Encryption and privacy good practices: did I get it right?

Dear all,

I would like to use my cell phone and notebook without the risk of my personal files being accessed by unauthorized people.

I do not intend to commit any crime, I just think I have the right not to have my things examined by strangers.

I did some research and, from what I read, these seem to be the established opinions:

  1. There is no way to 100% guarantee the protection of your cell phone against unauthorized access.

AppLock type apps or encrypting your cell phone only provides a level of protection useful against your own family or little thieves.

If someone powerful enough (like government) really want to, there is always the possibility of your files being accessed by a security flaw or specialized tools.

  1. The best way to avoid problems is to not have a cell phone or, if you do have one, use it to exchange everyday information that is not sensible, such as photos of your dogs.

  2. Even so, when exchanging pictures of your dogs using your cell phone, prefer to use a VPN and a secure messaging app (I don’t think I can name any names here) properly configured for greater security.

  3. Encrypting your entire computer hd or part of it is a worthwhile solution. This can be done with FOSS software (I don’t think I can name any names here).

However, your computer can be seized or stolen with the compartment mounted (decrypted), allowing access to it.

Hence the importance of configuring the computer to automatically restart every x hours, as well as programming the Power button and closing the screen lid to act by turning off the computer, so the encrypted volumes becomes automatically unmounted.

  1. A more convenient option is not to encrypt your computer, but rather have a encrypted pendrive or an encrypted external HD.

  2. This way, you can carry files you use daily with you on your pendrive or external HD, since both require mounting (unencrypt) whenever you want to access your Files on a computer.

If this pendrive/HD is disconnected from your computer without being unmounted, or if the computer is abruptly turned off without them being unmounted, the chances are that the encrypted compartment becomes corrupted or, if not corrupted , that it automatically dismount itself and asks for a password to be mounted (unencrypted) again.

In this way, if you prefer, you can even leave your pendrive/external HD in the desk, unplugged, besides your notebook. If it is robbed or apprehend, there is no way to access your data.

(In the case of a pendrive, there is even the possibility of breaking it with your hands if necessary, turning it’s inspection even more difficult).

  1. Encrypted Files on a pendrive or external hard drive that you use/carry every day can be backuped periodically on another encrypted external hard drive, this one stored securely at home, in a safe, for example.

  2. Regarding encrypted files stored in the cloud, there is always the possibility of accessing them on a computer logged into your account. It can be done on your own computer if left unnatended or in another computer, if they have your password.

That is why it is important to create an encrypted folder, put your Files inside this folder and then upload and download that folder from the cloud whenever you need to work on the files on it.

The problem is that it is not convenient to download that folder every day, every time you need to access it. Your folder can grow big, making it inconvenient to download and upload it again on a daily basis.

That is the advantage of carrying an encrypted pendrive/external hard drive with you, instead of storing files in the cloud.

  1. If possible, use the TAILS operating system on your computer and the security tools that come with it.

  2. Summary (if I get it right):

A) Don’t store anything really important on your cell phone.

B) Prefer an encrypted pendrive/external hard drive over an encrypted computer.

C) program your computer to restart periodically and also when the Power button is pressed or the screen lid is closed, to prevent the unauthorized access to mounted (unencrypted) pendrive/external hd that may be connected to your computer when you leave it unnatended.

D) prefer to use Tails over windows or IOS.

Is this list of practices correct?

Did I forget something?

Thanks!

2 Likes

You asked the same question on the Techlore forum and I already answered it there.

1 Like