• BlanketsWithSmallpox@lemmy.world
    link
    fedilink
    English
    arrow-up
    6
    ·
    1 day ago

    Regular old ZIP with AES-256 should do the trick for anything truly important you want to keep locked down.

    You could always do sly stuff like Hidden volumes with Veracrypt as well. Leave the crumb trail for the low key shit or old nudes of gfs you have permission to keep.

    • waitmarks@lemmy.world
      link
      fedilink
      English
      arrow-up
      12
      arrow-down
      1
      ·
      23 hours ago

      Or don’t use an operating system that uploads your encryption keys to their corporate servers for “backup”.

        • uszo165@futurology.today
          link
          fedilink
          English
          arrow-up
          8
          arrow-down
          1
          ·
          20 hours ago

          There is no recommendation that a user can decline. Windows uploads the keys without asking, without consent.

          • Kissaki@feddit.org
            link
            fedilink
            English
            arrow-up
            2
            ·
            12 hours ago

            Do you have a source for that?

            This article said “by default”. The article they link to on that talks about encryption on by default on new PCs. The article I read before this one said “Microsoft recommends”.

            BitLocker FAQ says

            How can the recovery password and recovery key be stored?

            The recovery password and recovery key for an operating system drive or a fixed data drive can be saved to a folder, saved to one or more USB devices, saved to a Microsoft Account, or printed.

            /edit: fix quote