How does file encryption work?

Encrypter simply encrypts and decrypts files so that if the data falls into the wrong hands it is essentially useless without the software and the password to unlock the encrypted file.

Does Encrypter work on linux?

Presently CodeLock only has a windows version however we are developing a port to other operating systems in the future. You are able to run CodeLock using windows port applications in linus such as WineHQ that supports Android, Ubuntu, Debian, Fedora and macOS.

How do I encrypt a file with a password?

Encrypter has a simple to use drag and drop or manual file selection utility that enables you to select the file you want to encrypt.

The original file is then encrypted and renamed into a new encrypted file so [filename.gif] encrypted version is [filename_gif.rpd] with the password that you selected.

When decrypted with the password the original file name and restored and becomes openly accessible again.

Can a hacker with another encryption software decrypt Encrypter files?

No, only Encrypter software can decrypt the files encrypted by the Encrypter software.

And only if the password is supplied.

Furthermore if purchasing multiple versions of Encrypter (to be used inside a company environment) the encryption can be further mapped to specific licence keys so that only specific licenced versions of Encrypter can be used to decrypt files. This means that in some corporate environments, external users with their own Encrypter licence may not be able to decrypt sensitive company files as they do not exist in the licence group associated to the company.

In-Picture (Steganography) Encryption

Steganography is the practice of hiding a message inside another message or a physical object that exists in plain sight. Encrypter features in-picture steganography file encryption features that enable you to embed encrypted text messages into standard image files so that you are able to securely send images with hidden messages. If the image is intercepted en route it will simply look like an image file, but only encrypted can decrypt the hidden message embedded in the image code.

A little challenge

Decrypt this file and send us a screenshot of the database tables and we will pay you $5000 no questions asked.

How to implement file security

Each case is different from micro startup companies to enterprises. Essentially each user will need a licenced version of Encrypter and encrypt their files whenever they are not in use. The most common scenarios of leaks and attacks happen in the transit of data. Email communications shared folders or misplaced hardware falling into the wrong hands. Implementing internal policies for encrypted data, storage, retention and transit can go a long way toward protecting critical data leaks.

Is it possible to reverse engineer encrypted files?

The short answer is no. If the file has been encrypted and you have lost the password the data is as good as gone. To give you an idea to brute force the encrypted file would theoretically take the worlds fastest supercomputer “27,337,893 trillion trillion trillion trillion” years to decode.

My windows comes with Bitlocker or WinZip, why use Encryptor?

Bitlocker uses local drive encryption that encrypts a full drive to a specific computer. This is great so that the drive’s data cannot be used in another machine, keeping the user’s data locally secure, but does very little to secure files in transit.

WinZip file encryption and password protection is a great option to encrypt zip files in transit and certainly a great product touting it’s AES 256 bit encryption. However, the single fail point on zip files is that while the Encryption algorithm itself is bullet-proof. The ability to “brute-force” compromise the files using (freely available software) to guess known databases of password combinations. Once the password is breached, the zip file can simply be extracted.

Thinking like a hacker

Encrypter is designed to encrypt specific files so that they can be safely sent or stored and decrypted only by the intended recipients. The tiered layers of encryption security triple ensure that the software itself (cannot be brute-force attacked), nor can the standalone file without the software and the final silver bullet is that the licence key of the software or groups of licence keys (as with a company) where only specific licenced versions of Encrypter can open the companies internal encrypted files.

Encrypter HTML Obfustication

Encrypter supports easy HTML code obfuscation as feature for secure web pages. Obfuscation however is not classified as encryption but simply a first line of defence in not allowing people to easily interpret the contents of HTML based web pages. The application takes standard HTML input and outputs obfusticated javascript code that allows the HTML document to render normally to web browsers. If however the source code web page is viewed it is difficult hard to decode.

What is end-to-end encryption?

With the update of end to end encryption in WhatsApp and many text messenger services, the terminology became more mainstream. However, that is what we have embedded into CodeLock file security products from the outset. End-to-end encryption ensures that only the intended users are able to access and process the information being sent. Any data that exists in transit or on storage is encrypted and inaccessible and if by some chance it was accessed it by a third party it would be useless.

Get a personal consultation.

Robust digital security solutions.