
Thanks again for the consideration and the wonderful tool. These are not high-skilled folks, but are able to use Google when they stumble upon a file with a very interesting name (ie. I would still request the ability to custom define the file name and extension (as pineapple.json, etc) as the target audience for my discussion are business partners, employees, etc., where the goal is to obfuscate that an encryption tool is being used. Yes, this would indeed solve the duress issue. At the first level key pairs are being exchanged. Following #300 also leads to #96 which discuss this much more eloquently than I am able. 2.2 Cryptomator Cryptomator 11 is the second tested external tool, which can be used for encrypting. Regarding plausible deniability (see also #300), the attacker could still do an entropy analysis to know what type of application you used to encrypt your files.Īgreed, but (1) the attacker would need to be sufficiently skilled to perform that analysis, and (2) they would need a reason to do so.
#Cryptomator exchange windows
Can't wait for the 1.6.0 release on Windows This sounds exciting! Being able to locate the keyfile in another location from the vault itself is a positive. Wow! Thank you for the amazingly fast response. If you want to use Cryptomator to encrypt files in the cloud, select. Now select the desired location for your encrypted folder. You can freely select the name of the vault. Click on 'Create Vault' to create a new encrypted folder. We have done such experiments already, but it isn't well supported by the UI yet. Click on the + symbol to expand the options. When unlocking with another key, you see a couple of cat pics. When unlocking with one key, you see your secret files. What if I told you, that instead of hiding that you use Cryptomator, you can theoretically mix two vaults. Regarding plausible deniability (see also #300), the attacker could still do an entropy analysis to know what type of application you used to encrypt your files. you agree Stack Exchange can store cookies on your device and disclose information in accordance with our Cookie Policy. 1.3.2) WebDAV server mounted via davfs2 (ver. 1:2.11.0-3+deb9u2) repository within a Cryptomator (ver. The bad news: Instead you need a vault.cryptomator file, which isn't particularly less obvious. On Linux Debian 9, Im trying to create a git (ver. If we could name the file as we wish (for example pineapple.json as others had suggested), we have plausible deniability that the data is anything, and need not be encrypted information. Is adding some form of stealth bad? An attacker, upon finding this obvious file (masterkey.cryptomater) now KNOWS that you have encrypted data here and could coerce you to turn over your key by duress, force, legal action, etc. You can move or rename the file and will be asked by Cryptomator to locate it when needed. The good news: This is in fact implemented in 1.6.0, however not very convenient. Please consider adding the ability to use a CUSTOM DEFINED masterkey filename and extension.
