How to encrypt files over commercial cloud services using Cryptomator.

25, Jul 2016 | Security/Privacy | 5 comments

Cryptomator is open source software that can be installed to a device in order to encrypt data before it is synced across a commercial cloud or external network. Being open source the code is open to inspection so we can be sure it has no backdoors or malware embedded into it. In a time where mass data collection is becoming the norm. Corporations are actively scanning cloud services to profile users to target them for advertisements. Hackers are gaining access to big corporations network and data for profit and malice. It is vitally important that internet users start to take responsibility for their data security. Encryption brings an extra layer of security. Most hackers will be looking unsecured data so it makes it even more unlikely that if you use encryption they would attempt to crack it. Most likely Hackers will move on to the next easier victim. In the past Encryption applications have been notoriously complicated however this is changing fast. Cryptomator is one of the new generations of user friendly encryption clients that your gran can use (well almost). With big companies like Facebook Messenger and WhatsApp introducing encryption on by default. We are as a community moving in the right direction.

We need your support.

We hope you enjoyed this article and that it was helpful and you got benefit out of it. If you did, please consider supporting our channel by Subscribing to our YouTube channel, and liking and sharing our content. You can also make a donation via Paypal or become a Patreon if you wish to do so. You can also follow us on Facebook or Twitter.

5 Comments

  1. Stephen

    This is great. Thank you!

    Reply
  2. Austin

    Can you do a post about Borgbackup?.

    Reply
    • Addicted2Tech

      I do have that planned for a future Tutorial so please subscribe to our Youtube channel so you get notified when it goes live 🙂

      Reply
  3. filmkovasi

    Greetings! Very useful advice within this article! It is the little changes which will make the biggest changes. Thanks a lot for sharing! Ruth Findley Catton

    Reply

Submit a Comment

Your email address will not be published. Required fields are marked *

<a href="https://addictedtotech.net/author/attadmin/" target="_self">Addicted2Tech</a>

Addicted2Tech

We love technology and enjoy sharing helpful FREE content for others to enjoy. We believe in community. If you like what we do please support us by sharing and liking our tutorials & Subscribing to our YouTube channel. You can also follow us on social media.

Support Our Work!

Donate Via Patreon




Raspberry Pi 4 Model B 8GB

Last update on 2024-05-26 / Affiliate links / Images from Amazon Product Advertising API

CanaKit Raspberry Pi 4 Extreme Kit – 128GB Edition (4GB RAM)

Last update on 2024-05-26 / Affiliate links / Images from Amazon Product Advertising API




We Are An Affiliate!

Just so you know, we may collect a share of sales or other compensation from the links on this page. As an Amazon Associate, I earn from qualifying purchases.

The affiliate link recommendations come at no extra cost to you.

We hope you love the products we recommend!

Thank you if you use our links; we really appreciate it!




Related Posts

How Secure Are Passwords?

How Secure Are Passwords?

Passwords are one of the easiest and most basic ways to protect sensitive information and resources, like personal information, financial records, and company information. But how secure are passwords? Even though passwords are common, they are frequently exploited,...

read more