• 20 Posts
  • 631 Comments
Joined 3 years ago
cake
Cake day: July 5th, 2023

help-circle









  • Wouldn’t it be in the best interests of state sponsored hacking teams to hide or blame other states?

    Of course. If I were leading an offencive team at CSIS, I’d do my best to procure machines and credentials in anorher country to launch the campaign from. Ideally a known adversary. That doesn’t mean that country isn’t executing their own attacks. In fact my charade wouldn’t work if I chose a country that has no track record of attacks.









  • Yup. VeraCrypt is also portable but it would play badly with web-backed storage that uploads/downlaods whole files. Would only be usable on local NAS storage. That said, I’m curious to see how Cryptomator performs on local NAS for high-perf applications compared to VC or LUKS. E.g. if you want to have a large photo collection with Immich on top of it. 😀 Sadly I don’t have NAS anymore to test it out.


  • The fact you didn’t mention the barest of minimums in your comment if where the issue lies.

    I described the procedure step-by-step mentioning each layer. That’s the best I could do.

    OP specifically said they DID NOT want exactly what you’re describing.

    OP said they’re worried about performance with this solution. Hence why my first response addressed the performance issue. The rest was responding to you (and anyone else who is reading) since you thought that is not an E2E solution. I tried explaining why it’s client-side encryption and no keys are stored on the host.