antigift could be used for encryption files & folders on USB-flash or HDD partition. Works out of box on Linux, Windows, Mac OS X, FreeBSD, DragonFly BSD and other on OSes. Do not required installation. Include wipe tool for wiping free space and tooll for recovery forgotten key.
What's new in version 2.0:
Download and extract achieve and put files and folders (SYS, INB and CPT) to all removable drives you have. Also you may extract and use antigift on any HDD partition or you home directory.
No special requirements on Windows, Linux, FreeBSD, DragonFly BSD and Mac OS X. On other platforms when you run scripts in first time you should have make(or bmake, gmake), gcc to build ccrypt. Building ccrypt invokes automatically. Also Unixes you need mount USB flash drive with exec option.
Situation when you are saving your private data and public data on one removable drive is quite possible. Messing up private data and public ones makes you be more careless.
If you lose your USB drive or forget it behind in public places, it simply means you gift your data to anyone who will find it. Antigift is a tool which prevents such situation. The best part of this application is you do not have to go through any tedious installation procedure; instead you can use it on the run and also it is cross platform!
I assume you know what data is your private one and what data is public one. I believe there are no reasons to encrypt public available data (e.g. video, music, etc) which you could easily download from Internet. So first make yourself to separate your real private data and public ones.
INB - inbound folder for private data(for encrypted and decrypted)
SYS - system folder with program ccrypt for different platforms
CPT - folder with encrypted files
CRYPT.sh - encryption script for Unix/Linux systems and Mac OS X
CRYPT.BAT - encryption script for Windows
DECRYPT.sh - decryption script for Unix/Linux systems and Mac OS X
DECRYPT.BAT - decryption script for Windows
MISSKEY.sh - for recovery partially forgotten or mistyped key for Unix/Linux and Mac OS X
MISSKEY.bat - for recovery partially forgotten or mistyped key for Windows
WIPE.sh - script for wiping free space to clear deleted files on Unix/Linux, Mac OS X
WIPE.BAT - script for wiping free space to clear deleted files on Windows
Just follow few simple steps to encrypt and decrypt the files or folders.
Pic. 1 Encrypting on Windows
After finishing your work do not forget to encrypt with CRYPT.bat or ./CRYPT.sh again.
Pic. 2 Decryption in Linux
If you entered the wrong part of the key or have forgotten some of the characters entered during password setting combination, then decrypt the data will be very difficult. You have to remember the full and right key combination or try to pick up random keyed characters which is quite time-consuming and boring deal. Antigift now include easy tool which allow automatical brute force part of you key, but only small part. If you make a mistake more then two characters or forget more then 2 letters or number of your key - this tool will be useless. I other cases recovery of forgetten one or two symbols can be done very quickly, the tool will show the correct password in a few second.
To do this:
Wait for the brute forcing of the key will be finished. If you entered key differ by 1-2 characters within a few seconds you will see the right key combination.
Pic. 3 Recovery of forgotten key in Linux
Then run or DECRYPT.bat or ./DECRYPT.sh, enter founded key and decrypt your data.
Default behavior of ccrypt(used as backend) is to replace a space on disk which was used for original unencrypted file by encrypted file.
You do not need to wipe out free space with zero if you are using ccrypt.
Just do not forget to move or cut/paste your private data instead copy one.
If you make double copy of original files and then delete it you need to run wiping scripts WIPE.bat
Pic. 4 Wiping out free space on Windows
You may compress your private data. But compress your private data before encryption(as after encryption compression will ineffective).
And you need to wipe out your data after you delete uncompressed original files.
If your encrypted file was modified or damaged you could recover it partially using -m switch( --mismatch) of ccrypt utility. Of course it will recover data only from beginning of file to position it was modified. For details please refer to ccrypt documentation.