Secure Disk Encryption Software
CipherShed is free (as in _ free-of-charge _ and _ free-speech _ ) encryption software for keeping your data secure and private. It started as a fork of the now-discontinued TrueCrypt Project. CipherShed is cross-platform; It is available for Windows, Mac OS X and GNU/Linux. Although, as packages for OS X and Linux do not exist, yet, users of those platforms will need to compile CipherShed.
CipherShed is a program that can be used to create encrypted files or encrypt entire drives (including USB flash drives and external HDDs). There’s no complicated commands or knowledge required; a simple wizard guides you step-by-step through every process. After creating an encrypted file or disk drive, the encrypted volume is _ mounted _ . The mounted volume shows up as a regular disk that can be read and written to on-the-fly. The encryption is transparent to the operating system and any programs. When finished, the volume can be _ unmounted _ , and stored or transported elsewhere, fully secured. Encryption volumes can be moved from OS-to-OS (eg, Windows to Mac) with full compatibility.
- If you are interested in contributing code, please see code development process .
- Information on building from source on Windows can be found here .
- Information on building from source on GNU/Linux can be found here .
- Information on building from source on OS X can be found here .
- Information on the current license and future license goals can be found here .
- For a detailed list of contributors to the project, please see Who’s Who page.
Throughout everything with do, we try to follow these principles:
- Keep It Simple, Stupid (KISS): Avoid complicated solutions whenever possible. Simpler solutions are both easier to implement, maintain, document, and understand. This also includes avoiding unnecessary feature creep; we prioritise enhancing and maintaining current features over adding new features.
- Collaboration: We should encourage collaboration with other FOSS projects and external organisations to reduce duplication and increase our software’s interoperability.
- Openness: Contributions are publicly viewable and verifiable so anyone can confirm the software is correct and secure. Contributors are encouraged to also be publicly viewable (non-anonynous) and verifiable to be trustworthy entities.
- Paranoia: Trust no one. Trust nothing. Assume everyone else is a malicious actor and that everyone’s machines are compromised by adversaries.
- Least Privilege: People should only have the access and privileges needed to perform their tasks, and nothing beyond that.
- Constant Code Review: Everyone is strongly encouraged to be examining, testing, and verifying the integrity of our code. Our software is only trustworthy and secure if people are actively ensuring it is so.