

One type of product simply processes files and folders, turning them into impenetrable encrypted versions of themselves. The two main approaches in encryption utilities parallel these options. It does mean that if you encrypt an essential document and then forget the encryption password, you've lost it for good.īack in the day, if you wanted to keep a document secret you could use a cipher to encrypt it and then burn the original. As my colleague Max Eddy pointed out in a past article about one-time Attorney General Barr's ignorance of encryption, "a backdoor is still a door and even a door with a lock on it can be opened."Īll the products in this roundup explicitly state that they have no back door, and that's as it should be. Why wouldn't Apple help? Because the moment a back door or similar hack exists, it becomes a target, a prize for the bad guys. The FBI had to hire hackers to get into the phone.

But no such back door existed, and Apple refused to create one. When the FBI needed information from the San Bernardino shooter's iPhone, they asked Apple for a back door to get past the encryption. It's Surprisingly Easy to Be More Secure Online
#Boxcryptor alternatives how to#
How to Set Up Two-Factor Authentication.How to Record the Screen on Your Windows PC or Mac.How to Convert YouTube Videos to MP3 Files.

How to Save Money on Your Cell Phone Bill.How to Free Up Space on Your iPhone or iPad.How to Block Robotexts and Spam Messages.
