Best Free Encryption Program For Mac

Best Free Encryption Program For Mac 3,8/5 4612 reviews
  1. Best Free File Encryption Software For Mac
  2. Best Free Mac Programs
  3. Best Free Encryption Software For Mac
  4. Best Free Encryption Software Download
  5. Free Encryption Software

Keeping your personal data safe doesn't have to be difficult—as long as you keep the sensitive stuff encrypted and under your control. That's why this week we're looking at the five best file encryption tools you can use to encrypt your data locally so only you have the key.

There are both paid and free software for OSX and WIndows, this guide will focus mainly on OSX 10.6 and above and Windows 7 and above. Note: Drive encryption may require you to format your drive. Apple Disk Encryption (File Vault). How can the answer be improved? FileVault is a greatly convenient encryption utility that lets you effortlessly secure the information stored on your USB drives.This is inbuilt software available for all Mac users. • It can be designed in simple seconds, utilizing the Drive Encryption applet of the Control Panel. MacOS sierra USB Encryption Software: With regards to storing information on the go, or even exchanging documents between PCs, there’s not really a storage medium more prominent than USB drives. All things considered, USB drives are quite solid.

Earlier in the week we asked you for your favorite file encryption tools, and you gave us tons of great nominations, but as always, we only have room for the top five.

Advertisement

What's The Best File Encryption Tool?

Times have changed, and more than a few tools have come and gone that were designed to encrypt your …

Read more Read

For the purposes of our roundup, we're focusing on desktop file encryption tools - the ones you use on your own computer to encrypt your own private data, not cloud services that promise to encrypt your data, or business services that say they offer encryption. The goal here is to find the best tools you can use to lock down your sensitive files—whether they're photos, financial documents, personal backups, or anything else—and keep them locked down so only you have the key. For those unfamiliar with the topic, we have a great guide on how encryption works, and how you can use it to keep your own data safe.

Advertisement

A Beginner's Guide to Encryption: What It Is and How to Set it Up

You’ve probably heard the word “encryption” a million times before, but if you still aren’t exactly …

Read more Read

With that out of the way, here are your top five, in no particular order:

VeraCrypt (Windows/OS X/Linux)

Advertisement

VeraCrypt is a fork of and a successor to TrueCrypt, which ceased development last year (more on them later.) The development team claims they've addressed some of the issues that were raised during TrueCrypt's initial security audit, and like the original, it's free, with versions available for Windows, OS X, and Linux. If you're looking for a file encryption tool that works like and reminds you of TrueCrypt but isn't exactly TrueCrypt, this is it. VeraCrypt supports AES (the most commonly used), TwoFish, and Serpent encryption ciphers, supports the creation of hidden, encrypted volumes within other volumes. Its code is available to review, although it's not strictly open source (because so much of its codebase came from TrueCrypt.) The tool is also under constant development, with regular security updates and an independent audit in the planning stages (according to the developers.)

Those of you who nominated VeraCrypt praised it for being an on-the-fly encryption tool, as in your files are only decrypted when they're needed and they're encrypted at rest at all other times, and most notably for being the spiritual (if not almost literal) successor to TrueCrypt. Many of you praised them for being a strong tool that's simple to use and to the point, even if it's lacking a good-looking interface or tons of bells and whistles. You also noted that VeraCrypt may not support TrueCrypt files and containers, but can convert them to its own format, which makes moving to it easy. You can read more in its nomination thread here.

Advertisement

AxCrypt (Windows)

Advertisement

AxCrypt is a free, open source, GNU GPL-licensed encryption tool for Windows that prides itself on being simple, efficient, and easy to use. It integrates nicely with the Windows shell, so you can right-click a file to encrypt it, or even configure 'timed,' executable encryptions, so the file is locked down for a specific period of time and will self-decrypt later, or when its intended recipient gets it. Files with AxCrypt can be decrypted on demand or kept decrypted while they're in use, and then automatically re-encrypted when they're modified or closed. It's fast, too, and allows you to select an entire folder or just a large group of files and encrypt them all with a single click. It's entirely a file encryption tool however, meaning creating encrypted volumes or drives is out of its capabilities. It supports 128-bit AES encryption only, offers protection against brute force cracking attempts, and is exceptionally lightweight (less than 1MB.)

Those of you who nominated AxCrypt noted that it's really easy to use and easy to integrate into your workflow, thanks to its shell support. If you're eager for more options, it also has a ton of command line options, so you can fire up the command prompt in Windows and perform more complex actions—or multiple actions at once. It may not support the strongest or most varied encryption methods available, but if you're looking to keep your data safe from most threats, it's a simple tool that can lend a little security that your data—like files stored in the cloud on Dropbox or iCloud, for example—are secure and convenient to access at the same time. You can read more in this nomination thread here and here.

Advertisement

BitLocker (Windows)

Advertisement

BitLocker is a full-disk encryption tool built in to Windows Vista and Windows 7 (Ultimate and Enterprise), and into Windows 8 (Pro and Enterprise), as well as Windows Server (2008 and later). It supports AES (128 and 256-bit) encryption, and while it's primarily used for whole-disk encryption, it also supports encrypting other volumes or a virtual drive that can be opened and accessed like any other drive on your computer. It supports multiple authentication mechanisms, including traditional password and PINs, a USB 'key,' and the more controversial Trusted Platform Module (TPM) technology (that uses hardware to integrate keys into devices) that makes encryption and decryption transparent to the user but also comes with a host of its own issues. Either way, BitLocker's integration with Windows (specifically Windows 8 Pro) makes it accessible to many people, and a viable disk encryption tool for individuals looking to protect their data if their laptop or hard drives are lost or stolen, in case their computers are compromised, or a business looking to secure data in the field.

Of course, it goes without saying that BitLocker was a contentious nomination. More than a few of you touted BitLocker's accessibility and ease of use, and many of you even praised its encryption for being strong and difficult to crack. Many of you noted that you switched to BitLocker after the developers of TrueCrypt suggested it. Others, however, brought up the assertion made from privacy advocates that BitLocker is compromised and has backdoors in place for government security agencies (from multiple countries) to decrypt your data. While Microsoft has officially said this isn't true and maintains there's no backdoor in BitLocker (while simultaneously maintaining the code as closed source—but available to review by its partners, which include those agencies), the assertion is enough to make more than a few of you shy away. You can read more about the criticism and controversy at the Wikipedia link above, or in the nomination thread here.

Advertisement

GNU Privacy Guard (Windows/OS X/Linux)

Advertisement

GNU Privacy Guard (GnuPG) is actually an open-source implementation of Pretty Good Privacy (PGP). While you can install the command line version on some operating systems, most people choose from the dozens of frontends and graphical interfaces for it, including the official releases that can encrypt everything from email to ordinary files to entire volumes. All GnuPG tools support multiple encryption types and ciphers, and generally are capable of encrypting individual files one at a time, disk images and volumes, or external drives and connected media. A few of you nominated specific GnuPG front-ends in various threads, like the Windows Gpg4Win, which uses Kleopatra as a certificate manager.

Those of you who nominated GnuPG praised it for being open-source and accessible through dozens of different clients and tools, all of which can offer file encryption as well as other forms of encryption, like robust email encryption for example. The key, however, is finding a front-end or a client that does what you need it to do and works well with your workflow. The screenshot above was taken using GPGTools, an all-in-one GnuPG solution that offers keychain management as well as file, email, and disk encryption for OS X. You can read more in its nomination thread here.

Advertisement

How to Encrypt Your Email and Keep Your Conversations Private

Between constant password breaches and the NSA looking in on everything you do, you've…

Read more Read

Best Free File Encryption Software For Mac

7-Zip (Windows/OS X/Linux)

Advertisement

7-Zip is actually a lightweight file archiver—and our favorite archive utility for Windows. Even though it's amazing at compressing and organizing files for easy storage or sending over the internet, it's also a strong file encryption tool, and is capable of turning individual files or entire volumes into encrypted volumes that only your have the keys to. It's completely free, even for commercial use, supports 256-bit AES encryption, and while the official download is Windows only, there are unofficial builds for Linux and OS X systems as well. Most of 7-Zip's code is GNU LGPL licensed and open to review. Compressed and encrypted .7z (or .zip, if you prefer) archives are easily portable and secure, and can be encrypted with passwords and turned into executables that will self-decrypt when they get to their intended recipient. 7-Zip also integrates with the shell of the operating system you're using, making it usually a click away from use. It's also a powerful command line utility.

The Best File Archive Utility for Windows

Windows has a number of good file archiving and unarchiving utilities, and which one you use…

Read more Read

Advertisement

Those of you who nominated it noted that it may not have the most robust user interface, but it gets the job done, and many of you have it installed anyway specifically for its robust file compression and decompression capabilities. You noted it's fast, flexible, free, and easy to use, and while it may not be the fastest file encryption tool (and it's not capable of whole volume or disk encryption), it gets the job done—especially for encrypting files you need to send to someone else and actually have them be able to access without jumping through too many hoops. Some of you noted that 7-Zip's encrypted volumes are flexible—perhaps too flexible, since new files added to an encrypted archive aren't encrypted (you'd have to extract them all and make a new archive for that), but it's otherwise a minor ding. You can read more in its nomination thread here.

Now that you've seen the top five, it's time to put them to an all-out vote to determine the community favorite.

Advertisement

Honorable Mentions

Best Free Mac Programs

We have two honorable mentions this week. First and foremost is Disk Utility (OS X), which is bundled with OS X as a disk repair and management tool. Disk Utility can also encrypt drives and volumes, and since OS X can create a compressed volume just by right-clicking a file, series of files, or a folder and selecting 'Compress,' Disk Utility makes encrypting anything you want extremely easy. Plus, it's built in to OS X, so you don't need to install anything else. You can read more about it in its nomination thread here.

Advertisement

Second, we should tip our hats to the venerable old TrueCrypt, our old champion, which actually earned a number of nominations in the call for contenders thread. We covered the meltdown of TrueCrypt when it happened, with the developers abruptly abandoning the project claiming that it's no longer secure, in the middle of their independent security audit. The developers suggested switching to BitLocker, and pushed out a new version that's widely considered compromised. However, the older version, 7.1a, is still widely regarded as safe, even though development on it has been abandoned, and the tool has been left without security updates since then. Even so, security analysts split on whether you should trust TrueCrypt or move on to another encryption utility. Many people stand by it even though it's a dead project, others have built their own projects on top of it (see VeraCrypt, mentioned earlier), and others keep using the last safe version. We can't recommend TrueCrypt anymore ourselves, but you can read more in its nomination thread here, and over at Steve Gibson's page dedicated to TrueCrypt here.

TrueCrypt's Web Site Updates with Ominous Warning, Details Unknown

TrueCrypt, one of our favorite file encryption tools, has abruptly changed its homepage to a…

Read more Read

Advertisement

Have something to say about one of the contenders? Want to make the case for your personal favorite, even if it wasn't included in the list? Remember, the top five are based on your most popular nominations from the call for contenders thread from earlier in the week. Don't just complain about the top five, let us know what your preferred alternative is—and make your case for it—in the discussions below.

The Hive Five is based on reader nominations. As with most Hive Five posts, if your favorite was left out, it didn't get the nominations required in the call for contenders post to make the top five. We understand it's a bit of a popularity contest. Have a suggestion for the Hive Five? Send us an email at tips+hivefive@lifehacker.com!

Advertisement

Title photo by andrey_l (Shutterstock).

TrueCrypt is the best free full disk encryption program you can download. A password combined with one or more keyfiles can secure every file and folder on an internal or external hard drive.

TrueCrypt also supports encrypting the system partition.

10 Best Screen Recording Software for Mac, OR in 2018 0 Technology will continuously break its own record of turning unimaginable things to achievable outputs that would benefit humankind for a. Sep 08, 2010  Question: Q: Best Screen Recording Software for Mac? Looking for recommendations on a good computer screen recording program, as I'm trying to make a tutorial video, and need to be able to record what I am doing on my computer screen. Best program for screen recording mac. Screen Recording Software for Mac is designed to capture all screen activities while you work on the Mac display. The best screen recording software should be able to capture videos in HD quality that is critical for coding tutorial and game demonstration videos. There are several paid and free Mac screen recording software available in the market, and the basic features can be found on free screen. We've already discussed screen recording software in general, but in this article we want to focus on Mac recording software as well as Mac screen capture software. First, I'll provide an overview of some of the best free screen recorder software for Macs and some free screen capture software as well.

The big 'selling' point for TrueCrypt is its ability to hide an encrypted volume inside another, both secured with a unique password, and both accessible without revealing that the other one exists.

TrueCrypt's official website states that the program is no longer secure and that you should look elsewhere for a disk encryption solution. However, this may not actually be the case for version 7.1a, which was a version of TrueCrypt released just before the final one. You can read a convincing argument about this at the Gibson Research Corporation website, or download a very similar program based on TruCrypt 7.1a, called VeraCrypt.

More About TrueCrypt

TrueCrypt does everything you'd expect a really good whole drive disk encryption program to do:

  • Works with Windows (10/8/7/Vista/XP), Mac, and Linux operating systems
  • Virtual disk drives in the form of single files can be built and encrypted
  • You can use a keyfile with or in place of a password for added security, such as a folder, file, security token, or smart card
  • Supports AES, Serpent, and Twofish encryption algorithms
  • Advanced settings are available so you can specify when to automatically dismount an encrypted drive, like when you log off, once the screensaver launches, and/or after a certain period of inactivity
  • If interrupted, TrueCrypt can resume the encryption process at a later time

TrueCrypt Pros & Cons

File encryption programs like TrueCrypt are extremely useful, but they can also be a bit complex thanks to the level at which they're working with your data:

Pros:

  • Can encrypt internal and external hard drives and partitions
  • On-the-fly encryption (OTFE)
  • Drives are easy to mount and dismount
  • Can mount a volume in read-only mode
  • Option to open encrypted volumes with a keyboard shortcut
  • A portable mode is available, which doesn't require installation

Cons:

  • Software is no longer being updated
  • May be confusing to use for the inexperienced
  • Decrypting a non-system partition requires an external formatting tool
  • Keyfiles can't be used to secure a system partition
  • Original documentation is no longer available

How to Encrypt the System Partition Using TrueCrypt

Follow these instructions to use TrueCrypt to encrypt the portion of a hard drive that's running an operating system:

  1. Go to System > Encrypt System Partition/Drive.

  2. Decide the type of encryption you want to use, and then choose Next.

    The default selection creates a regular, non-hidden system partition. Learn more about the other option below in the Hidden Volumes in TrueCrypt section and at the Hidden Volume documentation page.

  3. Select what you want to encrypt, and then choose Next.

    The first option found here, called Encrypt the Windows system partition will encrypt the partition with the operating system installed, skipping over any others you might have set up. This is the option we'll choose for this tutorial.

    The other option may be chosen if you have multiple partitions and would like them all to be encrypted, like the Windows partition plus a data partition on the same hard drive.

  4. Select Single-boot, and then Next.

    If you're running more than one operating system at once, you'll need to choose the other option, called Multi-boot.

  5. Fill out the encryption options, and then choose Next.

    The default selections are fine to use, but if you want, you can manually define the encryption algorithm on this screen. Read more about these options here and here.

  6. Enter and confirm a password on the next screen, and then select Next.

    TrueCrypt recommends using a password that's more than 20 characters in length. Don't forget what you've chosen here because this is the same password you'll need to use to boot back into the OS! If you need to, store it in a password manager accessible from your phone.

  7. On the Collecting Random Data screen, move your mouse around within the window to generate the master encryption key before selecting Next.

    Moving your mouse around the program window in a random manner is said to make the encryption key more complex. It's certainly an interesting way to generate random data.

  8. Choose Next on the Keys Generated screen.

  9. Save the Rescue Disk ISO image somewhere on your computer, and then select Next.

    If critical TrueCrypt or Windows files ever get damaged, the Rescue Disk is the only way restore access to your encrypted files.

  10. Burn the Rescue Disk ISO image to a disc.

    If you're using Windows 7, Windows 8, or Windows 10, you'll be prompted to use the Microsoft Windows Disc Image Burner to burn the file. If that doesn't work, or you'd rather not use integrated burning, see How to Burn an ISO Image File to a DVD, CD, or BD for help.

  11. Select Next.

    This screen just verifies the Rescue Disk was properly burned to the disc.

  12. Choose Next again, and then once more. The second screen is for choosing to wipe the free space off the soon-to-be-encrypted drive. You can either skip this by choosing the default option or use the built-in data wiper to completely erase the free space on the drive. This is the same procedure that the free space wiping options in file shredder software programs use.

    Wiping free space does not erase the files you're using on the drive. It only makes it less likely for data recovery software to retrieve your deleted files.

  13. The computer will restart at this point.

  14. Select Encrypt.

    TrueCrypt will automatically open once the computer has started back up.

  15. Choose OK.

While TrueCrypt is encrypting the system drive, you can still work normally by opening, removing, saving, and moving files. TrueCrypt actually pauses its encryption process automatically when there's any indication that you're using the drive.

Hidden Volumes in TrueCrypt

A hidden volume in TrueCrypt is just one volume built into another. This means you can have two different data sections, accessible by two different passwords, but contained in the same file/drive.

Best Free Encryption Software For Mac

Two types of hidden volumes are permitted with TrueCrypt. The first is a hidden volume contained on a non-system drive or virtual disk file, while the other is a hidden operating system.

According to TrueCrypt, a hidden partition or virtual disk should be built if you have heavily sensitive data. This data should be placed in the hidden volume and encrypted with a particular password. Other, non-important files should be placed in the regular volume secured with a unique password.

In the event you’re forced to reveal what’s in your encrypted volume, you can use the password that opens the 'regular,' non-valuable files while leaving the other volume untouched and still encrypted.

To the extortionist, it would appear that you have just unlocked your hidden volume to reveal all the data, while in reality, the important content is buried deeper inside and accessible with a unique password.

A similar methodology is applied to a hidden operating system. TrueCrypt can build a regular OS with a hidden one inside. This means you would have two different passwords — one for the normal system and the other for the hidden one.

A hidden operating system also has a third password, which is used if a hidden OS is suspected to be in place. Revealing this password would appear as though you’re revealing a hidden OS, but the files in this volume are still unimportant, 'fake' files that don’t actually need to remain a secret.

Thoughts on TrueCrypt

Of the few free full disk encryption programs out there, TrueCrypt is definitely a favorite.

As we mentioned above, the best thing anyone will mention about TrueCrypt is the hidden volume feature. While we agree with this, we also have to praise the smaller features like setting favorite volumes, using keyboard shortcuts, automatic dismounting, and read-only mode.

Something a little bothersome about TrueCrypt is that some things in the program don't work even though they would appear to. For example, the section for adding keyfiles is available while setting up encryption on the system drive but it's not actually a supported feature. The same can be said for hash algorithms during a system partition encryption — only one can actually be chosen even though three are listed.

Decrypting the system partition is easy because you can do it right from within TrueCrypt. When decrypting a non-system partition, however, you must move all your files to a different drive and then format the partition with an external program like Windows or any other 3rd party formatting tool, which seems like an unnecessary, extra step.

Best Free Encryption Software Download

TrueCrypt doesn't actually look like it's easy to use because the interface is bland and outdated, but it's really not bad at all, especially if you read through its documentation. The official TrueCrypt documentation is no longer available but most of it can be found at Andryou.com.

Free Encryption Software

The portable version of TrueCrypt can be downloaded from Softpedia or you can select 'Extract' during setup using the regular installer from the download link below to get the same result.