A very serious issue with encryption is when data is corrupted (by an app, OS, hardware issue, encryption software, or combination of these), it's almost 100% guaranteed unrecoverable. Anecdotal evidence says that data loss from corruption is higher probability than loss from theft. A lower tech/easier option for protecting data is to use an external (USB) drive for critical data and when done, store that drive in a safe. Yes, if you have a virus on your machine, it can grab unencrypted data when the drive is connected, BUT encrypted data can be grabbed when its decrypted when an app opens the file. It can also be grabbed and decrypted later (as she implied). The big IT systems I have worked with use a "firewall" around the system, but for total data security trust only offline/offsite storage.
@keylanoslokj1806 You have to ensure you regularly run deep scan with up to date definitions. If you want to increase safety (there's no 100% btw) you keep multiple backup that you make over time. It's not cheap, but it depends on what your data is worth.
True, the video should have mentioned the downsides too. IMO, encryption over physical protection should only be used if the data itself is so seriously private that the loss of data is less of a problem than theft.
Naomi you should point out the most important negative of Veracrypt. If there is corruption in the volume then most chances are you loose the whole volume. The sis why other approaches such as Cryptomator should also be mentioned here, that are doing "file-level" encryption which avoids that problem. Veracrypt still has its uses but depending on the scenario it might not be the best tool.
Tip: You can speed up the unlocking of containers by selecting "HMAC-SHA-512" for PKCS PRF instead of autodetect (unless you changed this value when creating the container). You can also set this as the default: settings > Preferences > More settings > Default Mount Parameters
@@Real-Name..Maqavoy Struggles are fun! Makes things interesting. Now...with INCREASED STRUGGLE... For giggles and guffaws, I run Asahi Linux on one of my M1s. With this 3rd iteration...I'm straying from the approved Fedora 40 to a non-approved Linux-for-ARM distro. Heart attacks are fun!
I’d also like to mention tools like Cryptomator, Tomb, GPG, And other tools. Rclone with its crypt option is also nice cuz you can use it to backup your stuff to the cloud. :)
VC evolved from the TrueCrypt project which suddenly and abruptly shut down. Rumours still swirl around this, one I heard was that the company was put under too much pressure by US three letter agencies as the product was too effective and giving them... problems. I remember my boss had a friend working in law enforcement about 15 years ago and he was saying they couldn't break into TrueCrypt volumes at the time (this was State level law enforcement in Australia, not sure if the Feds had more technical clout on hand). They had need to do this as seized computer gear used by organised crime was using it to protect data files and folders.
I remember some people telling me in the VeraCrypt subreddit that we should look for hard drives that don't have wear-levelling built in them if we want hidden volumes, since this feature can be very bad for plausible deniability. Also, the TRIM command on SSDs could allow an attacker to see what sectors of the drive are not actually hidden space. Unfortunately most SSDs and some USB sticks already have these features by default. So just make sure they don't contain them to be on the safe side. As for standard encryption though, it's fine.
Hi Naomi this is a nice introduction to securing data. I also watched "Encryption also in the cloud Veracrypt vs. Cryptomator" by Peter Marbaise. So for people like me that are leaving Bitlocker behind, I would use Cryptomator vaults for cloud accounts. And use Veracrypt vaults for local drives and obsidian folders. Did you mention that Veracrypt requires that you need admin rights to enable changes?
Did you cover Hidden Volumes? Most TrueCrypt users talked about setting up a standard encrypted file, but would also add another one in to it that was hidden and needed another password. It was not possible to detect, so they handed over the password to the encrypted files, police looked and found nothing, but didn't know how many hidden files or layers of them they contained. Maybe technology has advanced now.
Great video. Very nice privacy tool. That solution fits for many users. But there are also those who need to hide the fact they have any hidden or encrypted files at all. If VeraCrypt doesn't obscure the existence of encrypted data, then that might be an opportunity for another video. I forget if you mentioned whether it does that or not.
You have the option of naming a Veracrypt container file as you wish, e.g. as an EXE file. On the other hand, you have the option of creating a hidden container within the Verycrypt container. When prompted, you can then open the outer container with harmless files and the inner container remains undiscovered.
@@thorstenn That's interesting and very practical. However, obscuring the existence of individual files is more difficult than partition volumes, due to the inherent size of the file. I'm not sure if there are any techniques that can possibly prevent them from being detected. For example, if I make a container named "cat.exe" and fill it with cat pictures, then if the file is decompiled it wouldn't result in any sensible code. Or if I add more hidden containers to it, then the total size of the file would not reflect its visibly accessible data. Or if the container can fool the OS, all the files on the drive could still be measured against the storage space already used on the drive.
Good video...BUT... If you do use encryption, be vigilant about your backups! Unencrypted files often can be at least partially recovered if there's some data corruption on the drive. Encrypted files are usually a total loss. I do use VeraCrypt myself and recommend it, BUT I also keep tons of backups.
I prefer encrypted RAR files with encrypted file names. More easy to handle than containers. Especially because it works with non admin accounts, unlike Veracrypt.
Don't forget, if a file touches an unencrypted partition, then it can be recoverable after a regular delete (or move!) so make sure to start saving your files directly in the encrypted storage. Watch out for autosaves that might use /tmp areas that may not be encrypted too! Best to encrypt the entire system first for general use, and then encrypted containers within that.
Except Swift is a sell-out and low information person who endorses Kamala Harris, wtf! Love him or hate him, Trump is a great business person and is what's needed. Swift has tds so bad she cannot fathom this simple truth The irony is that swifts songs are mostly about picking the wrong person in life Naomi is the opposite to Swift in every way and is far better looking too
Cryptomator is good if you want to backup the files on a cloud service because every file will create an separate encrypted file which makes incremental backups easy. If this is not the use case and you can go with one big encrypted volume I always would go with veracrypt because I can use my own cryptography settings.
@DerFlotteReiter I haven't noticed the individual files encryption features in Cryptomator. It prompts me to create/encrypt whole folder/vault every time, then i can put files in as needed. When I'm done using it and lock, it encrypts the whole folder. I'm using it on Windows and Android.
@@skistenl6566 Yeah I use Cryptomator over Veracrypt so I can have several small vaults (even though my disks are encrypted with macOS native feature). It’s a pain to use on iOS because of limitations with ”file providers” feature (basically some apps won’t be able to open files from Cryptomator vaults), but once you get it going it’s golden. Solid app. I wonder if my Mac license works for windows too, albeit I only use windows for gaming.
@@skistenl6566 @DerFlotteReiter is correct. Look at the encrypted vault, it has a single file for every file you put in it. The good thing about that is that you don't have to define your container size. As long as you have enough space on your device you can add files
I looked at VeraCrypt some time ago. Main issue is that it breaks the versioning control of 3-2-1 backup systems where one of the backups is cloud storage (e.g., OneDrive, Dropbox, local Synology Drive). Yes, when you unmount the volume, the timestamp information will update and the sync will occur. But, it's syncing the entire encrypted volume set, and not versioning each file. This means if one file in the entire vault needs to be rolled back to prior version, you must roll back all the files in the vault.
You can use a synchronization tool that can synchronize in blocks. I only know Syncovery, but have not tried it myself. Or you can use Cryptomator, which encrypts each file individually.
Then don't use cloud storage. Not sure why anyone would if they have really sensitive data on it. It's completely untrustworthy, with or without encryption.
@@Casey2262 - Agree, which is why one of those in my example said local Synology Drive. Recognize Synology is not the only NAS solution enabling a local cloud. Should also add if you're going to have a local cloud, it should be encrypted with a copy offsite. And, as long as you own the encryption key, cloud is a viable offsite option.
I didn’t think VeraCrypt was supported anymore and development ended back in like 2017 or something with one final build that may have had a vulnerability or back door. Please correct me if I’m wrong because it’s been a while. Edited: Now I'm remembering this used to be True Crypt right?
According to Wikipedia: "VeraCrypt is a fork of the discontinued TrueCrypt project. It was initially released on 22 June 2013. Many security improvements have been implemented and concerns within the TrueCrypt code audits have been addressed."
Ok yeah, I just wasn’t sure on the dates. I’m sure Vera Crypt is the best out there right now I just haven’t looked into it in a while. Who knows they probably did fix it but I wouldn’t trust Wikipedia.
I believe that the developers of TrueCrypt were pressured by the CIA or FBI to insert a backdoor into the next version of the software, but instead, and to preserve their integrity, they chose to end development, so the final version of TrueCrypt IS secure and contains no backdoor. It has since been audited and found to have no security flaws. I do not know whether the developers of VeraCrypt or other subsequent forks of TrueCrypt may have caved in to the CIA/FBI. This you must decide for yourself.
I used both, I think if you plan to stick with just using mac for the future use the macos encrypted disk image since its more convenient. veracrypt is cross platform and is open source so for longetevity of the data use that
@@EgonTheViking I'm not familiar with Mac's Disk Utility, but one of Veracrypt's selling points (if you can call it that, considering it's free) is that it is available cross-platform. So if you have encrypted files you want to transfer from Mac to Windows or Linux, you can, and you would be able to decrypt them on the other platform and use the file(s) as needed.
Actually I was also looking for the answer of this question. So you can create encrypted containers of folders, files, volumes or any data on the computer with MacOS Disk Utility. Further, you can create those containers as read-write containers or archive containers or some kind of international standard image file , compressed archive etc. And furthermore you can choose AES 128, AES 256 etc to encrypt it. The other advantage is that you can keep the encryption key in the Keychain Access app which is built-in secrets vault app of MacOS. Or you can choose any password/secret manager to keep the encryption key safe.
😢😢😢 Vera crypt only for windows? I searched on Apple store. Question But the secure apple safari and google keep also your passwords info. How secure are they?
Or just use a *Notebook?* Works like a charm. ________ For keeping tabs on Passwords. Obviously depends on what you (need the containers) for like. Example: *Business, Car company or Law enforcement?*
hii, thanks to you i caring about my privacy A LOT. but i have a question. I live in Türkiye and protonvpn is banned + connecting to servers take a real long time so i wanted to switch to windscribe as it’s cheap and private but i’m still worried about the 5 eyes thing, due to turkish lira being so valueless i can’t pay to nordvpn, expressvpn can you make a video or at least reply about 5 eyes?
You could use a Yubikey 5 in static password mode. However, there are also more complex methods available, such as using it like a smartcard. I haven't tried the latter approach myself.
Beginner's Introduction To Privacy - Naomi Brockwell amzn.to/3WDSfku Permanent Record - Edward Snowden amzn.to/305negc What has the government done to our money - Rothbard amzn.to/2KMzmcu Extreme Privacy - Michael Bazzel (The best privacy book I've ever read) amzn.to/3BLZ1gq Digital version: inteltechniques.com/book7.html (non affiliate link) No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State - Glenn Greenwald amzn.to/2UQmJ4m
yeaaa much better imo, ♨️💾 Dont mess around especially with Macfuse ⚠️messed up OSX volumes due to OSX self encryption and Apple unfriendliness .... also its no longer supported with latest osx version neither on Homebrew Macfuse keep messing up and eventually damage created volumes and non long ago had bad Vera crypt experience failed to mount volumes and damaged volumes on both internal sdd and external hardrive ! Be careful, if you're on OSX , cryptomator works much better although i have use is mostly for non hundreds of gigabytes files nor entire encrypted volume but it's perfect for a folder with a few gigs of files 👌🐧✅ Never with cryptomator👌
Cryptomator does not encrypt the files in one large container file, but per every file. This procedure is better for files that are to be synchronized with a cloud or NAS.
@@thorstennok so if I understand correctly if I want to securely store my files on my ssd, internal or external, I better go for VeraCrypt while Nas or Google drive or equivalent service Cryptomator?
@@amanterobot no not really. Veracrypt has 2 approaches. The first is to encrypt the whole SSD, so it I similar to disk encryption. The second is that it creates a file (container) that presents to your system as an additional disk. That would contain all your files. Cryptomator encrypts each file separately (you can see them with weird names under the folder structure as items not what they really are). A good thing for Cryptomator (and negative for Veracrypt ) is that if a file gets corrupted on Cryptomator it will only affect that file. If the volume gets corrupted in Veracrypt say buy buy to the whole volume .
Mac’s built in FileVault encryption will allow you to make folders like this not just encrypt the entire drive. I realize VeraCrypt is cross platform but I wonder how they compare otherwise. I worry that a future OS update will kill veracrypt or it will stop being maintained
I have a very big missing feature in veracrypt...(or in all similar products) That would be a burner password.. . its already has the hidden volume feature, but i would like to have one that is ERASES the container if i give it a specific password... not just faking it with a hidden volume, i would like to see a killswitch in this, so if i give a specific password the volume will be corrupted irrecoverably, so the cannot achieve anything with forcing me to open it... Also how can you automount these, since if i have a server that i want to use encrypted hdd's then how do i automount safely after a restart? So vera is good, but it has its limits too, i like it i am using it, but i have ideas... XD
Yes, there are apps like "EDS Lite" and "EDS NG" which can handle veracrypt containers. I tested the former a few years ago, and it worked well except for a few minor UI bugs. I can't say whether everything still works the same way nowadays.
Password managers want your Windows Computer Inlog when you want to remove a listed Password. Meaning: Browers read EVERYTHING in your Device. Logo Hackers arrive in Boots and start to work from there. When you find - hide a Computer Generated Password for Sandboxes... the Browser has already read it. Its no longer 'a security tool'. We are being mindf..cked for money onlyt.
Hi, we're a really small team with hardly any resources for our work. Sometimes we forget things. Thanks for the reminder, and if you want to help support our free educational content, please visit nbtv.media/support 💛
@@DavidHuffTexas I DID Google it. My point was that IF you want people to use what you are offering (or reviewing) a link in the description is standard practice.
@@NaomiBrockwellTV I get it, I'm a team of One channel (actually a couple of channels). I have systems in place to ensure everything gets into the upload just so I don't forget anything. (Now watch me forget something important on my next upload).
@@NTC_Transport My issue is that you pointed it out in a rather abrupt, rude way and the channel owner politely fixed what you were complaining about. She was much nicer about _that_ than I would have been...
Back in the there was an app called pgp I think. It was supposed to be totally secure. Then the inventor of the app went to jail. No one was able to break the encryption. Then he was forced to sell and new owners put a back door into the app. I think that's what happened. Pgp stood for pretty good privacy.
Thanks Naomi. Have a nice weekend!
I literally get excited when NBTV posts videos 😂
Same
A very serious issue with encryption is when data is corrupted (by an app, OS, hardware issue, encryption software, or combination of these), it's almost 100% guaranteed unrecoverable. Anecdotal evidence says that data loss from corruption is higher probability than loss from theft. A lower tech/easier option for protecting data is to use an external (USB) drive for critical data and when done, store that drive in a safe. Yes, if you have a virus on your machine, it can grab unencrypted data when the drive is connected, BUT encrypted data can be grabbed when its decrypted when an app opens the file. It can also be grabbed and decrypted later (as she implied). The big IT systems I have worked with use a "firewall" around the system, but for total data security trust only offline/offsite storage.
Backup might help.
How do you minimise the chance of opening in and copying files from, an infected/monitored machine?
@keylanoslokj1806 You have to ensure you regularly run deep scan with up to date definitions. If you want to increase safety (there's no 100% btw) you keep multiple backup that you make over time. It's not cheap, but it depends on what your data is worth.
@@tsbrownie is paid malwarebytes good enough
True, the video should have mentioned the downsides too. IMO, encryption over physical protection should only be used if the data itself is so seriously private that the loss of data is less of a problem than theft.
Naomi you should point out the most important negative of Veracrypt. If there is corruption in the volume then most chances are you loose the whole volume.
The sis why other approaches such as Cryptomator should also be mentioned here, that are doing "file-level" encryption which avoids that problem.
Veracrypt still has its uses but depending on the scenario it might not be the best tool.
Thanks Naomi. Cheers.
As a decade long victim of cyber crime, it's really hard to keep up with all the safety tips.
However, I appreciate the work that you do.
Tip: You can speed up the unlocking of containers by selecting "HMAC-SHA-512" for PKCS PRF instead of autodetect (unless you changed this value when creating the container). You can also set this as the default: settings > Preferences > More settings > Default Mount Parameters
No difference, here. OS completely encrypted, decryption ~2min, not fast....
big thumbs up for you and your graphics/ animations guy.
Love your content keep up the great work
I needed to know this information Naomi thank you so much ❤
I was paying attention to your picture frames, those are so cool!
I need to do this right away! I have Linux and Mac machines, and I need to study this in detail. Mahalo, Naomi!
*Mac machines?* ooof!
I'm sorry for ya struggles mate.
@@Real-Name..Maqavoy Struggles are fun! Makes things interesting.
Now...with INCREASED STRUGGLE...
For giggles and guffaws, I run Asahi Linux on one of my M1s. With this 3rd iteration...I'm straying from the approved Fedora 40 to a non-approved Linux-for-ARM distro.
Heart attacks are fun!
You learn something new everytime Naomi does a video! Thanks very much.
Naomi is dreamy!
Naomi is made of Australian gold.
😤
Truecrypt was the original veracrypt was the later and many claim compromised version
Shes got that glow for sure ✨
Wow you're still Simping
I’d also like to mention tools like Cryptomator, Tomb, GPG, And other tools. Rclone with its crypt option is also nice cuz you can use it to backup your stuff to the cloud. :)
Thanks, which one is the fastest? And which one that you are using the most?
@@Resepdrea12 I use Rclone crypt with Google the most.
Thank you Naomi, your information videos are amazingly detailed!
Thank you very much Naomi
I am deffo downloading this.
I love your channel.
VC evolved from the TrueCrypt project which suddenly and abruptly shut down. Rumours still swirl around this, one I heard was that the company was put under too much pressure by US three letter agencies as the product was too effective and giving them... problems.
I remember my boss had a friend working in law enforcement about 15 years ago and he was saying they couldn't break into TrueCrypt volumes at the time (this was State level law enforcement in Australia, not sure if the Feds had more technical clout on hand). They had need to do this as seized computer gear used by organised crime was using it to protect data files and folders.
I learnt years ago to only keep OS on the internal hard drive along with software. Keeping data elsewhere.
In love with this woman, very intelligent ❤
@@Arcano_Costa...Mauricio Wait in line. All the way in the back.
Thank you so much Ma'am i need more informative video like this ❤
Bonjour du Mexique 🇲🇽 ❤ 😊
Love your show!
I have been using this Vera crypt for years and it is a MUST specially if you are uploading to the cloud AKA SOMEONE'S ELSE COMPUTER.
I remember some people telling me in the VeraCrypt subreddit that we should look for hard drives that don't have wear-levelling built in them if we want hidden volumes, since this feature can be very bad for plausible deniability.
Also, the TRIM command on SSDs could allow an attacker to see what sectors of the drive are not actually hidden space.
Unfortunately most SSDs and some USB sticks already have these features by default. So just make sure they don't contain them to be on the safe side. As for standard encryption though, it's fine.
Naomi rocks.
Hi Naomi this is a nice introduction to securing data. I also watched "Encryption also in the cloud Veracrypt vs. Cryptomator" by Peter Marbaise. So for people like me that are leaving Bitlocker behind, I would use Cryptomator vaults for cloud accounts. And use Veracrypt vaults for local drives and obsidian folders. Did you mention that Veracrypt requires that you need admin rights to enable changes?
That was great! 😊
Good content keep up 🆙 👍
Thumbnail is fire.
Welcome to the VeraCrypt family!! ❤
Did you cover Hidden Volumes?
Most TrueCrypt users talked about setting up a standard encrypted file, but would also add another one in to it that was hidden and needed another password. It was not possible to detect, so they handed over the password to the encrypted files, police looked and found nothing, but didn't know how many hidden files or layers of them they contained.
Maybe technology has advanced now.
Yes, mentioned. No, not discussed in detail.
Great video...Awesome shirt!
Great video!
Thank you very much!
Great video. Very nice privacy tool. That solution fits for many users.
But there are also those who need to hide the fact they have any hidden or encrypted files at all.
If VeraCrypt doesn't obscure the existence of encrypted data, then that might be an opportunity for another video.
I forget if you mentioned whether it does that or not.
Yep we mentioned that, and that we plan to demonstrate in another video :)
You have the option of naming a Veracrypt container file as you wish, e.g. as an EXE file. On the other hand, you have the option of creating a hidden container within the Verycrypt container. When prompted, you can then open the outer container with harmless files and the inner container remains undiscovered.
@@thorstenn That's interesting and very practical. However, obscuring the existence of individual files is more difficult than partition volumes, due to the inherent size of the file. I'm not sure if there are any techniques that can possibly prevent them from being detected.
For example, if I make a container named "cat.exe" and fill it with cat pictures, then if the file is decompiled it wouldn't result in any sensible code. Or if I add more hidden containers to it, then the total size of the file would not reflect its visibly accessible data. Or if the container can fool the OS, all the files on the drive could still be measured against the storage space already used on the drive.
@@NaomiBrockwellTV Thanks. Looking forward to that one :)
Good video...BUT... If you do use encryption, be vigilant about your backups! Unencrypted files often can be at least partially recovered if there's some data corruption on the drive. Encrypted files are usually a total loss. I do use VeraCrypt myself and recommend it, BUT I also keep tons of backups.
thanks for the info
Good video Thanks Naomi
This would be great for tax files.
I prefer encrypted RAR files with encrypted file names. More easy to handle than containers. Especially because it works with non admin accounts, unlike Veracrypt.
Yes awkward when useing the PC at work. I have also used 7zip
I love that this is an open source encrypting application. Is this a better option than creating a MacOS encrypted disk image?
Don't forget, if a file touches an unencrypted partition, then it can be recoverable after a regular delete (or move!) so make sure to start saving your files directly in the encrypted storage. Watch out for autosaves that might use /tmp areas that may not be encrypted too! Best to encrypt the entire system first for general use, and then encrypted containers within that.
You are the Taylor Swift of IT!!! I will fall for any scam with your name on it! Love You!
Except Swift is a sell-out and low information person who endorses Kamala Harris, wtf!
Love him or hate him, Trump is a great business person and is what's needed. Swift has tds so bad she cannot fathom this simple truth
The irony is that swifts songs are mostly about picking the wrong person in life
Naomi is the opposite to Swift in every way and is far better looking too
is veracrypt still maintained? i was thinking it wasnt for some reason
What do you think about cryptomator? Would you recommend veracrypt over cryptomator and why or why not?
Cryptomator is good if you want to backup the files on a cloud service because every file will create an separate encrypted file which makes incremental backups easy. If this is not the use case and you can go with one big encrypted volume I always would go with veracrypt because I can use my own cryptography settings.
@DerFlotteReiter I haven't noticed the individual files encryption features in Cryptomator. It prompts me to create/encrypt whole folder/vault every time, then i can put files in as needed. When I'm done using it and lock, it encrypts the whole folder. I'm using it on Windows and Android.
@@skistenl6566 Yeah I use Cryptomator over Veracrypt so I can have several small vaults (even though my disks are encrypted with macOS native feature). It’s a pain to use on iOS because of limitations with ”file providers” feature (basically some apps won’t be able to open files from Cryptomator vaults), but once you get it going it’s golden. Solid app. I wonder if my Mac license works for windows too, albeit I only use windows for gaming.
@@skistenl6566 @DerFlotteReiter is correct. Look at the encrypted vault, it has a single file for every file you put in it. The good thing about that is that you don't have to define your container size. As long as you have enough space on your device you can add files
Would it be useful to use Veracrypt in combination with a KeepassXC stored password on the same device?
On Android EDS Lite is capable of using veracrypt containers
cheers from acoss the pond
I looked at VeraCrypt some time ago. Main issue is that it breaks the versioning control of 3-2-1 backup systems where one of the backups is cloud storage (e.g., OneDrive, Dropbox, local Synology Drive). Yes, when you unmount the volume, the timestamp information will update and the sync will occur. But, it's syncing the entire encrypted volume set, and not versioning each file. This means if one file in the entire vault needs to be rolled back to prior version, you must roll back all the files in the vault.
You can use a synchronization tool that can synchronize in blocks. I only know Syncovery, but have not tried it myself. Or you can use Cryptomator, which encrypts each file individually.
Then don't use cloud storage. Not sure why anyone would if they have really sensitive data on it. It's completely untrustworthy, with or without encryption.
@@Casey2262 - Agree, which is why one of those in my example said local Synology Drive. Recognize Synology is not the only NAS solution enabling a local cloud. Should also add if you're going to have a local cloud, it should be encrypted with a copy offsite. And, as long as you own the encryption key, cloud is a viable offsite option.
Naomi your beautiful person inside and out keep up the good work
The pure natural smart girl
I didn’t think VeraCrypt was supported anymore and development ended back in like 2017 or something with one final build that may have had a vulnerability or back door. Please correct me if I’m wrong because it’s been a while.
Edited: Now I'm remembering this used to be True Crypt right?
According to Wikipedia: "VeraCrypt is a fork of the discontinued TrueCrypt project. It was initially released on 22 June 2013. Many security improvements have been implemented and concerns within the TrueCrypt code audits have been addressed."
Ok yeah, I just wasn’t sure on the dates. I’m sure Vera Crypt is the best out there right now I just haven’t looked into it in a while. Who knows they probably did fix it but I wouldn’t trust Wikipedia.
I believe that the developers of TrueCrypt were pressured by the CIA or FBI to insert a backdoor into the next version of the software, but instead, and to preserve their integrity, they chose to end development, so the final version of TrueCrypt IS secure and contains no backdoor. It has since been audited and found to have no security flaws.
I do not know whether the developers of VeraCrypt or other subsequent forks of TrueCrypt may have caved in to the CIA/FBI. This you must decide for yourself.
Nice Video. I think Cyptomator is also a solution
the problem with veracrypt is that it does not know dynamic size containers
Would the bitlocker windows version do the same thing?
what about android? is VALV good? can you do a tutorial on valv app from fdroid please.
Naomi you know I use Kaspersky secure valve for this exact purpose
Is there a good reason for using Veracrypt over Mac own Disk Utility encrypted image?
You mean between having an encrypted folder/volume verses encrypting your whole harddrive?
I used both, I think if you plan to stick with just using mac for the future use the macos encrypted disk image since its more convenient. veracrypt is cross platform and is open source so for longetevity of the data use that
@@EgonTheViking I'm not familiar with Mac's Disk Utility, but one of Veracrypt's selling points (if you can call it that, considering it's free) is that it is available cross-platform.
So if you have encrypted files you want to transfer from Mac to Windows or Linux, you can, and you would be able to decrypt them on the other platform and use the file(s) as needed.
Actually I was also looking for the answer of this question.
So you can create encrypted containers of folders, files, volumes or any data on the computer with MacOS Disk Utility.
Further, you can create those containers as read-write containers or archive containers or some kind of international standard image file , compressed archive etc.
And furthermore you can choose AES 128, AES 256 etc to encrypt it.
The other advantage is that you can keep the encryption key in the Keychain Access app which is built-in secrets vault app of MacOS. Or you can choose any password/secret manager to keep the encryption key safe.
If you only use Mac not really. Unless you want the extra features that Veracrypt can provide
Or if we use Linux, we can use the built-in LUKS encryption
😢😢😢 Vera crypt only for windows? I searched on Apple store. Question But the secure apple safari and google keep also your passwords info. How secure are they?
Blockchain data storage would be awesomer. Better if I could encrypt 🔐 any ideas?
Would this be a good solution to encrypt files stored in a cloud storage service?
Or just use a *Notebook?*
Works like a charm.
________
For keeping tabs on Passwords.
Obviously depends on what you (need the containers) for like.
Example:
*Business, Car company or Law enforcement?*
hii, thanks to you i caring about my privacy A LOT.
but i have a question. I live in Türkiye and protonvpn is banned + connecting to servers take a real long time so i wanted to switch to windscribe as it’s cheap and private but i’m still worried about the 5 eyes thing, due to turkish lira being so valueless i can’t pay to nordvpn, expressvpn
can you make a video or at least reply about 5 eyes?
Can it be used with a hardware key like Yubikey?
You could use a Yubikey 5 in static password mode. However, there are also more complex methods available, such as using it like a smartcard. I haven't tried the latter approach myself.
Any Good books suggestions 📚 about internet online Privacy and similar stuff ?😅
Beginner's Introduction To Privacy - Naomi Brockwell
amzn.to/3WDSfku
Permanent Record - Edward Snowden
amzn.to/305negc
What has the government done to our money - Rothbard
amzn.to/2KMzmcu
Extreme Privacy - Michael Bazzel (The best privacy book I've ever read)
amzn.to/3BLZ1gq
Digital version: inteltechniques.com/book7.html (non affiliate link)
No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State - Glenn Greenwald
amzn.to/2UQmJ4m
On Fedora and Debian based distros would be ZuluCrypt instead?
Awe a comment made for the algorithm.
Could you compare this to cryptomater?
If you say run I run, in a second
VeraCrypt needs to simplify process for Mac's
what about cryptomator?
yeaaa much better imo,
♨️💾 Dont mess around especially with Macfuse ⚠️messed up OSX volumes due to OSX self encryption and Apple unfriendliness .... also its no longer supported with latest osx version neither on Homebrew Macfuse keep messing up and eventually damage created volumes and non long ago had bad Vera crypt experience failed to mount volumes and damaged volumes on both internal sdd and external hardrive !
Be careful, if you're on OSX , cryptomator works much better although i have use is mostly for non hundreds of gigabytes files nor entire encrypted volume but it's perfect for a folder with a few gigs of files 👌🐧✅
Never with cryptomator👌
Cryptomator does not encrypt the files in one large container file, but per every file. This procedure is better for files that are to be synchronized with a cloud or NAS.
@@thorstenn Exactly 👍
@@thorstennok so if I understand correctly if I want to securely store my files on my ssd, internal or external, I better go for VeraCrypt while Nas or Google drive or equivalent service Cryptomator?
@@amanterobot no not really.
Veracrypt has 2 approaches. The first is to encrypt the whole SSD, so it I similar to disk encryption.
The second is that it creates a file (container) that presents to your system as an additional disk. That would contain all your files.
Cryptomator encrypts each file separately (you can see them with weird names under the folder structure as items not what they really are). A good thing for Cryptomator (and negative for Veracrypt ) is that if a file gets corrupted on Cryptomator it will only affect that file. If the volume gets corrupted in Veracrypt say buy buy to the whole volume .
What was the deal with truecrypt becoming veracrypt?
vera means true in some language
I get operation not permitted when trying to create the volume.
I use byte order manipulation to protect my files. No passwords needed.
😍
Problem of encryption is the non-accessibility across platforms(MacOS / Windows / Linux)
Mac’s built in FileVault encryption will allow you to make folders like this not just encrypt the entire drive. I realize VeraCrypt is cross platform but I wonder how they compare otherwise. I worry that a future OS update will kill veracrypt or it will stop being maintained
i Wouldn't trust anything #apple does. Especially if its built-in by them.
2:03 -3:29 , 4:09- 6:11 ,9:50
❤
I have a very big missing feature in veracrypt...(or in all similar products) That would be a burner password.. . its already has the hidden volume feature, but i would like to have one that is ERASES the container if i give it a specific password... not just faking it with a hidden volume, i would like to see a killswitch in this, so if i give a specific password the volume will be corrupted irrecoverably, so the cannot achieve anything with forcing me to open it... Also how can you automount these, since if i have a server that i want to use encrypted hdd's then how do i automount safely after a restart? So vera is good, but it has its limits too, i like it i am using it, but i have ideas... XD
what happen you forgot you encrypted password ?
you lose access to all your files
What's a "merch"?
Are containers available for Android?
Yes, there are apps like "EDS Lite" and "EDS NG" which can handle veracrypt containers. I tested the former a few years ago, and it worked well except for a few minor UI bugs. I can't say whether everything still works the same way nowadays.
@MarcoIino
Thankyou for your reply
What happened to truecrypt
It was insecure and had vulnerabilities. This is a fork of that one.
Another surface level knowledge but thanks
Lost your key it's mean lost your whole digital assets in it
Hasn't VeraCrypt been cracked?
no perhaps you're thinking of truecrypt
I don't have any darter. 😁
I love a good debate hahahahaha
Password managers want your Windows Computer Inlog when you want to remove a listed Password.
Meaning: Browers read EVERYTHING in your Device.
Logo Hackers arrive in Boots and start to work from there.
When you find - hide a Computer Generated Password for Sandboxes... the Browser has already read it.
Its no longer 'a security tool'.
We are being mindf..cked for money onlyt.
Who does an entire video on a product, THEN doesn't put a link to it in the description?!?
Am I missing something?
Hi, we're a really small team with hardly any resources for our work. Sometimes we forget things. Thanks for the reminder, and if you want to help support our free educational content, please visit nbtv.media/support 💛
I was _very_ tempted to put a link to Veracrypt using the "Let Me Google That for You" service. But Naomi was much nicer with her response... 😁
@@DavidHuffTexas I DID Google it. My point was that IF you want people to use what you are offering (or reviewing) a link in the description is standard practice.
@@NaomiBrockwellTV I get it, I'm a team of One channel (actually a couple of channels). I have systems in place to ensure everything gets into the upload just so I don't forget anything. (Now watch me forget something important on my next upload).
@@NTC_Transport My issue is that you pointed it out in a rather abrupt, rude way and the channel owner politely fixed what you were complaining about. She was much nicer about _that_ than I would have been...
We need a mobile version of this program.
Nope we got it
Eds lite on Android
You are cute btw
Back in the there was an app called pgp I think. It was supposed to be totally secure. Then the inventor of the app went to jail. No one was able to break the encryption. Then he was forced to sell and new owners put a back door into the app. I think that's what happened. Pgp stood for pretty good privacy.
No this isn't what happened :) PGP is the most widely used email encryption protocol in the world.
No access don't worry
My computer crashing
what format to use with Mac ?