3 ways to keep sensitive files encrypted on a flash drive or external hard drive

http://www.pcworld.com/article/2980184/storage/3-ways-to-keep-sensitive-files-encrypted-on-a-flash-drive-or-external-hard-drive.html

Useful or waste of time? (Pertaining to Flash Drive)


Comments


[3 Points] drimilr:

Luks for linux - whole disk encryption would be sufficient. Dont forgetthepassword!


[2 Points] Yourconscious69:

This is pretty common. I suggest keeping everything related to your DNM activity on a flash drive that is encrypted. I would not not trust any "encryption" programs that come preinstalled on them though and encrypt them yourself. Tor browser/files, electrum/wallet, PGP program/keys, etc. Assuming you dont use tails that comes with all that already on it.


[1 Points] None:

Been having a lot of fun playing my new "computer game", and as I am getting just slightly more invested in this exciting little social phenomenon, I was thinking about switching to tails, which I already have formatted just in case.

I guess I should delete anything tor related etc. from my default OS, but wouldn't it be possible for LE to get into the system and see that I had had all that stuff at one point? If I do switch to tails, which I am becoming more and more convinced that I should, would I have to do a system reset to wipe all the DNM related programs or what?


[1 Points] cryptocreepo:

This article is very MS Windows based.

There are a few better options on Linux.

Also,

I highly recommend that you be serious about your passwords, the usual mix of characters and length at least 12 characters.

Encrypted storage can be unlocked by LE when the password can be cracked using modern computer software.


[1 Points] throwawayacctforqs:

Is there a way to encrypt the thumb drive I store the TAILS system on? That is, can I require a password to be entered on bootup before anyone can (1) boot from TAILS, or (2) see that TAILS is on that drive? If so, how do I do it? My PGP key and other sensitive info is under serious encryption and steganographic concealment on a thumbdrive, but I always felt that having a drive with TAILS on it lying around was an OPSEC weakness. I'm not a computer wiz, but I know the basics, understand Veracrypt and PGP, and I'm certainly not a newbie. Any help would be appreciated!


[1 Points] 1percentof1:

This comment has been overwritten.