Forums
New posts
Search forums
News
Security News
Technology News
Giveaways
Giveaways, Promotions and Contests
Discounts & Deals
Reviews
Users Reviews
Video Reviews
Support
Windows Malware Removal Help & Support
Inactive Support Threads
Mac Malware Removal Help & Support
Mobile Malware Removal Help & Support
Blog
Log in
Register
What's new
Search
Search titles only
By:
Search titles only
By:
Reply to thread
Menu
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Forums
Security
General Privacy Discussions
'Data that is not sensitive, should not be encrypted'?
Message
<blockquote data-quote="Stenographers" data-source="post: 1044367" data-attributes="member: 97396"><p>It depends on what you consider sensitive and your threat model. If for example an adversary has the capability to confiscate your computer it might make sense not to have the whole thing encrypted. If you properly hide the encrypted files, using something like a hidden container through Veracrypt, having the non sensitive data unencrypted may give you some plausible deniability. However this adds to the complexity of the setup, which may result in you keeping some sensitive data unencrypted for convenience. Full disk encryption means everything is encrypted by default, which is easier to manage since you don’t have the additional overhead in the process of encrypting / unencrypting files. </p><p></p><p>It is possible to lock yourself out of your data when it is encrypted. Either due to software bugs or personal incompetence. This is why backups are a must have if you’re going to encrypt your data. Preferably the backups would be encrypted themselves with a unique password. If you have an encrypted system, and you don’t have encrypted backups, then your backups represent a risk that basically nullifies the protection you get from encryption. </p><p></p><p>So in short, it depends on who you’re protecting yourself against and what you’re storing. Everyone has sensitive information of some kind. I usually recommend to the average person to use full disk encryption either through Bitlocker or LUCKS.</p></blockquote><p></p>
[QUOTE="Stenographers, post: 1044367, member: 97396"] It depends on what you consider sensitive and your threat model. If for example an adversary has the capability to confiscate your computer it might make sense not to have the whole thing encrypted. If you properly hide the encrypted files, using something like a hidden container through Veracrypt, having the non sensitive data unencrypted may give you some plausible deniability. However this adds to the complexity of the setup, which may result in you keeping some sensitive data unencrypted for convenience. Full disk encryption means everything is encrypted by default, which is easier to manage since you don’t have the additional overhead in the process of encrypting / unencrypting files. It is possible to lock yourself out of your data when it is encrypted. Either due to software bugs or personal incompetence. This is why backups are a must have if you’re going to encrypt your data. Preferably the backups would be encrypted themselves with a unique password. If you have an encrypted system, and you don’t have encrypted backups, then your backups represent a risk that basically nullifies the protection you get from encryption. So in short, it depends on who you’re protecting yourself against and what you’re storing. Everyone has sensitive information of some kind. I usually recommend to the average person to use full disk encryption either through Bitlocker or LUCKS. [/QUOTE]
Insert quotes…
Verification
Post reply
Top