Shared publicly  - 
What's your encryption strategy?
Dear Lifehacker, I've read a number of articles recently about encryption and keeping my personal data safe. I can see the need for protecting financial information, but what other info do I really ne...
Matthew Jacobs's profile photoRena Stęborowska's profile photoAlexander McCann's profile photoJuliane Clausen's profile photo
i encrypt everything, and if the FBI come and kick down my door, i have a magnetic strip lined with thermite in my CPU. #paranoid
yeah and i am using windows right now but i only use windows for innocent web browsing like facebook and g+, and steam. i have ubuntu for all coding and photoshop and everything work related. and for everything else... t.a.i.l.s
No....not everything is encryptable and/or may have loopholes or errors. A lot of things are coded and so when it's encrypted may have a false truth to it.
Ubuntu allows for easy, built-in-to-the-OS encryption of your entire home directory - great for laptops.
I have a TrueCrypt drive-in-a-file that I can mount and dump stuff into if it's sensitive. I don't feel like encrypting my whole OS. As a gamer, the performance hit for encrypting the entire OS isn't worth the added security. Plus, as my OS isn't encrypted, I can keep my TrueCrypt closed and secured when doing insecure things, whereas someone who's got their entire drive encrypted only benefits from the encryption while the system is off. (Which wouldn't protect me, since my machines are on 24/7, someone could walk up and break in while they're on.)
I encrypt my home directory on my laptop and desktop. It's ridiculously easy on Ubuntu, anyway. I just select the option during installation, and I'm done. My computers have been stolen before, and I would rather not make identity theft too easy if it ever happens again.
BitLocker - set it and forget it. BitLocker To Go for USB memory keys. We use the same thing at work with great success.
If you are using already made applications for encrypting data wouldn't the government know about it and easily use a reverse algorithm to access the offending data? Just a thought I had. Wouldn't you have to make your own algorithm for it to be totally secret?
I just create a Truecrypt locker that's hidden inside another file that I keep backed up to Spideroak with their encryption on top of the truecrypt encryption. Only the stuff I care about others seeing is encrypted that way, everything else is meh.
+Brandon Wilson It's far more complicated than that. Modern encryption uses algorithms that can't be reverse-engineered easily. Depending on the quality of the encryption, cracking it can take quite a lot of time and money. Nothing is perfect, but the point is to make it harder than it would be worth.

In reality, if you're facing trouble with a government, they would be more likely to try to find a way to get you to give up your password. (in the US, that would probably be through trickery or deals)
OS runs on an unencrypted SSD, Truecrypt for whole-disk encryption of the HDD data drive. Weak windows password, since its exposed to ophcrack, strong encryption key. Backup with SpiderOak.
Add a comment...