Skip to main content

Questions tagged [file-encryption]

The process of encrypting individual files on a storage medium and permitting access to the encrypted data only after proper authentication is provided.

0 votes
1 answer
143 views

I would like to be able to store backups on potentially "untrustworthy" sources such as cloud storage. Whilst I could probably get away with a simple encrypted tar file, for a single backup, ...
Sam Coutteau's user avatar
1 vote
1 answer
118 views

So I'm implementing RSA encryption. I'm processing input in chunks of known constant size (depends on modulus) but the last chunk might be smaller so I save its size in plaintext at the end of output ...
Maq's user avatar
  • 113
1 vote
0 answers
160 views

Say you have a machine where the disk (eMMC) is non-removable like the Surface Go. If the UEFI configuration is protected with a long password, USB + network boot is disabled, and your user has a long ...
Jan Sommer's user avatar
0 votes
1 answer
118 views

GPG allows file encryption for multiple recipients. I prefer to encrypt files: Only to recipient subkeys shared with me by the intended recipients, like so: $ gpg --encrypt --armor --recipient <...
Suhas Srivastava's user avatar
1 vote
1 answer
127 views

I need to continuously encrypt a set of files so that I can send them to a group of people that I trust and who trust among themselves. Thus I would ideally use a symmetric encryption scheme with one ...
René Nyffenegger's user avatar
3 votes
1 answer
503 views

I'm working on a secure app that uses the user's master password to derive a symmetric key to encrypt all the user information. I want to add FaceId support now, and the approach I was thinking of was ...
Enric's user avatar
  • 133
1 vote
1 answer
156 views

i.e. To allow an unofficial software modification (which is too extensive to distribute as delta/patch files) to be distributed while ensuring the user owns the original software, it would be ...
Hiccup's user avatar
  • 119
3 votes
1 answer
248 views

Goal: I'm seeking feedback on the most secure setup for creating and accessing an encrypted database (KDBX4 format) that minimizes exposure to potential remote attacks. This database will contain ...
arderstt's user avatar
1 vote
2 answers
542 views

So for this project I'm looking into encrypting a binary. My binary should be protected by some means, making sure we know on the other end it was us who packaged/encrypted it. For this simple task ...
Foitn's user avatar
  • 121
1 vote
2 answers
272 views

I have access to a big remote server via SSH and I'm a root user on that server. However, there are multiple other root users who also have access to this server. I want to run some Fortran/C programs ...
Akhil Akkapelli's user avatar
0 votes
1 answer
99 views

Can ISPs see file names and file types that are being downloaded from zero knowledge end to end encrypted cloud storage folders like mega.
Robert Bak's user avatar
0 votes
2 answers
335 views

I'm in the process of trying to make my current laptop setup more secure, especially I'm planning to finally use FDE and enable Secure Boot. However, I'm still unsure on how to handle sensitive, ...
zhekemist's user avatar
11 votes
4 answers
4k views

I am looking to implement a secure passphrase-encrypted file format for a specific use case. The file format consists storing a randomly generated salt and IV along with the cipher text and a MAC to ...
dylanweber's user avatar
0 votes
0 answers
141 views

I am learning the PKC topics and would like to understand about the master and session key generation process regarding NTRU. Let's make it a scenario, if a user wants to register during the ...
Chris Lo's user avatar
1 vote
1 answer
2k views

I have an encrypted data containig some of my data that I am unable to decrypt. It is archived with tar, compressed with gzip and encrypted with gnupg. Today I tried to decrypt it with gpg and it ...
Nicolas Dumitru's user avatar

15 30 50 per page
1
2 3 4 5
34