{"id":288,"date":"2012-12-13T11:45:46","date_gmt":"2012-12-13T16:45:46","guid":{"rendered":"http:\/\/blog.nccomputertech.com\/?p=288"},"modified":"2012-12-13T11:45:46","modified_gmt":"2012-12-13T16:45:46","slug":"answer-line-truecrypt-vs-encrypted-zip-files","status":"publish","type":"post","link":"https:\/\/nccomputertech.com\/techtalk\/2012\/12\/13\/answer-line-truecrypt-vs-encrypted-zip-files\/","title":{"rendered":"Answer Line: TrueCrypt vs. encrypted .zip files"},"content":{"rendered":"<p style=\"text-align:center;\"><a href=\"http:\/\/www.pcworld.com\/article\/2016558\/answer-line-truecrypt-vs-encrypted-zip-files.html\"><img src='http:\/\/nccomputertech.files.wordpress.com\/2012\/12\/121320thumb-100014320-medium.jpg' alt='' \/><\/a><\/p>\n<p>Regular readers know that I&#8217;m a big fan of the free, open-source encryption program, TrueCrypt. I&#8217;ve written about it numerous times, most recently in Can I recover some files and securely wipe others on a crashed hard drive?<br \/>\nKeeping sensitive files in .zip archive file also works, provided you use AES encryption. Windows itself doesn&#8217;t support AES-encrypted .zip files (it supports standard zip encryption, which is far too easy to hack), but many third-party compression programs support it. You can encrypt and decrypt AES with industry leader WinZip, the free 7-Zip, and others.<br \/>\nTrueCrypt offers several advantages over .zip archives:<br \/>\nFirst, I find TrueCrypt&#8217;s way of working&#8211;which involves turning the opened vault into a virtual drive&#8211;more secure, especially compared to 7-Zip. When you open a file inside a .zip archive, both WinZip and 7-Zip will decompress and decrypt the file to a temporary folder. When you close the file, 7-Zip merely deletes it, leaving traces that can be recovered by people who don&#8217;t have your best interests at heart. WinZip securely wipes the temporary file&#8211;a much better solution. But TrueCrypt avoids the problem altogether, since the file remains only in the encrypted vault.<br \/>\nSecond, there&#8217;s the file-name issue. Sometimes, the file names can provide clues to what&#8217;s inside. Anyone with access to an encrypted .zip file can view the file names inside. You only need the password if you try to open, view, or decompress a file. No such problem with TrueCrypt.<br \/>\nFinally, I find TrueCrypt easier to use. Since Windows sees an open TrueCrypt vault as a drive, you can access the files transparently. But you can only access the files in an AES-encrypted .zip file through your compression program.<br \/>\nBut there are reasons to stick with .zip archives:<br \/>\nFirst, the file size is dynamic. Add a file to the archive, and the archive gets bigger. Remove one, and it shrinks. But a TrueCrypt vault has a set size (it is, after all, a virtual drive). So you have to start by making it big enough for everything you might ever put into it.<br \/>\nAnd finally, if you&#8217;re already using .zip archives for this purpose, switching over is itself a hassle.<br \/>\nvia <a href=\"http:\/\/www.pcworld.com\/article\/2016558\/answer-line-truecrypt-vs-encrypted-zip-files.html\" target=\"_blank\">Answer Line: TrueCrypt vs. encrypted .zip files | PCWorld<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Regular readers know that I&#8217;m a big fan of the free, open-source encryption program, TrueCrypt. I&#8217;ve written about it numerous [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[7,9],"tags":[325,1105,1275],"class_list":["post-288","post","type-post","status-publish","format-standard","hentry","category-security","category-software","tag-encryption","tag-truecrypt","tag-zip"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/papNkV-4E","jetpack-related-posts":[{"id":9452,"url":"https:\/\/nccomputertech.com\/techtalk\/2018\/11\/19\/internal-bug-discovery-security-now-693\/","url_meta":{"origin":288,"position":0},"title":"Internal Bug Discovery &#8211; Security Now 693","author":"NCCT","date":"November 19, 2018","format":false,"excerpt":"https:\/\/youtu.be\/ClVI9PMQGCY Australia vs Encryption, Google+ Bugs Hasten its Demise -- Australia's recently passed anti-encryption legislation -- Details of a couple more mega-breaches including a bit of Marriott follow-up -- A welcome call for legislation from Microsoft -- A new twist on online advertising click fraud -- The DHS is interested\u2026","rel":"","context":"In &quot;Microsoft&quot;","block_context":{"text":"Microsoft","link":"https:\/\/nccomputertech.com\/techtalk\/category\/microsoft\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/ClVI9PMQGCY\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":9330,"url":"https:\/\/nccomputertech.com\/techtalk\/2018\/04\/03\/security-now-657-protonmail\/","url_meta":{"origin":288,"position":1},"title":"Security Now 657: ProtonMail","author":"NCCT","date":"April 3, 2018","format":false,"excerpt":"https:\/\/youtu.be\/OeSZg-ph3Ns This week we discuss \"DrupalGeddon2\", Cloudflare's new DNS offering, a reminder about GRC's DNS Benchmark, Microsoft's Meltdown meltdown, the persistent iOS QR Code flaw and its long-awaited v11.3 update, another VPN user IP leak, more bug bounty news, an ill-fated-seeming new eMail initiative, Free electricity, a policy change at\u2026","rel":"","context":"In &quot;Security&quot;","block_context":{"text":"Security","link":"https:\/\/nccomputertech.com\/techtalk\/category\/security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/OeSZg-ph3Ns\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":9405,"url":"https:\/\/nccomputertech.com\/techtalk\/2018\/10\/07\/odorless-and-weightless-hackers-this-week-in-tech-687\/","url_meta":{"origin":288,"position":2},"title":"Odorless and Weightless Hackers &#8211; This Week in Tech 687","author":"NCCT","date":"October 7, 2018","format":false,"excerpt":"https:\/\/youtu.be\/lb4rnqfNdas Chinese Spy Chips, Microsoft Highs and Lows, Pixel 3 Event Predictions, and More! Bloomberg reports that China used tiny chips to spy on Apple, Amazon, and the US government. Apple and Amazon deny it. How do we know who is right? All the news from the Microsoft Surface event,\u2026","rel":"","context":"In &quot;Apple&quot;","block_context":{"text":"Apple","link":"https:\/\/nccomputertech.com\/techtalk\/category\/apple\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/lb4rnqfNdas\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":9401,"url":"https:\/\/nccomputertech.com\/techtalk\/2018\/09\/24\/this-week-in-tech-685-emotional-support-ham\/","url_meta":{"origin":288,"position":3},"title":"This Week in Tech 685: Emotional Support Ham","author":"NCCT","date":"September 24, 2018","format":false,"excerpt":"https:\/\/youtu.be\/IbGOPvI5Owk Apple Watch and heart health, Magic Leap first look, your future Amazon House, and more. \u2022 iPhone XS and XS Max are flying off the shelves (especially in Santa Rosa). \u2022 Pixel 2 camera beats the iPhone XS. \u2022 Why the dual-sim iPhones are a bigger deal than you\u2026","rel":"","context":"In &quot;Apple&quot;","block_context":{"text":"Apple","link":"https:\/\/nccomputertech.com\/techtalk\/category\/apple\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/IbGOPvI5Owk\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":9335,"url":"https:\/\/nccomputertech.com\/techtalk\/2018\/04\/29\/this-week-in-tech-664-warm-tushie-tech\/","url_meta":{"origin":288,"position":4},"title":"This Week in Tech 664: Warm Tushie Tech","author":"NCCT","date":"April 29, 2018","format":false,"excerpt":"https:\/\/youtu.be\/ImbCQ9LqcAo Sprint and T-Mobile make it official. Amazon, Google, and Facebook all have amazing quarterly earnings reports. Amazon's home robot and the battle for smart home supremacy. Facebook's community guidelines. Golden Gate Killer found with open source DNA site. Who wants Snap's second generation Spectacles? Apple's rumored AR\/VR headset. What\u2026","rel":"","context":"In &quot;Apple&quot;","block_context":{"text":"Apple","link":"https:\/\/nccomputertech.com\/techtalk\/category\/apple\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/ImbCQ9LqcAo\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":9366,"url":"https:\/\/nccomputertech.com\/techtalk\/2018\/06\/10\/this-week-in-tech-670-go-theranos-or-go-home\/","url_meta":{"origin":288,"position":5},"title":"This Week in Tech 670: Go Theranos or Go Home","author":"NCCT","date":"June 10, 2018","format":false,"excerpt":"https:\/\/youtu.be\/jCxygSzkfL4 --A New Tech Manifesto by Baratunde: how to reinvent social media to improve all our lives. --Apple's WWDC announcements: Screen Time restores balance to your life, memojis avoid the uncanny valley, ARKit 2 might (might) actually have usefull apps, Siri Shortcuts might (might) make Siri useful, macOS Mojave makes\u2026","rel":"","context":"In &quot;Apple&quot;","block_context":{"text":"Apple","link":"https:\/\/nccomputertech.com\/techtalk\/category\/apple\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/jCxygSzkfL4\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]}],"_links":{"self":[{"href":"https:\/\/nccomputertech.com\/techtalk\/wp-json\/wp\/v2\/posts\/288","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nccomputertech.com\/techtalk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nccomputertech.com\/techtalk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nccomputertech.com\/techtalk\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/nccomputertech.com\/techtalk\/wp-json\/wp\/v2\/comments?post=288"}],"version-history":[{"count":0,"href":"https:\/\/nccomputertech.com\/techtalk\/wp-json\/wp\/v2\/posts\/288\/revisions"}],"wp:attachment":[{"href":"https:\/\/nccomputertech.com\/techtalk\/wp-json\/wp\/v2\/media?parent=288"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nccomputertech.com\/techtalk\/wp-json\/wp\/v2\/categories?post=288"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nccomputertech.com\/techtalk\/wp-json\/wp\/v2\/tags?post=288"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}