Filesystems: What filesystems are supported.Trusted Platform Module: Whether the implementation can use a TPM cryptoprocessor.Access your encrypted files on all devices. Hardware acceleration: Whether dedicated cryptographic accelerator expansion cards can be taken advantage of. BoxCryptor secures your data in the cloud, no matter if you use Dropbox, SkyDrive, Google Drive, or any other cloud storage provider.Just install, login, and encrypt/decrypt. Passphrase strengthening: Whether key strengthening is used with plain text passwords to frustrate dictionary attacks, usually using PBKDF2. Boxcryptor takes all the guesswork and workflow-revamping out of encrypting your local and cloud storage files.Delete the files from the unencrypted location. Copy all your files and folders from that unencrypted location into the mounted Cryptomator drive. Multiple keys: Whether an encrypted volume can have more than one active key. Configure CryptMator (basically follow Cryptomator’s instructions) to place its encrypted folder in more-or-less the same place as you had your encrypted BoxCryptor files.Here’s an overview of the differences: Boxcryptor 2.
0 Comments
Leave a Reply. |