Let’s start with a confession: I didn’t care about encryption until I almost got burned. A few years ago, I uploaded a folder to Google Drive without a second thought. A week later, I accidentally shared the entire folder publicly while troubleshooting a sync issue. For 12 agonizing hours, sensitive data sat exposed. Thankfully, no one noticed, but that cold sweat moment changed everything.
Now? I encrypt everything before it touches the cloud, because I’ve learned the hard way that trusting Big Tech’s “secure by default” promises is like trusting a screen door on a submarine.
Why Bother Encrypting Before Uploading?
You say, “Google encrypts my data! So does Dropbox!” True. But here’s what’s interesting: They hold the keys. If their systems get hacked (or a rogue employee gets curious), your “encrypted” data becomes a buffet.
Let me put it this way: Encrypting locally is like mailing a locked safe instead of a postcard. Even if the mail truck crashes, your secrets stay hidden.
Three Reasons to DIY:
Zero-Knowledge = Zero Trust: You’re the only one with the decryption key. Not the cloud provider, not the NSA, not even that sketchy third-party app you granted access to last Tuesday.
Oops-Proofing: Ever misclicked a sharing setting? I have. Local encryption means that even if you accidentally set a file to “public,” all anyone sees is gibberish.
BYOC (Bring Your Own Cipher): Want to use an encryption method so niche it’d make a cryptographer blush? Go nuts. The cloud just sees scrambled eggs.
The Tools
I’ve split these into categories because, let’s be real, not everyone wants to live in Terminal. Choose whatever works best for you:
1. VeraCrypt
VeraCrypt is the Swiss Army knife of encryption. It’s powerful, slightly intimidating, and looks like it was designed in 2005 (because it was). But holy hell, does it work.
My Love/Hate Relationship:
Pros:
Create encrypted containers (think: virtual vaults) or encrypt entire drives.
Supports multiple ciphers (AES, Serpent, Twofish) you can stack like a crypto lasagna.
Hidden volumes: Perfect for plausible deniability. “No, officer, that’s just my vacation photos. Nervously sweats in 50GB of random noise”!
Cons:
The UI feels like a spreadsheet. First-time setup involves more clicks than assembling IKEA furniture.
Pre-boot authentication once locked me out of my own laptop for 3 hours. Pro tip: Write. Down. Your. Password.
When to Use It:
You’re encrypting a backup drive with nuclear codes (or your fanfiction archive).
You want to pretend you’re Jason Bourne.
Script I Use for Containers:
veracrypt --text --create /path/to/container \ --size=10G \ --hash=sha512 \ --encryption=aes-twofish-serpent \ --filesystem=exfat \ --volume-type=normal
2. Cryptomator
If VeraCrypt is a vault, Cryptomator is a sleek, cloud-friendly safe deposit box.
Why I Swear By It:
Transparent Encryption: Unlock your vault, and files sync to the cloud already encrypted. No manual steps.
Filename Obfuscation: Your “TopSecretProject.docx” becomes “d7f9a2b4c1” in the cloud. Metadata? What metadata?
Cross-Platform Zen: Works on Windows, macOS, Linux, iOS, Android. Even my grandma’s iPad.
Mobile apps can lag when opening large vaults. I once tried accessing a 20GB vault on my phone and watched it chug like a ’90s dial-up modem.
3. AxCrypt
AxCrypt is the Tylenol of encryption: quick, simple, and perfect for emergencies.
My Go-To Move:
Right-click a file > Encrypt. Done. It’s idiot-proof, which is why I use it when I’m feeling particularly idiotic.
But Beware:
The free version only uses AES-128. Is that bad? No. Is it overkill for your grocery list? Also no.
Once, I encrypted a file and forgot the password. AxCrypt’s response: “Lol. Good luck.” Moral: Use a password manager.
When to Use It:
Encrypting a file you’re emailing to your accountant.
Pretending to be productive during Zoom meetings.
4. PeaZip
PeaZip is like 7-Zip’s overachieving cousin. It supports 200+ archive formats and lets you encrypt with AES-256, Twofish, or Serpent.
Cascaded Ciphers: Encrypt with AES and Twofish for “belt-and-suspenders” paranoia.
Portable Version: I keep it on a USB drive labeled “DOOM MODS” (for plausible deniability at LAN parties).
Pet Peeve:
Compression + encryption takes forever on old hardware.
5. 7-Zip
7-Zip is the Toyota Corolla of encryption: not flashy, but it’ll outlive us all.
How I Use It:
Right-click > 7-Zip > Add to archive…
Set password.
Enable “Encrypt file names” (because “tax_returns_2023.7z” is a dead giveaway).
Terminal Magic:
#!/bin/bash
# Prompt for password silently
read -s -p "Enter archive password: " PASSWORD
echo
# Confirm password (optional but recommended)
read -s -p "Confirm password: " PASSWORD_CONFIRM
echo
# Check if passwords match
if [ "$PASSWORD" != "$PASSWORD_CONFIRM" ]; then
echo "Passwords do not match. Exiting."
exit 1
fi
# Set variables
ARCHIVE_NAME="secret_files.7z"
TARGET_DIR="$HOME/Documents/embarrassing_stuff"
# Run 7z with secure password input
7z a -t7z -p"$PASSWORD" -mhe=on -mx=9 "$ARCHIVE_NAME" "$TARGET_DIR"
# Clear password variables from memory
unset PASSWORD
unset PASSWORD_CONFIRM
Translation:
“Politely ask me for a password (without showing it), double-check I didn’t mess it up, then compress and lock up my embarrassing files using maximum compression and filename encryption. After that, forget everything we just talked about.”
6. Encrypto
Encrypto is drag-and-drop encryption for people who think CLI stands for “Can’t Locate Instructions.”
Why It’s Great:
Drag file onto Encrypto. Enter password. Get encrypted .crypto file.
Password hints let you troll recipients: “Hint: Your WiFi password from 2015.”
7. GnuPG (GPG)
GPG is the OG of encryption. It’s not user-friendly, it’s user-hostile, but mastering it feels like joining a secret society.
My GPG Ritual:
Generate a key pair: gpg --full-generate-key
Export public key: gpg --export -a "Your Name" > public.key
Encrypt a file: gpg --encrypt --recipient "their@email.com" secret.txt
Why should you do this?:
Public-key crypto: Only the recipient’s private key can decrypt it.
Digital signatures: Prove you sent the file and that it wasn’t tampered with.
8. NordLocker
NordLocker is the Instagram influencer of encryption: slick, cloud-synced, and oddly satisfying to use.
Pros: 3 GB free storage, zero-knowledge sync, and a UI that doesn’t look like a spreadsheet.
Cons: The word “Nord” makes me think of VPN ads.
You can store vacation photos here. Not because they’re sensitive, but because you wouldn’t want Google Photos’ AI judging your karaoke fails.
9. Boxcryptor
Boxcryptor encrypts files across 30+ cloud services. It’s like a universal translator for your data.
Boxcryptor works with OneDrive, Dropbox, Google Drive, and even obscure ones like pCloud.
Filename encryption (paid feature) hides metadata.
Free tier limits you to two devices.
10. EncFS
EncFS is a FUSE-based tool that encrypts individual files. It’s lightweight, scriptable, and slightly reckless.
My Workflow:
encfs ~/Encrypted ~/Decrypted
# Work in ~/Decrypted
fusermount -u ~/Decrypted # When done
Why I Ditched It:
EncFS has known metadata leaks. After realizing my encrypted folder’s file sizes matched my family photo collection, I switched to gocryptfs.
Encryption as a Habit
Encryption isn’t a one-time fix, it’s a mindset. Here’s how I stick with it:
Automate: Use tools like Cryptomator or Boxcryptor that auto-encrypt during sync.
Backup Keys: Store passwords and recovery keys in a physical safe.
Test Restores: Once a month, decrypt a file to ensure you’re not locked out.
Discover more from Aree Blog
Subscribe now to keep reading and get access to the full archive.