Security distribution

Decryption

Opening an encrypted container is a smooth experience: Select the Scan for CryptoBox Volumes item in the Applications | System Tools menu to select the desired drive in a simple dialog window and then enter the passphrase. The volume can then be used transparently in the file manager. To close an open container volume, click on the volume icon, and select the item the context menu.

Windowing

The CryptoBoxes also run on third-party computers – if an appropriate infrastructure such as LUKS or VeraCrypt is in place. The systems mount the boxes in read-only mode, so that no unwanted data ends up on the volume. To open the container, you need the passphrase specified on the original system.

Passwords and Keys

GnuPG [7], Seahorse [8], and a matching Gnome GUI help users keep the cryptographic keys safe that secure the communication. You can use USB sticks to pass these keys on, if required. Also, several other tools help users with GnuPG management.

Figaro's password Manager 2 [9] is a graphical tool to help you manage the flood of passwords required by today's application programs, thus offloading the task from the user. The software is found in the Applications | Security menu. This where you will find version 1.19 of the TrueCrypt successor VeraCrypt [5] and the MAT program [10] (Figure 3). MAT anonymizes the metadata, which some file formats store in the background, as well as which users to be profiled under certain circumstances. The small tool makes such data unusable for unauthorized third parties.

Figure 3: Discreete Linux has multiple security applications, including MAT and VeraCrypt.

Buy this article as PDF

Express-Checkout as PDF
Price $2.95
(incl. VAT)

Buy Linux Magazine

SINGLE ISSUES
 
SUBSCRIPTIONS
 
TABLET & SMARTPHONE APPS
Get it on Google Play

US / Canada

Get it on Google Play

UK / Australia

Related content

  • VeraCrypt

    The VeraCrypt encryption software comes with a handy graphical interface, and the ability to hide a container in an encrypted volume adds a unique professional feature: plausibly deniable encryption.

  • TruPax 9

    The TruPax tool specializes in encrypting small datasets to safeguard your data from prying eyes.

  • Critical Flaws Found in VeraCrypt

    Popular open source encryption tool is vulnerable to attack

  • Mofo Linux

    Mofo Linux enables secure digital communications, even in places where it is politically or ideologically unwelcome.

  • Encrypted Filesystems

    If you’re not a security expert and you're looking for a crypto filesystem, you may be wondering about the alternatives. We took at a look at some popular crypto options for Linux.

comments powered by Disqus

Direct Download

Read full article as PDF:

Price $2.95

News