Encrypto File Level Encryption

One problem with encryption is the technical know-how required to use it. This is not inherently bad, but it does make using it with the uninitiated or disinterested a challenge. Fortunately there are some relatively user-friendly solutions we can employ to make encryption accessible to most, if not all. One such tool is Encrypto which offers extremely simple volume and file level encryption. Continue reading “Encrypto File Level Encryption”

Blur Privacy Service

I’ve mentioned the Blur privacy service a lot in the past but I’ve yet to fully review it. This post will serve as review, how-to, and as a chance to point out some important security features of the service. So what is Blur and why would you want to use it? That is hard to put into a single sentence. Most importantly for me, Blur offers a one-stop location from which I can mask my email address, my phone number, and my credit card. Unlike Pay With Privacy which I detailed last week, Blur is not a single-function service. Continue reading “Blur Privacy Service”

VeraCrypt Volume Level Encryption

VeraCrypt volume level encryption is perhaps one of the most common ways in which this program is utilized. It is also how I first became acqauinted with this TrueCrypt, it’s predecessor. If you are just starting with VeraCrypt, creating a working with a few volumes is a great way to ease into using encryption. If you don’t already have VeraCrypt, your first step will be to download and install it. Continue reading “VeraCrypt Volume Level Encryption”

FileVault Volume Level Encryption

A little known feature of FileVault is the ability to create encrypted volumes. Volumes are essentially encrypted file containers that can store a file or set of files. Volumes can be copied, emailed, burned to a DVD, or just set up as an additional layer of encryption for especially sensitive files. FileVault volume level encryption allows you to do this without needing a third-party application like VeraCrypt – assuming you don’t need to share these volumes with other operating systems.

Continue reading “FileVault Volume Level Encryption”

Volume Level Encryption Primer

Last week we wrapped up a big series on full disk encryption. Earlier this week I talked about full disk encryption for external media. Today I am going to begin talking about volume level encryption, and the next few posts will cover tools that you can use for this. First, though, I am going to talk about what it is, why you may want to use it, and why you may not. Continue reading “Volume Level Encryption Primer”

Bitlocker External Media Encryption

Encrypting external media is important. During the next part of this series on encryption I am going to discuss encrypting external media like USB flash drives or external hard drives. Because these drives are used as backups or to store sensitive data, and becaus they are easily lost, encrypting them is just as important as encrypting their hosts. Today’s post will cover using BitLocker external media encryption or as it is officially known, BitLocker To Go. Continue reading “Bitlocker External Media Encryption”

VeraCrypt External Media Encryption

As I’ve mentioned in the BitLocker and FileVault posts on the topic, encrypting external media is important. Flash drives are notoriously easy to lose (I’ve lost a few) and the information on them can be potentially devastating. There is one major advantage to using VeraCrypt instead of BitLocker or Filevault: it is cross-platform compatible. Continue reading “VeraCrypt External Media Encryption”

FileVault External Media Encryption

Encrypting external media is important. During the next part of this series on encryption I am going to discuss encrypting external media like USB flash drives or external hard drives. Because these drives are used as backups or to store sensitive data, and because they are easily lost, encrypting them is just as important as encrypting their hosts. We will begin again with FileVault external media encryption. Continue reading “FileVault External Media Encryption”

Privacy.com: Protect Your Bank Accounts

It is no secret that I am a major fan of Blur, the privacy service that allows you to mask your email address and phone number. One of my favorite features of Blur is credit card masking – the ability to create one-time-use credit card numbers that are billed to your real credit card. A new service has come along that allows you to create one-time use credit card numbers. The service is a little bit different than Blur, and has some advantages and disadvantages. It is called Privacy.com. Continue reading “Privacy.com: Protect Your Bank Accounts”

Private Internet Access for Linux

This week’s post will be the final how-to for Private Internet Access and will cover Linux. For this project I used Ubuntu running in a virtual machine. If you’re new to Linux and don’t know how to install applications in Linux, Private Internet Access’ website offers a good tutorial. Without further ado, Private Internet Access for Linux: Continue reading “Private Internet Access for Linux”