Encryption

CipherShed

5  /  1 Reviews
307 Downloads
Dec 25, 2018 Last updated

Downloads

Description

CipherShed is a free encryption software that assists you in making sure your data is private and secure.

It is an open-source program which can encrypt files, generate encrypted files, and create encrypted drives. These encrypted files and drives serve to safeguard your private data.

The program is also capable of encrypting HDDs and even flash drives. CipherShed is specially made for easy use and includes a wizard functionality to help users through everything they want to do, one step at a time. You do not need to possess technical expertise or use it previously to figure out how to run CipherShed.

One advantage of CipherShed is that it is available across different operating systems, including Microsoft Windows, and soon for macOS and Linux.

Note: When we listed CipherShed on FossHub a version for macOS and Linux is not available, yet. According to the team "although, as packages for OS X and Linux do not exist, yet, users of those platforms will need to compile CipherShed." Source: official homepage.

This is a significant advantage since quite a few programs are not available or do not function properly with several different operating systems. The program is also easy to use, and once an encrypted file or disk drive is created, CipherShed mounts the data.

The data is displayed on a standard disk (not a physical disk drive), so you can read it and write to it whenever you like. CipherShed also includes on-the-fly encryption, so that encrypted data is quickly decrypted after the user has entered the correct password. The user does not have to wait for a decryption process or recall complex commands.

This adds to its usability by a range of users. CipherShed also uses top of the line encryption methods, including individual ciphers and algorithms which are cascaded and combined to maintain the highest level of security. Attackers would find themselves unable to decipher your data due to the variety and amount of encryption methods used to protect your data. A few of those encryption systems are Twofish and Serpent.

You can also have plausible deniability in that your data is hidden within a volume protected by an invisible volume. Thus, the data does not seem to exist for unauthorized users. They could guess more data exists than presented, but they would have no proof due to the sophisticated encryption.

Found this software useful? Please consider a donation to the author.