Security distribution

Decryption

Opening an encrypted container is a smooth experience: Select the Scan for CryptoBox Volumes item in the Applications | System Tools menu to select the desired drive in a simple dialog window and then enter the passphrase. The volume can then be used transparently in the file manager. To close an open container volume, click on the volume icon, and select the item the context menu.

Windowing

The CryptoBoxes also run on third-party computers – if an appropriate infrastructure such as LUKS or VeraCrypt is in place. The systems mount the boxes in read-only mode, so that no unwanted data ends up on the volume. To open the container, you need the passphrase specified on the original system.

Passwords and Keys

GnuPG [7], Seahorse [8], and a matching Gnome GUI help users keep the cryptographic keys safe that secure the communication. You can use USB sticks to pass these keys on, if required. Also, several other tools help users with GnuPG management.

Figaro's password Manager 2 [9] is a graphical tool to help you manage the flood of passwords required by today's application programs, thus offloading the task from the user. The software is found in the Applications | Security menu. This where you will find version 1.19 of the TrueCrypt successor VeraCrypt [5] and the MAT program [10] (Figure 3). MAT anonymizes the metadata, which some file formats store in the background, as well as which users to be profiled under certain circumstances. The small tool makes such data unusable for unauthorized third parties.

Figure 3: Discreete Linux has multiple security applications, including MAT and VeraCrypt.

Buy this article as PDF

Express-Checkout as PDF
Price $2.95
(incl. VAT)

Buy Linux Magazine

SINGLE ISSUES
 
SUBSCRIPTIONS
 
TABLET & SMARTPHONE APPS
Get it on Google Play

US / Canada

Get it on Google Play

UK / Australia

Related content

  • VeraCrypt

    Protect your data and operating system from prying eyes with VeraCrypt.

  • VeraCrypt

    The VeraCrypt encryption software comes with a handy graphical interface, and the ability to hide a container in an encrypted volume adds a unique professional feature: plausibly deniable encryption.

  • TruPax 9

    The TruPax tool specializes in encrypting small datasets to safeguard your data from prying eyes.

  • Critical Flaws Found in VeraCrypt

    Popular open source encryption tool is vulnerable to attack

  • Disk Encryption

    Encrypted volumes have long since ceased to be an exception or luxury. Corporate policies and compliance rules often demand encryption for critical data. This article looks at tools for disk encryption on Linux.

comments powered by Disqus
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Subscribe to our ADMIN Newsletters

Support Our Work

Linux Magazine content is made possible with support from readers like you. Please consider contributing when you’ve found an article to be beneficial.

Learn More

News