![]() While this enables cloud synchronization of just the files that really changed, it leaks the information how many files exist in a vault. ![]() Veracrypt creates just one container, so an attacker does not even know how many files you have.Ĭryptomator encrypts each file for its own. On the other hand if AES gets broken, we can not easily switch to let’s say Twofish without publishing a new release. Also our pre-chosen ciphersuite means less complexity and less attack surface. We don’t want to give the user all the choices, we want to offer a software that is as easy as possible. Our philosophy is slightly different here. This is beneficial to users who know exactly what they want.Ĭryptomator uses the ciphers and configurations that are known to work well with each other. Veracrypt lets you configure what ciphers and key lengths you’re using. I’ve heard that with the advances currently being made in computing, many of the encryption algorithms that are considered strong now may not be considered strong in the near future, and this is also a big concern of mine. Is the encryption algorithm used by Cryptomator “enough”? Is it substantially weaker than the encryption you can get with Veracrypt? This is what I’m not sure about. I want to know how valid these concerns are though. ![]() I’ve never felt completely comfortable with the fact that there’s so little customization available with Cryptomator - what you see is what you get. The fact that Veracrypt volumes can be encrypted with so many different algorithms (AES, Serpent, Twofish, Camellia, Kuznyechik, and ten different combinations of these) plus the fact that you can further customize the encryption by moving your mouse randomly within the Volume Creation Wizard for as long as you want (significantly increasing the cryptographic strength of the encryption keys) makes me feel as if Veracrypt must be far more secure than Cryptomator. Just make sure to tag the post with the flair and give a little background info/context.How does this stack up to Veracrypt though? I don’t understand enough about cryptography to make sense of this (despite the lack of a formal audit though, I’ve heard enough good things about the validity and trustworthiness of Cryptomator’s encryption that I’ve put my faith in it). On Fridays we'll allow posts that don't normally fit in the usual data-hoarding theme, including posts that would usually be removed by rule 4: “No memes or 'look at this '” We are not your personal archival army.No unapproved sale threads, advertisement posts, or giveaways.No memes or 'look at this old storage medium/ connection speed/purchase' (except on Free Post Fridays).Search the Internet, this subreddit and our wiki before posting. ![]() And we're trying really hard not to forget.ģ.3v Pin Reset Directions :D / Alt Imgur link Along the way we have sought out like-minded individuals to exchange strategies, war stories, and cautionary tales of failures. Everyone has their reasons for curating the data they have decided to keep (either forever or For A Damn Long Timetm). government or corporate espionage), cultural and familial archivists, internet collapse preppers, and people who do it themselves so they're sure it's done right. Among us are represented the various reasons to keep data - legal requirements, competitive requirements, uncertainty of permanence of cloud services, distaste for transmitting your data externally (e.g.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |