22 KiB
meta_title, title, icon, description, cover
meta_title | title | icon | description | cover |
---|---|---|---|---|
Recommended Encryption Software: VeraCrypt, Cryptomator, PicoCrypt, and OpenPGP - Privacy Guides | Software de encriptação | material/file-lock | A encriptação de dados é a única forma de controlar quem pode acessá-los. These tools allow you to encrypt your emails and any other files. | encryption.webp |
A encriptação de dados é a única forma de controlar quem pode acessá-los. Se você não estiver usando software de criptografia para o seu disco rígido, e-mails ou arquivos, você deve escolher uma opção aqui.
Multi-plataforma
As opções listadas aqui são multi-plataforma e excelentes para criar backups criptografados dos seus dados.
VeraCrypt
{ align=right }
{ align=right }
VeraCrypt é um utilitário freeware disponível na fonte, utilizado para encriptação on-the-fly. Ele pode criar um disco virtual encriptado dentro de um ficheiro, encriptar uma partição ou encriptar todo o dispositivo de armazenamento com autenticação pré-boot.
:octicons-home-16: Homepage{ .md-button .md-button--primary } :octicons-eye-16:{ .card-link title="Privacy Policy" } :octicons-info-16:{ .card-link title=Documentation} :octicons-code-16:{ .card-link title="Source Code" } :octicons-heart-16:{ .card-link title=Contribute }
O VeraCrypt é um garfo do projeto TrueCrypt descontinuado. De acordo com seus desenvolvedores, melhorias de segurança foram implementadas e questões levantadas pela auditoria inicial do código TrueCrypt foram abordadas.
Ao encriptar com VeraCrypt, o utilizador tem a opção de seleccionar de diferentes funções hash. Sugerimos aos utilizadores apenas seleccione SHA-512 e deve ficar com o AES cifra de bloco. The audit did not extend to cryptolib-swift, which is a library used by Cryptomator for iOS.
Cryptomator's documentation details its intended security target, security architecture, and best practices for use in further detail.
Criptomador
Cryptomator facilita o carregamento de ficheiros para a nuvem num sistema de ficheiros virtual encriptado. Visite cryptomator.org{ .md-button .md-button--primary } Política de Privacidade{ .md-button }
Downloads*
- :fontawesome-brands-windows: Windows
- :fontawesome-brands-apple: macOS
- :fontawesome-brands-linux: Linux
- :pg-flathub: Flatpak
- :fontawesome-brands-google-play: Google Play
- :fontawesome-brands-android: F-Droid repo
- :fontawesome-brands-app-store-ios: App Store
- :fontawesome-brands-github: Source It uses Go's standard x/crypto modules for its encryption features.
:octicons-repo-16: Repository{ .md-button .md-button--primary } :octicons-code-16:{ .card-link title="Source Code" } :octicons-heart-16:{ .card-link title=Contribute }
Picocrypt
Picocrypt é uma pequena e simples ferramenta de encriptação que fornece uma encriptação moderna. Picocrypt usa a cifra segura XChaCha20 e a função de derivação da chave Argon2id para proporcionar um alto nível de segurança.
:octicons-home-16: Homepage{ .md-button .md-button--primary } :octicons-info-16:{ .card-link title=Documentation} :octicons-code-16:{ .card-link title="Source Code" } :octicons-heart-16:{ .card-link title=Contribute }
VeraCrypt is a fork of the discontinued TrueCrypt project. According to its developers, security improvements have been implemented and issues raised by the initial TrueCrypt code audit have been addressed.
When encrypting with VeraCrypt, you have the option to select from different hash functions. We suggest you only select SHA-512 and stick to the AES block cipher.
Truecrypt has been audited a number of times, and VeraCrypt has also been audited separately.
Sistema operacional incluído Criptografia de disco completo (FDE)
For encrypting the drive your operating system boots from, we generally recommend enabling the encryption software that comes with your operating system rather than using a third-party tool. This is because your operating system's native encryption tools often make use of OS and hardware-specific features like the secure cryptoprocessor in your device to protect your computer against more advanced physical attacks. For secondary drives and external drives which you don't boot from, we still recommend using open-source tools like VeraCrypt over the tools below, because they offer additional flexibility and let you avoid vendor lock-in.
BitLocker
BitLocker é a solução de encriptação de volume completo, em conjunto com o Microsoft Windows. The main reason we recommend it for encrypting your boot drive is because of its use of TPM. ElcomSoft, a forensics company, has written about this feature in Understanding BitLocker TPM Protection.
:octicons-info-16:{ .card-link title=Documentation}
BitLocker is only supported on Pro, Enterprise and Education editions of Windows. It can be enabled on Home editions provided that they meet the prerequisites.
Enabling BitLocker on Windows Home
To enable BitLocker on "Home" editions of Windows, you must have partitions formatted with a GUID Partition Table and have a dedicated TPM (v1.2, 2.0+) module. You may need to disable the non-Bitlocker "Device encryption" functionality (which is inferior because it sends your recovery key to Microsoft's servers) if it is enabled on your device already before following this guide.
-
Open a command prompt and check your drive's partition table format with the following command. You should see "GPT" listed under "Partition Style":
powershell Get-Disk
-
Run this command (in an admin command prompt) to check your TPM version. You should see
2.0
or1.2
listed next toSpecVersion
:powerhell Get-Disk 0 | findstr GPT && echo Este é um disco do sistema GPT!
-
Access Advanced Startup Options. You need to reboot while pressing the F8 key before Windows starts and go into the command prompt in Troubleshoot → Advanced Options → Command Prompt.
-
Login with your admin account and type this in the command prompt to start encryption:
manage-bde -on c: -used
-
Close the command prompt and continue booting to regular Windows.
-
Feche o prompt de comando, e entre no PowerShell:
manage-bde c: -protectors -add -rp -tpm manage-bde -protectors -enable c: manage-bde -protectors -get c: > %UserProfile%\Desktop\BitLocker-Recovery-Key.txt
Tip
Backup BitLocker-Recovery-Key.txt
on your Desktop to a separate storage device. Loss of this recovery code may result in loss of data.
FileVault
FileVault é a solução de encriptação de volume on-the-fly integrada em macOS. FileVault é recomendado porque leverages recursos de segurança de hardware presentes em um SoC de silício Apple ou Chip de Segurança T2.
Visite support.apple.com{ .md-button .md-button--primary }
We recommend storing a local recovery key in a secure place as opposed to using your iCloud account for recovery.
Configuração da Chave Unificada Linux (LUKS)
LUKS* é o método padrão de criptografia de disco completo para Linux. Ele pode ser usado para criptografar volumes completos, partições ou criar containers criptografados.
:octicons-home-16: Homepage{ .md-button .md-button--primary } :octicons-info-16:{ .card-link title=Documentation} :octicons-code-16:{ .card-link title="Source Code" }
Creating and opening encrypted containers
dd if=/dev/urandom of=/path-to-file bs=1M count=1024 status=progress
sudo cryptsetup luksFormat /path-to-file
Opening encrypted containers
We recommend opening containers and volumes with udisksctl
as this uses Polkit. A maioria dos gestores de ficheiros, tais como os incluídos em ambientes de desktop populares, consegue desbloquear ficheiros encriptados. Tools like udiskie can run in the system tray and provide a helpful user interface.
udisksctl loop-setup -f /path-to-file
udisksctl unlock -b /dev/loop0
Remember to back up volume headers
Recomendamos que você sempre faça backup dos seus cabeçalhos LUKS em caso de falha parcial da unidade. This can be done with:
cryptsetup luksHeaderBackup /dev/device --header-backup-file /mnt/backup/file.img
Linha de comando
Tools with command-line interfaces are useful for integrating shell scripts.
Kryptor
Kryptor é uma ferramenta de criptografia e assinatura de arquivos livre e de código aberto que faz uso de algoritmos criptográficos modernos e seguros. It aims to be a better version of age and Minisign to provide a simple, easier alternative to GPG.
:octicons-home-16: Homepage{ .md-button .md-button--primary } :octicons-eye-16:{ .card-link title="Privacy Policy" } :octicons-info-16:{ .card-link title=Documentation} :octicons-code-16:{ .card-link title="Source Code" } :octicons-heart-16:{ .card-link title=Contribute }
Túmulo
Tomb é uma shell wrapper de linha de comando para LUKS. It supports steganography via third-party tools.
:octicons-home-16: Homepage{ .md-button .md-button--primary } :octicons-info-16:{ .card-link title=Documentation} :octicons-code-16:{ .card-link title="Source Code" } :octicons-heart-16:{ .card-link title=Contribute }
OpenPGP
OpenPGP is sometimes needed for specific tasks such as digitally signing and encrypting email. Dica "Use padrões futuros ao gerar uma chave". For tasks such as signing or encrypting files, we suggest the above options.
When encrypting with PGP, you have the option to configure different options in your gpg.conf
file. We recommend staying with the standard options specified in the GnuPG user FAQ.
Use future defaults when generating a key
When generating keys we suggest using the future-default
command as this will instruct GnuPG use modern cryptography such as Curve25519 and Ed25519:
gpg --quick-gen-key alice@example.com future-default
Guarda de Privacidade GNU
GnuPG é uma alternativa GPL-licenciada ao conjunto de software criptográfico PGP. GnuPG está em conformidade com RFC 4880, que é a especificação atual da IETF do OpenPGP. The GnuPG project has been working on an updated draft in an attempt to modernize OpenPGP. GnuPG is a part of the Free Software Foundation's GNU software project and has received major funding from the German government.
:octicons-home-16: Homepage{ .md-button .md-button--primary } :octicons-eye-16:{ .card-link title="Privacy Policy" } :octicons-info-16:{ .card-link title=Documentation} :octicons-code-16:{ .card-link title="Source Code" }
GPG4win
GPG4win é um pacote para Windows da Intevation and g10 Code. Inclui várias ferramentas que auxiliam os usuários do PGP no Microsoft Windows. O projeto foi iniciado e originalmente financiado por pelo Escritório Federal de Segurança da Informação (BSI) da Alemanha em 2005.
:octicons-home-16: Homepage{ .md-button .md-button--primary } :octicons-eye-16:{ .card-link title="Privacy Policy" } :octicons-info-16:{ .card-link title=Documentation} :octicons-code-16:{ .card-link title="Source Code" } :octicons-heart-16:{ .card-link title=Contribute }
Downloads
Suíte GPG
Note
We suggest Canary Mail for using PGP with email on iOS devices.
GPG Suite provides OpenPGP support for Apple Mail and macOS.
We recommend taking a look at their First steps and Knowledge base for support.
:octicons-home-16: Homepage{ .md-button .md-button--primary } :octicons-eye-16:{ .card-link title="Privacy Policy" } :octicons-info-16:{ .card-link title=Documentation} :octicons-code-16:{ .card-link title="Source Code" }
Downloads
OpenKeychain
OpenKeychain é uma implementação Android do GnuPG. It's commonly required by mail clients such as K-9 Mail and FairEmail and other Android apps to provide encryption support. Cure53 completed a security audit of OpenKeychain 3.6 in October 2015. Detalhes técnicos sobre a auditoria e as soluções OpenKeychain podem ser encontrados here.
:octicons-home-16: Homepage{ .md-button .md-button--primary } :octicons-eye-16:{ .card-link title="Privacy Policy" } :octicons-info-16:{ .card-link title=Documentation} :octicons-code-16:{ .card-link title="Source Code" }
Downloads
Framadate
Please note we are not affiliated with any of the projects we recommend. In addition to our standard criteria, we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you.
Minimum Qualifications
- Cross-platform encryption apps must be open source.
- File encryption apps must support decryption on Linux, macOS, and Windows.
- External disk encryption apps must support decryption on Linux, macOS, and Windows.
- Internal (OS) disk encryption apps must be cross-platform or built in to the operating system natively.
Melhor caso
Os nossos melhores critérios representam o que gostaríamos de ver num projeto perfeito desta categoria. As nossas recomendações podem não incluir todas as funcionalidades, mas incluem as que, na nossa opinião, têm um impacto mais elevado.
- Operating System (FDE) encryption apps should utilize hardware security such as a TPM or Secure Enclave.
- File encryption apps should have first- or third-party support for mobile platforms.