Do This Before Putting Your Files in the Cloud

  Рет қаралды 169,505

Mental Outlaw

Mental Outlaw

Күн бұрын

Пікірлер: 488
@welder77
@welder77 2 жыл бұрын
Never change your video editing formula. This format is perfect, no music, no intro, no time-wasting bullsh, just fact and pure content. Good job.
@alper1609
@alper1609 2 жыл бұрын
and subtitles must be good
@inactiveaccount4829
@inactiveaccount4829 2 жыл бұрын
Agreed
@MrMessiah2013
@MrMessiah2013 2 жыл бұрын
> no intro What do you call this: 0:00-2:00?
@welder77
@welder77 2 жыл бұрын
@@MrMessiah2013 explanation of the topic, by intro i meant the same corporate standardised clip of around 5 6 seconds that plays at the start of every video wasting the viewers time
@Noqtis
@Noqtis 2 жыл бұрын
it's so fluid I didn't notice and just started watching. i just would like a logo for some seconds at the start. the visual information isn't relevant so just show who you are/your brand at the beginning.
@z_0968
@z_0968 3 жыл бұрын
Starting to think Mental Outlaw is the one looking at my history rather than Google. I searched this shit like yesterday.
@magnusanderson6681
@magnusanderson6681 3 жыл бұрын
Should have tarred and encrypted your duckduckgo searches
@z_0968
@z_0968 3 жыл бұрын
@@magnusanderson6681 Not you too, how the hell do you know I use DuckDuckGo?
@techofnx3458
@techofnx3458 3 жыл бұрын
@@z_0968 He listened to your breathing patterns
@z_0968
@z_0968 3 жыл бұрын
@Picolino de Marte Oh yeah how many fingers am I holding up?
@radboi4194
@radboi4194 3 жыл бұрын
@@z_0968 two, should've just gotten rid of your hands, they're just bloat
@itsme7570
@itsme7570 3 жыл бұрын
As someone in cyber sec I like that he doesn't use buzzwords and try to wow us. He knows what he's talking about, he doesn't add anything on top. This is what it is
@phizlip
@phizlip 2 жыл бұрын
For real, I want to get into cybersecurity and it's helpful when I understand is what is said
@rileywatson
@rileywatson Жыл бұрын
As someone who isn’t in cyber sec, I like how everyone in cyber sec feels the need to state they’re in cyber sec before getting to their point
@itsme7570
@itsme7570 Жыл бұрын
@@rileywatson it's like a badge of honor that you only get to flash in niche places on the internet. If you try to tell a normie they either don't care or automatically assume that means you can crack any account and hack any device at will
@X_mano
@X_mano Жыл бұрын
​@@itsme7570wish I can find a niche to brag about my employment
@namenlosNamenlos
@namenlosNamenlos Жыл бұрын
Yes he does use buzzwords one example: *woke* in a negative connotation way.
@MyReviews_karkan
@MyReviews_karkan 3 жыл бұрын
No intro, no outro, and shit is still sofa king good. Thanks, man. You're the 🐐 Edit: and no background music.
@MyReviews_karkan
@MyReviews_karkan 3 жыл бұрын
@Average Linux User I guess I'll need to stop my bullshit then 😂. I do have intro and outro and BG music. Ya know, to attract people to sub.
@kisewaftw
@kisewaftw 3 жыл бұрын
I am the Sofa King
@GhostSamaritan
@GhostSamaritan 3 жыл бұрын
@@MyReviews_karkan People will subscribe if they really enjoy your content.
@MyReviews_karkan
@MyReviews_karkan 3 жыл бұрын
@@veirant5004 Apparently not. 😂 I just like to edit and add shit to my videos.
@MyReviews_karkan
@MyReviews_karkan 3 жыл бұрын
@@GhostSamaritan very true. I'm not really looking to get rich out of youtube, probably never will. I just like to film anything that I think needs to be filmed to help some people. I mess with smartphones and Linux a lot and fix s lot of the issues on my laptop myself, then just try to film it to share the fix.
@Kodagraphy
@Kodagraphy 3 жыл бұрын
I haven’t trusted Google since I made a dummy account, uploaded a picture of an apple named “racecar” to Drive, and immediately saw ads for healthy foods.
@skaruts
@skaruts 3 жыл бұрын
I watched a speech about password cracking a while ago, where the guy (who I forgot the name, but who works professionally in pass-cracking) was saying an 8 digit password can be brute-forced in a few days with a cheap rig with 3 or 4 GPUs, and that a 9th digit exponentially raises that bar to a bunch of years, making it infeasible to brute-force. So, according to that guy, apps should be advising the use of 9 or even 10 minimum digits, not 8. And the takeaway from that video: DO NOT USE PATTERNS. _"Obama08!"_ and _"Shekelsteinberg69%"_ are effectively the exact same password from the perspective of a pattern matching algorithm.
@kendarr
@kendarr 3 жыл бұрын
A rig with 3 or 4 gpus are not cheap, not even because of the whole chip problem, is just not common for people to have that type of rig
@skaruts
@skaruts 3 жыл бұрын
@@kendarr Not regular people. But for someone that's more serious about cracking passwords, four GPUS isn't prohibitively expensive. I don't suppose you need the best in the market, or even anything close.
@kendarr
@kendarr 3 жыл бұрын
@@skaruts No reason to have 4 low end gpus in that manner, and sure for a especialist on that it might not be too much, but for the avarege "hacker" having 2 GPUs is already a bit a stretch, the more characters the better but more often then not 8 is good enough its what i'm saying
@D00000T
@D00000T 2 жыл бұрын
@@kendarr if you're talking about general password cracking on anyone you decide to target then yeah that's not cheap at all but if you really need to get into a specific person's stuff, a rig with a few extra gpus is not that much for what you might gain as a result
@-blackcat-4749
@-blackcat-4749 2 жыл бұрын
Former insipid instance. So 😐 it was
@cleoclast
@cleoclast 3 жыл бұрын
even your vids are like linux, I can customize them by adding my own background music
@末茶98
@末茶98 3 жыл бұрын
DISM moment
@InventorZahran
@InventorZahran 3 жыл бұрын
I don't even have to choose my background music. It just starts playing whenever I open my web browser, and I have no clue which of the 32 active tabs is doing the music...
@cruenie
@cruenie 2 ай бұрын
I love that XD @@InventorZahran
@rdxdt
@rdxdt 3 жыл бұрын
rm -rf on a single file just for the lulz
@kira64xyz
@kira64xyz 3 жыл бұрын
i do that out of habit lul
@tacstick1108
@tacstick1108 3 жыл бұрын
@@kira64xyz me too
@dolbyprologicii
@dolbyprologicii 3 жыл бұрын
thats dumb you gotta zero it out first
@arrtemfly
@arrtemfly 3 жыл бұрын
muscle memory bruv
@astagfargamer
@astagfargamer 3 жыл бұрын
@@kira64xyz lul?
@hhhyyy4375
@hhhyyy4375 3 жыл бұрын
Pretty useful. Especially for coomers. Liking the upload spree so far.
@jcs27
@jcs27 3 жыл бұрын
coomers get the rope
@hhhyyy4375
@hhhyyy4375 3 жыл бұрын
@@jcs27 BDSM Coomers like rope
@jcs27
@jcs27 3 жыл бұрын
@@hhhyyy4375 fuck, totally missed that one
@snap_oversteer
@snap_oversteer 3 жыл бұрын
Rclone with encryption layer is also a great tool for using 3rd party cloud drives seamlessly
@DiabolicGrin
@DiabolicGrin 3 жыл бұрын
actually expected this to be the content of the video
@glitchy_weasel
@glitchy_weasel 3 жыл бұрын
That sounds really cool. Any guide on how to do it?
@DiabolicGrin
@DiabolicGrin 3 жыл бұрын
@@glitchy_weasel they have very good documentation on their website
@censoredterminalautism4073
@censoredterminalautism4073 3 жыл бұрын
I'm going to have to do this at some point, unfortunately, because airports are full of glowFRIENDS so it's the only safe way for me to transport my files when I fly to another country.
@4.0.4
@4.0.4 3 жыл бұрын
@Blaxer XO do you even know what an RFID scanner is or do you just assume it's some star trek shit that magically vacuums your data?
@ethanbroussard
@ethanbroussard 3 жыл бұрын
@@4.0.4 since he deleted his reply what did he say
@diehgo_sp
@diehgo_sp 3 жыл бұрын
Most precious thing I have in Google's servers is a rare version of Vivaldi Four Seasons. All the rest is my external drives. I don't trust "cloud service" because hackers, a war or government could compromise provider's servers and I'd lose my games, music, work projects... No way.
@HomerSparkle
@HomerSparkle 3 жыл бұрын
I prefer to use a cryptographic overlay file system like encfs, which is much easier to work with as it's completely automated. You designate a directory for the encrypted data, which will also be the directory that's synced to the Cloud, and the unencrypted mount point is another directory (or drive letter if using windows), where you work with your files as normal. That way you never have to manually encrypt and decrypt your data in order to work with it, and the only data that's ever synced to the Cloud is always encrypted.
@gaditonecy
@gaditonecy Жыл бұрын
Is there a vid 9n how to do this?
@JGnLAU8OAWF6
@JGnLAU8OAWF6 Жыл бұрын
No filesystem compression with encfs makes me sad.
@AG-en5y
@AG-en5y Жыл бұрын
Hello, are you still using cryptography overlay? Which program should I buy that's like yours ? Thank you
@tribela
@tribela 2 жыл бұрын
For offsite incremental backup, I recommend restic. It automatically do encryption and leverages rclone as backend to store backup almost any cloud storage providers
@yarweiss
@yarweiss 3 жыл бұрын
Great informative videos without all the bloat. Just like Linux.
@skaruts
@skaruts 3 жыл бұрын
In a world where gov agencies keep legally forcing companies to let them access people's files, you can be sure there's one or more ways that someone could be nosing around your files. Maybe even backdoors.
@JacobJohnson-lh4gx
@JacobJohnson-lh4gx 3 жыл бұрын
I love your channel, I've watched a couple of them and all of them are informative and useful thank you.
@sillysimon7889
@sillysimon7889 3 жыл бұрын
there is actually a way to keep integrity with AES by combining it with RSA. You can make a checksum of the encrypted file and then sign that checksum with your private RSA key. This way you can verify whether the data has been tampered with
@the_expidition427
@the_expidition427 Жыл бұрын
This is why banks use RSA keys for wires and loans
@simponic
@simponic 3 жыл бұрын
Hey Kenny, would you mind going over open-source alternatives to Google Maps? I'm sick of Google having access to my location whenever I want to go somewhere. Thanks!
@frecio231
@frecio231 3 жыл бұрын
Deactivate location on your phone
@hedgeearthridge6807
@hedgeearthridge6807 3 жыл бұрын
openstreetmap.org has always been the biggest recommendation for that, it's free (license) and open source. And Duckduckgo uses AppleMaps instead of Google, im not entirely sure why, and I know Apple is usually as spooky as a bioluminescent bureaucrat.
@sugaryhull9688
@sugaryhull9688 3 жыл бұрын
OpenStreetMaps, but it's not as feature-rich
@SapphFire
@SapphFire 3 жыл бұрын
@@sugaryhull9688 OpenStreetMaps just provides the map data and a basic web client. There are multiple other clients available: eg. Gnome Maps, Qwant Maps (in beta, uses OSM data), OsmAnd (for Android, very feature rich, but slower than some other clients and the UI is not the best). _Do not_ use maps.me though. it was bought by some sketchy company. I think some people are working on a fork of it.
@bruhty9504
@bruhty9504 3 жыл бұрын
Apple maps would work
@wobble_cat
@wobble_cat 3 жыл бұрын
I used to use that method a long time ago until I found a cryptomator. Cryptomator encrypts files and opens up a way to interact with your encrypted files in the vault via virtual disk or webdav rather than giving you a whole encrypted container that is extremely hard to sync with cloud. It also supports major cloud providers. It has some drawbacks though. Only the core part is open sourced (so that they can monetize the software) and it is written in java which forces you to have a jre on your machine. The encryption method is based on aes-ctr (if I'm not wrong), yet the implementation is not standard and but there is a good documentation about how it is done. I have been working on a lightweight alternative which is written on go. It behaves like a daemon exposing a webdav server, can be deployed to all platform that go supports, it is highly portable and lightweight. I haven't published it because of some issues with plain text files (all media files are ok). The project is abandoned as I don't have time to fix all issues and paying of technical debt during prototyping. Maybe I'll revive it someday, or maybe I'll find a good alternative to cryptomator. P.S.: Syncthing is a good way to sync stuff cloudless across your devices.
@KaiserTheAdversary
@KaiserTheAdversary 3 жыл бұрын
I'm sure Google won't bat an eye when I start uploading hundreds of gigabytes of encrypted data to their servers.
@jan_harald
@jan_harald 3 жыл бұрын
lol linustechtips had that happen tho, when they did the "infinite gcloud storage" video, iirc, google gjuys went like "huh, guys, what's all this random data you're uploading gigabytes of? you're not bad guys, right?"
@kendarr
@kendarr 3 жыл бұрын
@@jan_harald there are legitimate reasons to be to be skeptical when someone uploads tons of gbs of encrypted files, remember that tech dosent know what right and what's wrong, if there is some ilegal shit in there Google can be on the eyes of gov for that, I think the gouverment made this problem with mega, when they took down megaupload the dude made the system so good its a field for cracked and ilegal stuff, I'm not saying that's all there is there, what I'm saying is that Google can't trust you as much as you dont trust them
@jlamothe2
@jlamothe2 3 жыл бұрын
I do not find that there is a huge performance difference between symmetric and asymmetric encryption with GPG. The reason for this is that encrypts your data with a randomly generated one-time symmetric key, and then encrypts only that (relatively small) key asymmertcically. That's how you can encrypt a message to multiple recipients. You encrypt the message once, and then encrypt the session key with each of their public keys.
@marianomarciello503
@marianomarciello503 3 жыл бұрын
If you want to have integrity with a block cipher like AES, you can use AES-GCM (SIV) for confidentiality and integrity.
@あや-q5t
@あや-q5t 3 ай бұрын
My fear is even if I encrypt my files Google keeps them eternally and wait until the awake of the quantum computers then decrypt it to see the content 😭
@quickscope3643
@quickscope3643 3 жыл бұрын
my loli lewd handholding pics will be always in danger at this rate , might as well starting build my own server with my uni savings.
@Nicolas-qc3jf
@Nicolas-qc3jf 3 жыл бұрын
based purechad
@censoredterminalautism4073
@censoredterminalautism4073 3 жыл бұрын
Definitely encrypting mine before any situation that requires being around glowFRIENDS that may want to invade my privacy for my safety, as they say.
@quickscope3643
@quickscope3643 3 жыл бұрын
@@censoredterminalautism4073 with some encrypting software wrote in Holy C
@末茶98
@末茶98 3 жыл бұрын
based af
@highvisibilityraincoat
@highvisibilityraincoat 3 жыл бұрын
HILARIOUS HILARIOUS HILARIOUS HILARIOUS HILARIOUS HILARIOUS HILARIOUS HILARIOUS HILARIOUS HILARIOUS HILARIOUS
@Kilogya
@Kilogya 2 жыл бұрын
These tutorial formats make sense, and are to the point. Appreciate your time and explanation of this opsec mitigation method.
@JoeJoeTater
@JoeJoeTater 3 жыл бұрын
Using symmetric encryption to access files on your employer's computer would be a really bad idea! Really, accessing any kind of secret on someone else's hardware is a bad idea. In the US (and most other places, AFAIK), employers have very few restrictions on what data they can collect about their employees. There are whole software suites dedicated to helping managers sift through data like key logging, screen recording, camera/mic recording, application usage stats, and whatever else you can imagine. It's all fair game to them. You should 100% assume that any password you type on a work computer is known by your employer.
@OggerFN
@OggerFN 3 жыл бұрын
I mean encrypting on a computer with Intel ME (or Amd's counterpart)active isn't really safe either.
@JoeJoeTater
@JoeJoeTater 3 жыл бұрын
@@OggerFN Oh, for sure. I just mean that on a work computer, a bad actor is DEFINITELY, ACTIVELY collecting keystrokes. While on any random x86 computer, a bad actor is maybe doing that.
@skaruts
@skaruts 3 жыл бұрын
To be fair, they should not have any restrictions on monitoring their own computers.
@JoeJoeTater
@JoeJoeTater 3 жыл бұрын
@@skaruts it would be convenient if we could just copy-paste the ethics of individuals and apply them to corporations. Unfortunately, that has led to pretty egregious, widespread abuse of employees. So, we probably shouldn't treat company-owned machines the same way as personally-owned machines.
@skaruts
@skaruts 3 жыл бұрын
@@JoeJoeTater The corporations are owned by individuals. Fundamentally speaking, the relationship between employer and employee is the exact same as that between you and your plumber. An employer is an entity buying a service, and an employee is an entity selling a service. The hard reality is that many worker rights are nothing short of ways to extort or harass buyers. Hell, the minimum wage, for example, is the exact equivalent to telling you that you cannot pay less than X to your barber. Anyway, don't confuse this for a defense of corporations of whatever. I'm just laying things out for what they actually are. Companies are owned by people with the same rights as everyone else. Their computers are their computers. What should happen is that everyone should be aware about the problems of using other people's computers for personal stuff. Given that, realistically, most people won't ever know all that they need to know, maybe there's a discussion to be had about whether or not it would be justifiable to mandate that employers be transparent about their use of keyloggers and all that. Whatever the case, you should always keep in mind that there's no difference between having legal restrictions on their ability to monitor their computers and having legal restrictions on your ability to monitor your personal computer at home. If you're gonna be advocating for that kind of laws, that should give you a sense of what exactly you'll be advocating for.
@biasedriot3603
@biasedriot3603 3 жыл бұрын
Still a pretty good idea to remove the metadata from files too even after encrypting using something like mat2 or exiftools.
@gabs_unk_1382
@gabs_unk_1382 2 жыл бұрын
loved that, even with applications to do that job is even better (for me) use command line thank u so much and I hope u keep bringing up this kind of content!!!
@crashedbruh
@crashedbruh 3 жыл бұрын
Can you make a video on hardware security keys? They really intrigue me cos they seem to be much more convenient , just plug and play access
@crashedbruh
@crashedbruh 3 жыл бұрын
@Capitalism 4 life Nah bruh, im talking about hardware which is used as a key to decrypt anything u had encrypted instead of letting the key float around in files.
@DezzarTac
@DezzarTac 3 жыл бұрын
@@crashedbruh a USB key? would be a real help for me too ^^;
@crashedbruh
@crashedbruh 3 жыл бұрын
@@DezzarTac Yep those ones, pretty neat stuff !
@FocusProj
@FocusProj 3 жыл бұрын
Tip for VIM: Shift z z in command mode saves the file and exits. ZZ in normal mode saves the current file if modified and exits or closes the current window/tab (same as :x but not :wq which writes the file even if it hasn't been modified). To exit unconditionally without changing anything: ZQ (same as :q! ).
@chicolucio88
@chicolucio88 3 жыл бұрын
What about creating a VeraCrypt volume with your files and sync the volume? It seems easier. You can even create a hidden volume inside the main volume to really hide some data. Is it a good alternative? What are pros and cons?
@ICy42
@ICy42 3 жыл бұрын
.
@esquilax5563
@esquilax5563 3 жыл бұрын
That's similar in principle to what he did here with the tar archive. The main con I see is that you have to resync the whole archive to the cloud even if you just make a small change to one file. Should be fine for small volumes, in fact I do that myself. But if you have a large amount of data, and most of it doesn't change often, that's a lot of extra overhead
@ChaosTherum
@ChaosTherum 3 жыл бұрын
Your best bet is rsync, with an encrypted volume. It's a touch less portable but much easier to use.
@Cookiekeks
@Cookiekeks 2 жыл бұрын
@@ICy42 sounds a whole lot more complicated just to encrypt a file
@BeatBoxBrian
@BeatBoxBrian 2 жыл бұрын
I agree with the question and am still a little confused after all the answers given. Is there more overhead when using VeraCrypt?
@johngrear6506
@johngrear6506 2 жыл бұрын
"Don't Be Evil" wasn't removed by Google as their mission statement. They only removed the word "Don't" 🙂
@glass7923
@glass7923 3 жыл бұрын
Thanks, my 2TB stash of Marina Ann Hantzis movies has never been safer.
@mukundmittal
@mukundmittal 2 жыл бұрын
After seeing your video, I have started storing heavy data in my google workspace account. Now, the workspace admin will only see crap in his Vault😆😆😆
@PlayboiJordie
@PlayboiJordie 3 жыл бұрын
Love the videos, I was wondering if you could do a tutorial on setting up an encrypted network directory for use as a pseudo-cloud just for the LAN?
@soniablanche5672
@soniablanche5672 Жыл бұрын
You can technically encrypt the asymmetrical key too (passphrase), which I usually do for SSH. Also for integrity, the AES-GCM variant will ensure integrity, I don't know if gpg supports it though.
@oxydk
@oxydk 3 жыл бұрын
remember that encryption based on passphrases is only as secure as the way you chose to distribute the passphrase
@randomrandom316
@randomrandom316 3 жыл бұрын
To anyone who tries this and is unable to use --no-symkey-cache. This is because this was apparently added to gpg version 2.2.7, if you are on an Ubuntu derivative there is a chance that you are using an older gpg program, so you will probably have to update the program or the OS itself.
@opopopop6286
@opopopop6286 2 жыл бұрын
exactly, this stuff should be pure common sense to most...yet we see how lacking that can be over-all in society at times. Well, times change.
@spicybaguette7706
@spicybaguette7706 3 жыл бұрын
Just buy a raspberry pi 4 and a usb drive, set up port forwarding and boom, you got "cloud" storage. For secure backups you can tar and encrypt it and store it on the cloud, or even better, a friend's drive
@ChimeraX0401
@ChimeraX0401 3 жыл бұрын
For me I just compress all my file to rar or 7zip then encrypt it in AES256 (including file names) in 64 character long password generated by urandom. So good luck decrypting that or even try to take a glimpse at the content of that file, though encrypting individual files is a good thing so I will also use this for when I have to store sensitive data on the cloud. Though I kinda hope those files can also be opened in windows machine because there are times that I have to access my file in windows...
@wes4477
@wes4477 2 жыл бұрын
Best thing is when Google calls to ask if you want advertising is to ask if they are Javascript free and if the software being used to push the ads is gpl
@mechantl0up
@mechantl0up 2 жыл бұрын
AES256 is no more secure than AES128 for symmetric encryption where your passphrase limits your security, not the algo. Theoretically, AES128 is actually the more sound design anyway. AES256 has too few rounds for the key size, which its cyptanalysis has shown. Aes128 has better dispersion of the key material. Use AES128, or any other well-established algo, and worry about your passphrase instead, and you won’t end up looking stupid in the eyes of the intelligence agencies. The algo never matters.
@Rijndael1998
@Rijndael1998 2 жыл бұрын
The algo matters. AES256 *is* more secure, and the only acceptable option. Which cryptanalysis has told you otherwise?? Furthermore, when it comes to quantum computers, Grover's Algorithm can be used to speed up brute forcing the encryption key. "Grover's algorithm could brute-force a 128-bit symmetric cryptographic key in roughly 264 iterations, or a 256-bit key in roughly 2128 iterations."
@mulletman1705
@mulletman1705 2 жыл бұрын
AES256 is more secure in the long run. Quantum computers theoretically will half the difficulty of brute forcing AES. If you only use AES128 a quantum computer would reduce the bit security down to 2 to the power of 64 making it entirely brute forceable within a relativity short time frame. Use AES256 if you want your encryption to remain secure in the long term.
@mechantl0up
@mechantl0up 2 жыл бұрын
@@mulletman1705 Those AES256 related key attacks are nasty, though... showing AES256 design issues even though they are infeasible in practice. But so are all attacks on any modern 128-bit-block algorithms. The algo does not matter. No-one attacks the symmetric key by bruteforce. It is too expensive even with a future quantum computer within a timescale that matters. The adversary will always attack the passphrase since it will have less entropy and is easier to break -- or so the adversary conjectures. No algo, no matter how broken, is known to have successfully been attacked by bruteforce since DES or incorrectly applied RC4 or low-bit-RC5. Yet encrypted data are compromised all the time. It just happens by other means.
@mulletman1705
@mulletman1705 2 жыл бұрын
@@mechantl0up no one attacks the key by brute force as it would not be broken within a reasonable time frame with there being 2 to the power of 128 different possible keys for AES128. However it is feasable for current commuters to brute force 2 to the power of 64 different possible keys within a reasonable time frame. That is why you should not use AES128 if you are concerned about long term encryption.
@mechantl0up
@mechantl0up 2 жыл бұрын
@@mulletman1705 That assumption relies on the fact that 2^64 quantum computers are feasible within the time span necessary for keeping something secret from today, and that someone will expend such a computing resource on cracking the particular key I am using. These are bold assumptions. Before that happens, our existing public key crypto infrastructure will have collapsed and all our historical, asymmetrically encrypted data exposed by quantum computers. I am more concerned over that. Even today, no-one can afford to spend the money for 2^64 operations to crack keys. Moreover, for long-term secrets you have to be very careful with file formats. I only ever use TAR and standard GZIP and unformatted text documents when possible. Imagine decrypting your mid-1990s PGP-encrypted floppies. No-one still can break the broken 64-bit 128-bit-key IDEA algorithm, but you may not be able to access the data (at least inexpensively) due to extinct file formats...
@terpage8565
@terpage8565 3 жыл бұрын
People who understood this video don't need the guide.
@littlemac5942
@littlemac5942 3 жыл бұрын
i needed it, and it worked for me
@jlamothe2
@jlamothe2 3 жыл бұрын
I generally don't bother compressing my tar files before encrypting. I believe that compression is the first step of then encryption process anyways. Doing it manually seems redundant.
@ccerna1
@ccerna1 Жыл бұрын
thank you sir! I learned something new today and now to go and encrypt all my docs in Dropbox!!!
@osamaanees8406
@osamaanees8406 Жыл бұрын
Thank you Kenny. Very Cool! Now I can upload more torrents by google-colab on google drive without getting that copyright email!
@mynameisnotyours
@mynameisnotyours Жыл бұрын
Google's "don't be evil" was never meant for themselves.
@ForeShadow20
@ForeShadow20 3 жыл бұрын
Here's and easier way: Create an Encrypted container on your PC with TrueCrypt 7.1a (Do not use the latest! They disabled the Encryption when they shutdown). Also the open source code for it is available online. Upload that Container to the cloud (with the TrueCrypt installer if you want). I wonder if Mega.nz / mega.io is better than any other service cloud. It's Kim Dotcom's middle finger to all the 3 & 4 letter agencies that shutdown his previous data file hosting websites by encrypting the data and making it non-accessible to people who don't have the Key.
@ChristopherJohnJackson
@ChristopherJohnJackson 2 жыл бұрын
You can also use Age file encryption, it’s has saner default, for example it does not cache the password by default. Be careful with pgp it has soo many moving parts!
@lucianoosinaga2980
@lucianoosinaga2980 3 жыл бұрын
I keep coming back to this vid because I forget the gpg args lol btw a little nitpicky comment, when you use tar -cf to make an archive, it won't actually gzip the file, using -zcf does tho. I say this beacuse you gave the filename a .tar.gz extension that would lead you to believe it was actually gzipped
@rign_
@rign_ 3 жыл бұрын
holy, it's actually very useful! thank you orange cat
@jthunders
@jthunders 2 жыл бұрын
You're one of the best things on KZbin
@jeremyforrest1997
@jeremyforrest1997 3 жыл бұрын
You forgot the 'z', tar -cf just creates an archive, no gzip. No need for gz.
@iLiokardo
@iLiokardo 3 жыл бұрын
No need for the .gz _filename extension._
@georgemaratos1122
@georgemaratos1122 3 жыл бұрын
it was to throw off the hackers duh. do you even secure your data?
@No-uc6fg
@No-uc6fg 3 жыл бұрын
Who needs encryption when you can just upload a password protected zip file unconspicuously named budget2021.zip Nothing to see here folks, just "very important money stuff".
@nykal1510
@nykal1510 3 жыл бұрын
How effective are ZIP passwords anyway
@ICy42
@ICy42 3 жыл бұрын
Any suggestions for filename encryption too? Which can be decrypted quickly.
@No-uc6fg
@No-uc6fg 3 жыл бұрын
@@nykal1510 You can download a myriad of zip brute forcers that do the job in a few minutes, so...
@nykal1510
@nykal1510 3 жыл бұрын
@@No-uc6fg Damn, that's tough
@alkaupadhyay7650
@alkaupadhyay7650 3 жыл бұрын
@@nykal1510 even a script kiddoe can open it
@TadakichiSan777
@TadakichiSan777 3 жыл бұрын
Symmetric encryption like aes is actually safer than let's say rsa. Rsa theoretically can already be cracked by Google with their quantum computer that's not the case with aes. The only pros of asymmetric encryption is that you can give out public key and use it for signatures. Otherwise symmetric is better.
@DannyGruesome
@DannyGruesome 2 жыл бұрын
I really think we should all just goto the store and print all those pics weve been saying were going to for years now. Then delete all the digitals.
@tzvi7989
@tzvi7989 Жыл бұрын
this is basically what companies like Sentra advocate. However, when doing this en masse its better to only put layers of encryption on your most sensitive info
@nobu1730
@nobu1730 3 жыл бұрын
go to dwm's config.h > set value of "resizehints" to 0. your uneven terminal around the edges always bugs me
@Ankky22
@Ankky22 3 ай бұрын
Wow this is a really good way to encrypt files, if you're a software engineering professional that uses linux, that is. For the rest of us, just use a password protected .7z
@luigitech3169
@luigitech3169 3 жыл бұрын
I prefer gocryptfs, so it can sends diffs and you can edit the files inside the directory
@sebastian3158
@sebastian3158 3 жыл бұрын
For anyone wanting to automate such as process I can recommend rclone
@Swampert_Tube
@Swampert_Tube 2 жыл бұрын
I never use cloud storage unless I gotta send a file to a friend. I use USB sticks instead.
@KarlMySuitcase
@KarlMySuitcase 2 жыл бұрын
Subscribed because of the subtle request.
@MasouShizuka
@MasouShizuka 2 жыл бұрын
I use the ancient forgotten method of buying an external hard drive, disconnect from the internet and copy and paste into said hard drive.
@glitchy_weasel
@glitchy_weasel 3 жыл бұрын
Great content. Do you know of any solution to perform sort of an "encrypted mouting" of a cloud storage? Some software (eg. rclone) allow to mount a cloud storage (eg. it appears as a drive). But is there some way to seamlessly encrypt everything at client side? analogous as how full disk encryption with [LVM over] LUKS is (virtually) seamless. And also I'd to argue that symmetric encryption can provide integrity, if the cipher uses an AEAD mode of operation. However, I'm unaware about what cipher GPG uses.
@TK-le8wd
@TK-le8wd 3 ай бұрын
Would you still suggest this in 2024 and if so, can you share a link for the installation instructions, please.
@JeffBourke
@JeffBourke 2 жыл бұрын
Who is going to encrypt files individually before uploading to the cloud? It’s too difficult and time consuming.
@linuxstreamer8910
@linuxstreamer8910 3 жыл бұрын
thanks now i use this for my Google Drive and Dropbox
@beavatatlan
@beavatatlan 3 жыл бұрын
I hope my world conqueror 3 rebalance mod will be safe.
@tark8985
@tark8985 3 жыл бұрын
shut up you mobile gamer hungarian Albania 🇦🇱🇦🇱🇦🇱
@mruwuowo4599
@mruwuowo4599 3 жыл бұрын
Why not get an USB drive and store it on that instead?
@OggerFN
@OggerFN 3 жыл бұрын
Do you want to drag around 400 TB of cp in USB drives with you?
@JacobJohnson-lh4gx
@JacobJohnson-lh4gx 3 жыл бұрын
@@OggerFN lmaoo I imagine it all tied to a key chain making clacking sounds hahaha
@AbandonedVoid
@AbandonedVoid 3 жыл бұрын
The cloud automatically backups your files and keeps them in a quality state. USB drives and external hard-drives go kaput, and you can see data decay on them within about 5 years. If you're wanting to archive your shit, the cloud is the cheapest way to do it.
@OggerFN
@OggerFN 3 жыл бұрын
@@AbandonedVoid kaput? Do you mean kaputt as in german for broken?
@mruwuowo4599
@mruwuowo4599 3 жыл бұрын
@@AbandonedVoid I would rather pay 10 euros a month for USBs than give all my data to an unkown cloud service, or apple or google. And hosting one is less cheap and less secure.
@arcowo
@arcowo 3 жыл бұрын
You named your tar file pepes.tar.gz even though you didn't pass -z (meaning you're not doing any compression). You just made a tar file, not a compressed tar file, so you should drop the .gz
@FreelanceFadi
@FreelanceFadi 2 жыл бұрын
I cringed when I saw that, he also passed the `recursive` and `force` flags every time he removed a single file that wasn't even write-protected.
@markm0000
@markm0000 Жыл бұрын
I’ve heard of people uploading a ton of encrypted files and having that data corrupted or disappear after a few months.
@MadhuryaKakati
@MadhuryaKakati 2 жыл бұрын
Restic a great way to do encrypted backups to a number of cloud services.
@a9nh
@a9nh 3 жыл бұрын
Love this channel!
@bjornelenfors2039
@bjornelenfors2039 3 жыл бұрын
Am I missing something, or shouldn't the tar command also have the -z option if you name the archive .gz?
@member5003
@member5003 2 жыл бұрын
Just encrypting something with asymmetric encryption doesn't provide more integrity than encrypting with a symmetric key if you're not signing it. Asymmetric encryption solves the problem of sending an encrypted message to someone so that they can read it without sharing private keys and it takes much more resources than symmetric so it's kind of pointless to use it on this scenario.
@gilgilbert5866
@gilgilbert5866 2 жыл бұрын
Ensure a SLA is signed by both the customer and cloud hosting company. This way the cloud hosting company can be held accountable legally, financially and potential criminally if it is B2B. Of course, the customer should always take care of their own precious data prior to uploading their data to the cloud, such as this guy states is encrypting their own data prior to uploading
@alkeryn1700
@alkeryn1700 Жыл бұрын
gpg is not a good solution as it isn't convenient, you should rather do a video on EncFS or encryptFS imo. the idea is that you have a folder where each individual files (including their names) are encrypted, and then you can use EncFS to mount that directory into an unencrypted mountpoint. that way you can just set your cloud to sync the encrypted folder, and use the unencrytped one directly. it is more seamless, the difference between encfs and encryptfs is that the former uses FUSE and the later use an in kernel module which is faster.
@erazerburst
@erazerburst Жыл бұрын
Thanks for this niche content.
@kewitt1
@kewitt1 3 жыл бұрын
I own 2 houses, my rental has free internet in exchange for power. I run freenas at both locations. 48 tb at both location. 4096 bit key and openvpn
@TadakichiSan777
@TadakichiSan777 3 жыл бұрын
Also hashes and macs are used for integrity and not asymmetric encryption
@t3ch-1t89
@t3ch-1t89 3 жыл бұрын
You should host this helpful content on peertube!
@holyravioli5795
@holyravioli5795 3 жыл бұрын
This is kind of a pain in the ass, a drop and play solution would be more user friendly, like a program with a gui that you drop your file onto and it encrypts it for you. If you want to unencrypt then just enter your pass-code for the program once and away you go.
@AbandonedVoid
@AbandonedVoid 3 жыл бұрын
GUI is way slower than command line, unless you're a slow typer
@censoredterminalautism4073
@censoredterminalautism4073 3 жыл бұрын
You can automate all of this however you want with aliases or a small script, so this is a lot more powerful and easier in the long run. Writing a simple example: #!/bin/sh [ -d $1 ] && tar -cf $1.tar.gz $1 && gpg -c --no-symkey-cache --cipher-algo AES256 $1.tar.gz || gpg -c --no-symkey-cache --cipher-algo AES256 $1 If you call this file dorkcrypt, then chmod +x dorkcrypt to make it executable, then run ./dorkcrypt filename. If it's a directory ($1 is the argument, which is the filename, and the -d option in the test checks if it's a directory), it will be turned into a tar.gz and then encrypted (&& makes the next command run if the previous one was successful), and if it's not (|| runs a command if the previous one failed), it will just be encrypted. Just an example. You can do the same for decrypting, decompressing and removing everything from the archive in one command.
@John-ol2cs
@John-ol2cs 3 жыл бұрын
Theres already a program that does that and it's called Cryptomator.
@streetcube-x3h
@streetcube-x3h 3 жыл бұрын
I can trust it by hosting it by myself 😉. Synology NAS ftw
@papafoxtrot11
@papafoxtrot11 Жыл бұрын
Thanks for the valuable content.
@stevefan8283
@stevefan8283 3 жыл бұрын
You can also run restic if you used rclone I used to use it to store my SQL backups on an infinite Google Drive seller who probably is exploiting the alumni benefit system of an university in Taiwan...? but because (s)he had full administration permission on my "subsidiary" account (as this is required to make a fake alumni) this mean (s)he could have my reviewed my content in plaintext, so I decided to encrypt it before sending it to the drive in rclone and it works well.
@RobbieHatley
@RobbieHatley Жыл бұрын
Another way to do it is use WinRar to make encrypted Rar files. That allows one to encrypt entire directory trees into a single file. That's useful if you want to encrypt a whole mess of directories and files all at once and store the whole mess in a single file which can then be stashed on Google Drive so that you can access it from any internet-connected computer anywhere, with very low probability of anyone being able to decipher them. Another way is to use "Vault" software such as KDE's "Vaults 1.0" to create a "Vault" containing a directory tree. The Vault files can then be stored on the cloud, again with very low probability of anyone being able to decipher them. But the ultimate way is to *_not_* put your data "on the cloud", but rather, put it on tiny Samsung S7 2TB SSDs, devices the size of packs of bubble gum, weighing about 1oz and costing about $200 for 2TB. Use LUKS encrpytion with a strong pass phrase (such as "82 times he struck his foe with his vorpal sword" or some such thing that's easy for you to remember but impossible for anyone to guess). And always make 3 or 4 copies of everything. Then just put the modules in your breifcase, backpack, pocket, or purse. If it gets lost, no big deal, you got backkups and no one is going to be able to decrypt it, and you can always make more copies (also encrypted, of course).
@simonmustermann6845
@simonmustermann6845 3 жыл бұрын
Just use Cryptomator (or the Cryptomator implementation in Cyberduck) to automatically encrypt everything automatically bevor storing it in the cloud. It's FOSS as well.
@CausticAscarite
@CausticAscarite 3 жыл бұрын
That's a little too much hassle for me...
@alemannicmark2986
@alemannicmark2986 3 жыл бұрын
Put all that in a convenient script to automatically encrypt the stuff and upload it to a suitable cloud storage provider.
@gunswinger3110
@gunswinger3110 3 жыл бұрын
age old conundrum, unfortunately
@ej_sykes
@ej_sykes 3 жыл бұрын
duplicati is backup software with a web interface that will encrypt your stuff in (by default) 50mb blocks and upload it to whatever cloud storage like google drive and will let you pull files or directories and decrypt it for you and it's really nice and convenient and I like it
@gambucino1260
@gambucino1260 2 жыл бұрын
lesson for every spectrum of political though: "money makes shit move faster"
@CrystalMaidenFeetLover86
@CrystalMaidenFeetLover86 3 жыл бұрын
Wouldn't it be safer to encrypt using a password instead of a gpg key? As I see it one key is one central point of failure, while you could use unique hard passwords for each file of interest instead
@apollowellstein188
@apollowellstein188 2 жыл бұрын
3:12 you have no idea if the compiled binary they're using is the one they claim. Even if you were able to run a hash on it, who's to say they dont have software to masks what you get back.
@ivanbogush
@ivanbogush 3 жыл бұрын
Comments haven't settled yet. A lot of people misunderstanding encryption and the need to use trusted encryption software (gpg/pgp) here.
@enesdogan9544
@enesdogan9544 3 жыл бұрын
You can use rclone with crypt. Can you make a video on that?
@Mjs96117
@Mjs96117 3 жыл бұрын
That's a lot better since you just just mount the remote encrypted drive and it just werks
@q0w1e2r3t4y5
@q0w1e2r3t4y5 3 жыл бұрын
This is like the Talos Principle game without it actually being a game.
@TheShinyZoroark_
@TheShinyZoroark_ 3 жыл бұрын
*laughs on private 8tb hdd storage server located at my house*
@resofactor
@resofactor 2 жыл бұрын
Looks like DWM and that you may be running LARBS? ;)
@andreffrosa
@andreffrosa 3 жыл бұрын
You can have integrity and autenticity with symmetric encryption too if you use HMACs
Linux is Too Hard - A Solution!
13:05
Mental Outlaw
Рет қаралды 306 М.
Microsoft Is Decrypting Your Files in The Cloud
8:14
Mental Outlaw
Рет қаралды 234 М.
Perfect Pitch Challenge? Easy! 🎤😎| Free Fire Official
00:13
Garena Free Fire Global
Рет қаралды 64 МЛН
Human vs Jet Engine
00:19
MrBeast
Рет қаралды 188 МЛН
Каха и лужа  #непосредственнокаха
00:15
Will A Basketball Boat Hold My Weight?
00:30
MrBeast
Рет қаралды 145 МЛН
Improving Smartphone Privacy
15:17
Mental Outlaw
Рет қаралды 153 М.
Making Firefox Great Again
15:21
Mental Outlaw
Рет қаралды 385 М.
STOP using Cloud Storage! Do this instead:
8:44
Liron Segev
Рет қаралды 972 М.
The Dark Side of Cloud Computing
12:48
Mental Outlaw
Рет қаралды 54 М.
What are Honeypots, and How to Avoid Them.
10:52
Mental Outlaw
Рет қаралды 405 М.
Secure Your Files with Encrypted Containers!
14:44
Naomi Brockwell TV
Рет қаралды 59 М.
How Secure Is Your Password Manager?
10:57
Mental Outlaw
Рет қаралды 180 М.
Google is Running Out of Storage
8:59
Mental Outlaw
Рет қаралды 1,2 МЛН
When you Accidentally Compromise every CPU on Earth
15:59
Daniel Boctor
Рет қаралды 872 М.
Perfect Pitch Challenge? Easy! 🎤😎| Free Fire Official
00:13
Garena Free Fire Global
Рет қаралды 64 МЛН