Lucene search

K
n0whereN0whereN0WHERE:20420
HistoryAug 05, 2014 - 9:54 p.m.

Secure Disk Encryption Software: CipherShed

2014-08-0521:54:41
n0where.net
16

Secure Disk Encryption Software


CipherShed is free (as in _ free-of-charge _ and _ free-speech _ ) encryption software for keeping your data secure and private. It started as a fork of the now-discontinued TrueCrypt Project. CipherShed is cross-platform; It is available for Windows, Mac OS X and GNU/Linux. Although, as packages for OS X and Linux do not exist, yet, users of those platforms will need to compile CipherShed.

CipherShed is a program that can be used to create encrypted files or encrypt entire drives (including USB flash drives and external HDDs). There’s no complicated commands or knowledge required; a simple wizard guides you step-by-step through every process. After creating an encrypted file or disk drive, the encrypted volume is _ mounted _ . The mounted volume shows up as a regular disk that can be read and written to on-the-fly. The encryption is transparent to the operating system and any programs. When finished, the volume can be _ unmounted _ , and stored or transported elsewhere, fully secured. Encryption volumes can be moved from OS-to-OS (eg, Windows to Mac) with full compatibility.

Secure Disk Encryption Software: CipherShed

Quick Links

  • If you are interested in contributing code, please see code development process .
  • Information on building from source on Windows can be found here .
  • Information on building from source on GNU/Linux can be found here .
  • Information on building from source on OS X can be found here .
  • Information on the current license and future license goals can be found here .
  • For a detailed list of contributors to the project, please see Who’s Who page.

Philosophy

Throughout everything with do, we try to follow these principles:

  • Keep It Simple, Stupid (KISS): Avoid complicated solutions whenever possible. Simpler solutions are both easier to implement, maintain, document, and understand. This also includes avoiding unnecessary feature creep; we prioritise enhancing and maintaining current features over adding new features.
  • Collaboration: We should encourage collaboration with other FOSS projects and external organisations to reduce duplication and increase our software’s interoperability.
  • Openness: Contributions are publicly viewable and verifiable so anyone can confirm the software is correct and secure. Contributors are encouraged to also be publicly viewable (non-anonynous) and verifiable to be trustworthy entities.
  • Paranoia: Trust no one. Trust nothing. Assume everyone else is a malicious actor and that everyone’s machines are compromised by adversaries.
  • Least Privilege: People should only have the access and privileges needed to perform their tasks, and nothing beyond that.
  • Constant Code Review: Everyone is strongly encouraged to be examining, testing, and verifying the integrity of our code. Our software is only trustworthy and secure if people are actively ensuring it is so.

Secure Disk Encryption Software: CipherShed wiki

Secure Disk Encryption Software: CipherShed Download