What is the best way to encrypt a USB drive that can be used on multiple OSes?
from ninjaturtle@lemmy.today to privacy@lemmy.ml on 29 Aug 04:24
https://lemmy.today/post/15434419

Not sure is this is the best place to post this question, but wondering what is the best way to encrypt a usb drive?

Want to be able to carry an encrypted flash drive with me but also be able to unlock it, if possible, on various OSes. Preferably with some kind of portable software. Something similar to the method that comes with the Kingston Data Traveler USB drives.

Edit: Seems like Veracrypt and Cryptomator are the best options to check out. Thank everyone!

#privacy

threaded - newest

kali@fedia.io on 29 Aug 04:31 next collapse

Probably far from the best option; but you could use 7zip? Put a 7zip portable exe & linux binary on the usb, put the regular contents in an encrypted .zip file, anyone with the password can decrypt. I assume there are much more secure options though.

delirious_owl@discuss.online on 29 Aug 20:56 next collapse

7zip encryption is solid, but the problem with this is that you don’t Mount 7zip, so you have to extract it. Once you extract encrypted files into a drive thats not encrypted, they may as well never have been encrypted in the first place.

Its better to use a tool that creates an encrypted filesystem that you can mount and read-write directly without copying the files onto another disk

possiblylinux127@lemmy.zip on 31 Aug 06:10 collapse

Encrypted ZIPs are very trivial to break. I can break it with a simple python script.

For instance, Microsoft does that for all encrypted ZIPs

arstechnica.com/…/microsoft-is-scanning-the-insid…

Hirom@beehaw.org on 31 Aug 10:30 collapse

ZIP isn’t a good way to encrypt, but what Microsoft is doing is simply reading the email, and decrypting zips with the password found in the email body.

All encryptions schemes can be trivially broken if you have the key. It’s not even breaking, it’s just normal decryption.

possiblylinux127@lemmy.zip on 31 Aug 16:32 collapse

No, zip encryption is very weak. Thus is because million of combinations can be tried very quickly

Hirom@beehaw.org on 31 Aug 17:38 collapse

While that’s true, but there’s no indication of Microsoft brute forcing with million of combinations.

The article you link says Microsoft is only trying a few obvious passwords: the filename, and words found in the plaintext message.

Proper encryption isn’t just about using a strong algorithm. It’s also about proper key management, ie not sending the password in the clear via the same channel as the encrypted files.

possiblylinux127@lemmy.zip on 31 Aug 18:00 collapse

Well no ZIP is not secure. There is a plethora of software that can brute force it.

Do not trust zip encryption. It is not secure and it will likely never be secure. It is like storing your passwords on a spreadsheet

rmtworks@lemmy.world on 29 Aug 05:02 next collapse

Cryptomator might be a good option. They have clients for Windows, macOS, and Linux. It’s designed around encrypting your cloud storage but nothing should stop you from using it on a USB drive.

mp3@lemmy.ca on 29 Aug 06:05 collapse

That what I use, the key itself is formatted using ExFAT for compatibility with all major OSes, and using Cryptomator to encrypt the files.

Novi@sh.itjust.works on 29 Aug 05:03 next collapse

Veracrypt. Make a file on your disk.

Don’t want a storage file?

Make 2 partitions, put veracrypt portable exe on the first normal storage partition. (fat32 is likely ideal here) Second partition formatted with veracrypt.

scytale@lemm.ee on 29 Aug 07:29 next collapse

+1 for veracrypt. Very convenient.

Deconceptualist@lemm.ee on 29 Aug 09:08 next collapse

This, except consider exFAT. It’s more modern than FAT32 but also widely compatible.

howtogeek.com/…/whats-the-difference-between-fat3…

Novi@sh.itjust.works on 29 Aug 13:31 next collapse

I would not just default to exfat because it is “newer,” it does have compatibility issues on non-windows systems. The implementations differ wildly.

Deconceptualist@lemm.ee on 29 Aug 19:26 collapse

Back when I used Windows, it worked fine for me out of the box between Win7 and both Ubuntu-based and Arch-based Linux distros 🤷

PM_Your_Nudes_Please@lemmy.world on 30 Aug 23:18 collapse

I have had major issues with exFAT across a variety of platforms. But I also work with a bunch of niche gear. But my point is simply that being widely compatible isn’t the same as being fully compatible. And OP was asking for the best way to reach the widest compatibility. That calls for FAT32, even if it has issues with things like file size.

curry@programming.dev on 30 Aug 16:33 next collapse

I make 1 single partition for the entire drive and encrypt it with veracrypt. Veracrypt has portable executables for windows and if I lose the flash drive in the worst case people will think it’s a corrupted disk (unrecognized partition) and reformat them probably.

PM_Your_Nudes_Please@lemmy.world on 30 Aug 23:15 collapse

This was my immediate thought as well. Portable launchers for the various OS’es on a tiny (just large enough to store the launchers) FAT32 partition, then a large FAT32 partition (the majority of the drive) encrypted by VeraCrypt. As long as it can read FAT32 and run VeraCrypt, it’ll be compatible. And that covers Windows, Linux, Raspberry Pi, and Mac ecosystems. It’s not as simple as just plugging it in and getting a password prompt, but it’s going to be the most compatible while still allowing for (nearly) the entire drive to be encrypted.

Novi@sh.itjust.works on 30 Aug 23:35 collapse

👏👏

lostinasea@lemmy.world on 29 Aug 05:39 next collapse

The best option is going to be a USB drive that has an external key entry feature. Kingston IronKey has these and its as simple as enter a key and plug in. I use them at work and it works on all the major OSes. They’re not cheap though so if you want or are looking for a free solution then something like VeraCrypt portable and an encrypted container will be your next best option.

delirious_owl@discuss.online on 29 Aug 20:56 collapse

Ooff, terrible advise

lostinasea@lemmy.world on 30 Aug 02:30 collapse

How about you tell me why instead of just saying “TeRribLe AdViSe.”

delirious_owl@discuss.online on 30 Aug 16:51 collapse

Because historically when FDE is done in hardware there’s been massive compromises. FDE is better done in software. Its more secure.

But, sure, there’s no shortage of companies trying to sell you shitty hardware thats “100% secure” (which is a major red flag)

lostinasea@lemmy.world on 31 Aug 03:46 collapse

Nothing is 100% fool proof. Hardware or software encryption both have their issues. Case in point, Truecrypt (on which VeraCrypt is based) had a few issues that ultimately led to its demise. Hardware devices (I saw mention of one SSD maker) a few or years ago would store keys on the device that could be read off. So you’re going to have to give me a source for “FDE is better done in software. It’s more secure” beyond “just trust me bro.”

delirious_owl@discuss.online on 31 Aug 03:59 collapse

Lol wut. What was the issue with TrueCrypt? I don’t think we ever found out. The anon dev just bailed and hilariously told people to use bitlocker. Personally I think they were just trying to be funny. Fortunately veracrypt took over development.

lostinasea@lemmy.world on 31 Aug 05:47 collapse

I’m not sure what the original issues were either but I do remember the message on the TrueCrypt site that said something like “warning, do not use. Contains unfixed security issues.” The only thing that might explain that is this line from Wikipedia: “TrueCrypt includes two vulnerabilities in the driver that TrueCrypt installs on Windows systems allowing an attacker arbitrary code execution and privilege escalation via DLL hijacking” Personally I believe the guy just didn’t want to maintain the thing anymore and abandoned it with no notice. Either way. Good thing VeraCrypt took over and fixed all those issues.

CyberSyndicalist@hexbear.net on 29 Aug 07:52 next collapse

I’ve used Veracrypt when I’ve needed something portable with windows and linux. Been a few years so might be better options now.

Extrasvhx9he@lemmy.today on 29 Aug 09:07 next collapse

Yup Veracrypt is great even has a portable version that can be kept on the drive (might still need admin privileges though) so you won’t have to install it on the system iirc . Would also go with cryptomator if you plan on using it with mobile systems but it has a one time payment for mobile.

subpar_nsfw@lemmy.world on 29 Aug 21:59 next collapse

Get a Kingston IronKey. I have personally used the D500S. This is an off the shelf solution so it is a bit pricy. But it does look like they have lower versions in the same product line. Maybe you will find something that fits your budget.

pna@fed.dyne.org on 31 Aug 08:16 collapse

Tomb on macos and Linux dyne.org/tomb