took a look at the main functions of the Boxcryptor service, which is recognized for zahist denial by a lot of coristuvachs and the company has gone wild for hours at gloomy stores. There are three types of prepayments for those who are short-term employees:

  • bezkoshtovna - Free - with limited functionality;
  • paid - Unlimited Personal - extensions from the Free warehouse of functions;
  • paid - Unlimited Business - the most advanced warehouse of functions, recognized for the protection of not only special, but also business information of a few entrepreneurs, small companies and private enterprises.

Companies applying for a new type of subscription, which is the most popular and independent business package - Company Package.

The main feature of the Company Package is the presence of functions, oriented to the company itself, for example:

  • Formation of the master-key of the coristuvacha and the removal of passwords of the coristuvach, which will ensure the possibility of decrypting the files in the company at the time of wasting passwords, for the help of which the encryption was made.
  • Active Directory support, which allows you to synchronize the public records of the Boxcryptor cores with the public records of the cores of the company's Active Directory, which makes life easier for the system administrator.
  • Management of koristuvachami and outbuildings, which applies to the centralized management of all koristuvachami of the company and configuration parameters of the service on corporate outbuildings.
  • Possibility of conducting an audit (monitoring), which will reveal the uncharacteristic behavior of a koristuvach.
  • Two-Factor Authentication, which secures the authentication of corylists for the help of the Duo Security solution.

The main advantages of the service are:

  • Supported platforms: Windows XP SP3 and more, macOS X 10.7.5 and more, iOS 7 and more (iPhone/iPad/iPod), Android 4.0.3 and more, Windows Phone, Windows RT, Blackberry 10.
  • Availability of portable-version (for Windows platforms, MacOS, Linux).
  • There are a large number of services of dark collections that are supported: Yandex.Disk, Dropbox, Google Drive, Box, OneDrive, Amazon Cloud Drive, Amazon S3, CloudMe, Cloudwatt, Cubby, Egnyte, GMX, iCloud Drive, livedrive, Orange, SDS, SpiderOak, storegate, Strato HiDrive, SygarSync, Telekom, WEB.
  • File encryption/decryption local treasure(local storage).
  • Intuitively intelligent interface.
  • Availability of cost-free prepayment.
  • The choice of over-the-counter and over-the-clock encryption algorithms is RSA and AES.
  • Possibility of work in offline mode and further synchronization with a gloomy joint.
  • Vikonue encryption / decryption in one click of the bear.
  • Vikonannya ciphering / deciphering "on the fly".
  • "Automatically encrypted" files when placed in an encrypted directory.
  • Possibility of secure access to the file.
  • Reinforcement of access to encrypted files in the company for an additional master key.
  • Appearance extension for Chrome browser.
  • Protection against unauthorized access When starting the service, it is necessary to enter the password in the form record of the Boxcryptor koristuvach. Access to the service may be obmezheniya oblіkovym record koristuvach operating system.
  • Technical support as a picker for corystuvach pay types of overpayment.

To the minus points of the service, you can add:

  • The minimum number of functionalities for a free subscription.
  • Decreased productivity of the system for an hour when file names are encrypted (especially in the case of a large number of files).
  • Vіdsutnіst vіdsutnіst vіdstіnіh podtrimuvanіh providovіvіv khmarіnіh shovishch one of the most widespread in Russia - Mail.ru. Prote virobniki proponuyut zv'yazatisya z them, as if the list of subprime providers you did not show the need, stink to carry out a re-verification.
  • Impossibility of vikonannja okremikh operations without intermediary in locally installed version service (requiring a web interface), for example:
    • Choose the subscription type Company Package and activate the trial period for 30 days.
    • Add the policy associated with the generated master key.
  • Visibility automatic connection gloomy collections, associated with the oblique record of the Boxcryptor corystuvach, an hour from the launch on mobile devices with this very oblіkovy record. That is, on new outbuildings, where Boxcryptor is installed, the providers of services of gloomy treasury services will automatically show that addition, but on mobile outbuildings they must be added manually.

Shanovna sleepy!

Ale, almost as follows, from an overview of the current situation.

Іsnuyut gloomily, where you can save a lot of different information. Inode without cost. Tse calm down. A lot of services are still fighting in the city to give you more gigabytes and functions. However, it is necessary to be aware that a costless sire is less likely to be in misholovtsi. It’s safe to say that you transfer your files for saving to someone else’s uncle with unknown names. And the file itself is unsafe, as an object of information, in that it is believed that it is possible to make a copy of it and that the fact is not known in any way. You can also analyze files for different purposes. I swear a lot of something.

Tі, scho dorimuyuyuyuschisya look "nothing to grab, don't be surprised" - far away can not read. Continue enjoying the rounds of photos from iCloud, which we recently saw, in the dark unlicensed content etc. Those who care about the confidentiality of a special life and, on the whole, do not accept looking at you in the castle gap and launching the hand of a great brother at your special person - read further.

Hmari can vikoristovuvati. Ale treba robiti correctly. The solutions here are the encryption of data. However, it is necessary to understand that encryption is encrypted retail. Too many servants to shout about those who have the best encryption algorithms. Ale tsi f services modestly moan about those who themselves stinks can take away access to your data at any time. Therefore, the most correct option is the option of encrypting / decrypting data on your side. In this rank, the gloom can only be right from the encrypted content. When the client is encrypted, that gloomy service is not the fault of one Vlasnik. The ideal way is to check the output of the encryption client.

Otzhe, what can we do with such an approach:

1. Vlasnik khmari can't access all the files. Niyak.
2. All universities in the LAN channel of your traffic cannot access your data. Tse, for example, vlasnik wifi hotspots cafe, provider, master of main lines, admin networks on your robot and in.

It's wonderful.

1. You are blamed for downloading the turboti for the security of encryption / decryption, downloading the download to the computer.

Who cares more. Ale, let's get home, what:

1. Khmara for you is not a corporate tool for robots. If you want and here you can have options for how to distribute the password to colleagues.
2. Khmara for you is a collection of special tributes.

Stan is right for now

1. At the moment, the service does not know the encryption model for the content. It made sense, but it was not clear to you.
2. Having googled, I have discovered with wonder that I don’t get caught by the problem especially. Possibly, with gloom, the same trick is repeated that social measures n-twelve years ago. If people, without thinking, to themselves all yelled to the point. Who is with them in some stosunkah, de serving that pratsyuvav. A gift to our special services and shahrai.

Current options for achieving the task of securing the security of wet files in the dark:

1. Encryption, which is hoped by the master of darkness. Protects only from other coristuvachiv, but not from the vlasnik of gloom.
2. Storage in a cloud of files in password-protected archives or encrypted containers (such as truecrypt). It’s not easy to make a mess, so in order to make a small change, or just zawantage the file, you need to zawantage the entire container. What often happens is unsightly, like it is great.
3. VPN only protects the communication channel, but not in the dark.
4. Program BoxCryptor. You won't be able to encrypt files that are being corrected / angry in the dark. Ale її the robotic mechanism is not handy. Do you have local computer A copy of all data can be synchronized. At this copy you work with data, and the program at the encrypted view fills / angers them in the dark. Synchronize with a primer. Unsightly.

And what do we want?

We want, if we have a flash drive, we insert it into our own (or not our own) computer connected to the Internet, we launch a program from it. We have a virtual disk in the system, zayshovshi in which (who is an explorer, who is Total Commander) we can use in our account in the dark. Bachimo our files, work with them, whatever we need. And then we all vimikaemo that demo. And if you can log into our account without launching the magic program, then we (otherwise the evil-doer, the admin-sniffer, the dark-haired one) are more likely to know about the smittya - like in the file names, so in the future.

As an option - install this program permanently on all your computers and forget about the reason for the periodic launch. This method will work with the usual types of hmar, which will support the WebDAV standard and will allow you to save enough files that meet the standards of file systems.

Googling, I know only 2 options for the encryption power in the way I need it.

1. Plugin WebDav for Total Commander. Adding a gloomy oblіkovy record in Total Commander and vіn becomes visible like a disk. Which can copy files. However, VIN is not yet encrypted. Try to ask the author to include in the new encryption and articles by Gisler the first, who solve this problem - without success.
2. The CarotDAV program, about yak have already been written on this site. You can encrypt files and names one by one. And everything would be good, but there may be an interface of the explorer, which is not handy.

І axis, vlasne, vydbulosya those for the sake of which I am writing this long post.

Well, the program is easy, everything works as follows. Ale nagolovnіshe - now you can definitely be sure that your files in the dark lie only for you - while saving the legeni manual way access to them.

I would like to ask all those who feel sick and who need such a program to come to the test.

The rest of the article in this section, in which I will stick with those gloomy treasures, such as Dropbox. Already we were aware of vipadki about the evil of gloomy gatherings, so forget about the security of your data, to be more precise, you don’t work for anything, obviously.

In this material, I will show the cicava software security, how to steal your files from Khmar. This utility is called BoxCryptor and helps to create a virtual disk, building and encrypting the required data using the AES type.

Program benefits

  • The simplicity of the vikoristannya;
  • Availability of a non-copy version, but you can pay a fee;
  • Interaction is practical with usma gloomy collections;
  • superiority of the program;
  • The robot is less likely to work with okremi files, and not with containers.

BoxCryptor does a good job with its tasks, and encryption of files is correct, as well as decryption. If your password is raptomed to the point of being unfriendly, then for them the files will be unreadable.

Before the victorious students, the following will be discussed, which version you are ready to greet. If you do not dare to pay, then no-cost version to you, however, in niy trohi okmezheniya funktsional tim, scho you can pratsyuvati only with one virtual disk. In the newer version, you can work with a number of disks and folders, it is possible to encrypt file names. This version costs 40 dollars.

Front articles:




Installing that robot with BoxCryptor

You can download the utility on the official website. Press button "Download Boxcryptor". Let's take a look at the software installer. Because of the installed programs, you are not guilty of problems.

After the installation, we are told to register. Click on the message below "Create a Boxcryptor profile".

Enter the name, name and address of the mail, as well as the password. Tisnemo "Dali".

At the next vіknі z'yavlyaєєєєєєєєєєєєє, scho fouling the password threaten filthy nasledkami, that vіdnoviti ciphered data not vdas. We mark the checkbox and let’s say “Dali”. Start the registration process.

We are told to choose the version. I choose Free, so bezkoshtovnu.

Now you need to go to your oblіkovogo record, and we can start working on the program. We’ll wait for a while, and then we’ll see a virtual disk, I have the names of the letter X. If you don’t have Khmary’s software installed on your computer, then you’ll have to do it, otherwise the program will tell you about it. Also, you can watch the “Pidruchnik from BoxCryptor” window. Yakshcho never practiced with such programs, learn yoga.

Now you need to work harder: go to the virtual disk and download the folder of the gloomy service there, in my case - Dropbox. I open this folder and encrypt any directory there. For which one, right-click on the mouse, in a new one, I will go to the Boxcryptor distribution and select the item "Encrypt".


To show up in advance of the warnings about the closing of all open folders that encrypted file in the middle of the folder. You will be notified that the operation has been successfully completed. Press OK.



Now the folder will be with a postscript "_encrypted". Files that you transfer there once again will be encrypted. Respectfully, if you capture files in the dark not from a virtual disk, then the stench will not be encrypted. Encryption can be like folders, and be it files.


If you like, you can specify the permissions for the encrypted chi file in the folder. For whom it is necessary to select an item "Access rights management". So, you can add a trusted koristuvach, which can be speeded up with encrypted tributes.


When you open an encrypted folder from Dropbox, you will see that the files are actually protected, which cannot be processed. You can save less from the virtual disk.


To remove encryption, you need to click on the required file or folder with the right mouse button, go to "Boxcryptor" and select the item "Decipher".


To show up ahead of time, it’s easy for anyone "So". Decryption is carried out mittevo. Before speech, when enabled, you can change the encrypted data.


Axis and all that I want to tell you about the protection of data from gloomy monasteries. There are already a lot of such programs and all of them are unaware. Tim more, focusing on this article, you can do it yourself.

Well, if I read about a dickhead who saves important documents in my own dropboxes with google drives, I wonder how many people we have without turbos. Break the account, resist, and win for their obscene purposes. And let's talk later, what an honest person to take nothing! To that, the stіyke is simple in vikoristannі ciphering for hmar is simply necessary.

Samy shortest way prihovat in the arch of the eyes important information- EncFS, cryptographic file system, which uses AES algorithms and Blowfish. Whose whole is not enough for a villain, but also for a bunch of people in uniform (be aware that the stench doesn’t come up to you especially).

The benefits here are obvious:


  • Simplicity vikoristannya. The software installation allows you to encrypt a file in a couple of clicks.

  • Possibility of distant work. With other tools, it allows you to encrypt files on other machines.

  • Separate encryption of files. Don’t worry about it, but for our manager it’s better, lower Veracrypt cryptocontainer and analogs, so it doesn’t take a long time in the dark.

  • Vіdkritі vihіdnі dzherel. The number of bookmarks is guaranteed.
For a short time, I can only guess the problem of installing EncFS on Windows. Here, I'll try to help. Diet strictly according to the instructions, and you will see everything!

So, for starters, we need to install the Visual C++ 2013 system. look at the list installed programs: If this package is already installed, go to the next step. No way, we work like this:

We install in the order of magnitude. One, if you want to install Visual C ++ 2013, you should. We have already installed this library. In a different way, we are sorted into the browser, on the side of the library's interest.

Well, axis, we were pleased with the fallow land. Directly not Windows, but Slackware to enter :) Everything was handled manually. And now you can install the software itself.

Unpack the archives in a folder of your choice. І take bubo and kamlaєm minyaєmo the rights of the files that are to be counted. In the quality of the encfs.exe and encfsw.exe files, select the "Summary" tab, and for the number of files in the range of ten, turn on the Windows 7 summation mode, and for all - the robotic mode as an administrator. Everything, let's start encfsw.exe! Don't get confused!

Yakscho everything is fine, such a key is guilty in the tray. Yakscho nі, marvel, de vie have been rewarded.

Well, the installation went well. Now, like a miracle of engineering thoughts, we muster up. Don't fight, it's easier, put it lower. Who ever used life Daemon Tools abo Alcohol 120%, then once you figure it out. For the cob, we marvel at what we have in our landscaping. Emboss on the key icon, and emboss on Preferences.

Nalashtuvannya is absolutely simple. The top checkbox - add autoload, the bottom checkbox - automatically open the mount folder.

And now mount the encrypted folder in the middle of your Dropbox. Vzagali, the program virtuously works with be-yakim glooms, abi stinks at you seemed to the conductor, like a folder. I tested Google Drive, Yandex Disk and Khmara Mail.ru. I guessed, be it Owncloud and Webdav, it will work like a Swiss year.

So, first of all, we create a Private folder in our Dropbox. You can not create, but simply encrypt the entire folder.

Respect! The program absolutely does not accept Russian letters on the way to the required folder! Therefore, either rename all folders to shlyah to shukano, or move it to another place. For zamovchuvannyam folders gloomy are created in the profiles of a koristuvach, and the path to the new one often avenges the Cyrillic alphabet. Vtik to the author for Russophobia buv messages :)

Now click on the icon with the key, and select the next item - Open/Create. At the vіknі, what happened, we choose I need a folder. Before the speech, there you can create її, as if they were forgotten.

Choose a password for that mount point (drive letter).

Now mount a new folder. Just enter the password.

As a result, a new virtual disk with the name DOKAN is taken into the system, on which your home porn archives are uploaded everything that you want to capture from third-party eyes.

The axis will look like this, if you go not to the mount disk, but directly to the folder. Change filenames to crocodile.

І axis, what to babble the evil-doer, as if it were the same in your gloom. Guess, zvichano, maybe, but understand what is lying there - the devil is two!

Once you have given the cipher folder, you can easily mount it into the system through the same icon in the tray (the list will appear there), and work with it, like with a great flash drive.

© 2022 androidas.ru - All about Android