newsletter banner

ISSUE 19.35.F • 2022-08-29 • Text Alerts!Gift Certificates

In this issue

FREEWARE SPOTLIGHT: Cryptomator — a little foil on your head is quite fashionable

Additional articles in the PLUS issue • Get Plus!

PUBLIC DEFENDER: Google explains why videos sent from iPhones look so terrible

LINUX: The state of Linux in 2022

ON SECURITY: Ready to patch your car?


ADVERTISEMENT
Your Ad Here!

Save Hundreds of Hours of Manual Tasks by Automating Your Compliance

Far too often, security teams are tasked with manual evidence collection to become compliant, dedicating hundreds of hours that could otherwise be automated. As G2’s highest rated cloud compliance software, Drata streamlines your SOC 2, ISO 27001, PCI DSS, HIPAA, GDPR, CCPA and many other frameworks. Drata connects to your techstack with 75+ integrations, including AWS, GitHub, GCP, & more to automate the compliance process.

Kickstart your compliance journey by requesting a demo and get 10% off.


FREEWARE SPOTLIGHT

Cryptomator — a little foil on your head is quite fashionable

Deanna McElveen

By Deanna McElveen

You can say you don’t trust the cloud with your files, but you do store files in the cloud. Your emails, your cat pictures on Facebook, your virtual farm in Farmville, your credit info, your bank account … yep, the cloud.

But you don’t have to go all-in with full trust. Take matters into your own hands!

I love my cloud storage services. I use Dropbox (my favorite), Google Drive (or whatever they’re calling it this week), OneDrive (will always be SkyDrive in my heart), and iCloud (we all make mistakes). Do I trust them to encrypt my data? Sure I do. Encrypt away, geeks! Do I also encrypt the files again from my end? Heck, yeah! Now, one might call me paranoid, but I’m really just a bit of a history buff. Words like “unhackable” and “uncrackable” sound an awful lot like “unsinkable” to me.

“Deanna, why should I encrypt my files if these cloud services are already doing that?” Simple. They do encrypt your files, but they also hold the encryption keys (aka the secret decoder ring). Did they give you a key? They didn’t give me a key. Where do they store this key? In what server and in what country? If it’s all the same to you, I’ll just encrypt them first and keep my own key, thank you.

Tobias Hagemann, Sebastian Stenzel, and Christian Schmickler (Figure 1) are the founders of Skymatic of Bonn, Germany. When not winning awards, they and their team develop, and give freely to the world, an open-source program called Cryptomator.

The founders of Skymatic
Figure 1. Founders of Skymatic and creators of CryptomatorSource: Skymatic GmbH https://skymatic.de

Cryptomator is crazy easy to use. In a nutshell, you are creating a folder in your cloud storage folder that Cryptomator calls “The Vault.” The AES 256-bit encryption is automatic and on the fly. Cryptomator will create a virtual drive in Windows Explorer to access your vault. You just move or copy your super-secret files and folders to it — and Cryptomator does the rest.

Get Cryptomator for Windows, MacOS, or Linux from OlderGeeks.com, then fire-up the program to begin installation (see Figure 2).

I could just tell you to check I agree to the license terms and conditions and start the install, trusting that I read it and will tell you it’s all good. I could, but you really must read the terms and conditions yourself before installing anything. Always.

Install window
Figure 2. Cryptomator is not portable, but it’s a safe and clean install.

Okay, all installed? Let’s learn how to use it in Windows (not much different in MacOS or Linux).

Open Cryptomator from your Start Menu to get the first window to set things up (see Figure 3).

Create a vault
Figure 3. Click to add a vault and also get more help.

When the Add Vault window pops up, choose Create New Vault (see Figure 4).

Add New Vault
Figure 4. At this point, we’ll be choosing to create a new vault.

Next, give your vault a name (see Figure 5). You are allowed to include word characters, numbers, hyphens, and underscores — so go nuts. I, however, am not nuts, so mine is pretty straightforward. If the green checkmark appears next to Valid vault name, your new vault name is good.

Name the vault
Figure 5. Give your new vault a name. Mine is called “OlderGeeks Secrets.”

Now you will select your storage service. One note on Dropbox here: From what I can gather from testing on a newly built laptop and hubby’s computer (from which these screenshots were taken), Dropbox shows up only if it’s a relatively new install. If Dropbox has been on a computer for years, you must browse to your Dropbox folder by choosing Custom location (see Figure 6).

(Some time ago, Dropbox must have made changes to the way things are stored, and Cryptomator can’t detect such older installs.)

I chose to place my vault called “OlderGeeks Secrets” into an existing folder called “OlderGeeks” in Dropbox.

Choose a location
Figure 6. Choose a location. If your cloud service is not shown, you can browse to its folder.

Create a strong password (see Figure 7). Cryptomator will show you, as you type it, how lame your password is. Keep typing things until Cryptomator indicates that it is not lame.

I have learned that my biggest trouble with growing old is forgetting that I forget things. My brain tells me to create a super-complicated password here and not to worry about forgetting it. Luckily, I remember that I forget that I forget things. This is why I, and you, are going to check the box that Yes please, better safe than sorry when asked if we want to create a recovery key.

Create a password and key
Figure 7. Don’t even think about continuing without creating a recovery key. I’m serious.

When your recovery key comes up (mine is blurred here), you can print it or copy it to the Windows Clipboard for pasting into a document. (See Figure 8.) Don’t feel insulted when I say the following: Do not paste it into a document that is stored in your cloud service folders! Use a flash drive, and keep it in a safe place.

print or copy the key
Figure 8. Print and/or copy your recovery key, in case you forget the password to your vault.

After clicking Next, the next window (not shown here) will ask if you want to unlock your vault now or later. Go ahead and unlock it. After doing so, you will get a pop-up dialog to enter your password (see Figure 9). You can check the box to remember your password, but don’t. If someone steals your computer, they won’t even have to look for a recovery key if you made it easy for them by checking the Remember password box.

Enter password to unlock
Figure 9. Enter the password to your vault. I recommend not checking to remember the password.

Next, you need to click Reveal Drive (see Figure 10) if you want your new virtual drive (with its new drive letter) to open right away. If you click Done instead, you will need to browse for the new drive.

Drive unlocked
Figure 10. Click Reveal Drive to have Cryptomator open the new virtual drive for you.

Now I have a new drive H: (see Figure 11). It’s a virtual drive that is actually the new folder I created in Dropbox. This is where I can start adding folders and files. As you can read in the “WELCOME.rtf” file, do not make any changes to your vault folder through DropBox or directly through the Dropbox folder in Windows Explorer. If you do, your files will not get encrypted, and it will probably create a big mess. Any other files or folders in any cloud storage can still be used as you always have — just not the vault folder(s).

New virtual drive
Figure 11. add or edit files and folders in your vault only through its virtual drive letter.

To relock the virtual drive, just click Lock (see Figure 12). This makes the virtual drive (my H: drive) disappear from Windows Explorer. Simply use Cryptomator to browse your virtual drives that are invisible to Windows and unlock them as needed.

Lock drive
Figure 12. Click Lock to hide the virtual drive again.

Now you can start adding files and folders to this drive, just like you would with any drive — but remember not to go too crazy at first. Everything you add still has to sync with the cloud.

Under Settings, there are a few useful items — such as the ability to start the program with Windows, minimizing the program on start, and the choice to have Cryptomator lock all drives automatically when you close the program.

This one is going onto all of our machines to stay. Hope you find it useful, too!

Bonus Software!

I discovered it. I can’t stop playing it. I’m addicted to it. It’s silly. It’s a big waste of time.

Now Munchy Worm is your problem, too. Get Munchy Worm from OlderGeeks.com!

Munchy Worm 1
Figure 13. Munchy Worm’s super-simple objectives

Munchy Worm 2
Figure 14. Munchy Worm. Try to stay short. Short is good.

Happy computing!

Grandma & Apple Pie Our entire philosophy at OlderGeeks is built on being a safe download site offering software you can trust. We use every program we consider, checking it carefully for bundleware or other sneaky stuff. Every downloadable is checked with VirusTotal and Malwarebytes. If a program is updated, we do the same checks again. We reject more programs than we accept, always stressing quality and safety over padding our collection. Every program mentioned in this article meets our rigorous standards. We’re as trustworthy as Grandma’s apple pie!
Talk Bubbles Join the conversation! Your questions, comments, and feedback
about this topic are always welcome in our forums!

Deanna and Randy McElveen are celebrating more than a decade of running OlderGeeks.com, over two decades in the computer business, and even more than that putting up with each other. Their computer store is in a small town in the Missouri Ozarks. Believing that happy customers are always the best advertisement, they hope to squeeze in a couple more decades doing the same.


ADVERTISEMENT
LensesRX


Here are the other stories in this week’s Plus Newsletter

PUBLIC DEFENDER

Brian Livingston

Google explains why videos sent from iPhones look so terrible

By Brian Livingston

Visuals sent from iPhones and iPads via iMessage are seriously degraded, sometimes unrecognizably so, when received on Android phones — and even sometimes on other iPhones. This is because Apple refuses to support a common tech standard, according to a new public effort by Google.

You may be surprised to learn that some very solid Mac users are the first to complain about Apple’s garbling of their multimedia files.

LINUX

Sandra Henry-Stocker

The state of Linux in 2022

By Sandra Henry-Stocker

Linux continues to play a major role in a number of market segments, from everyday embedded devices to supercomputers.

While it is used on fewer than 3% of desktops, it dominates supercomputing, web servers, the cloud, smartphones, and more. Linux-supported systems have even helped in the successful completion of 65 SpaceX missions. The fact that Linux is open-source means that it can be optimized for many different purposes and, looking at the Linux roadmap, it has.

Let’s take a stroll through Linux and see where it stands in 2022!

ON SECURITY

Susan Bradley

Ready to patch your car?

By Susan Bradley

Recently, I lamented having to get rid of an older automobile that had very little in the way of technology.

As I mentioned in that post, the technology (if you can call it that) consisted of a CD-ROM player, an ordinary radio, a cigarette lighter, and an auxiliary port. It certainly didn’t have the newfangled automobile technology available in almost every vehicle today. The newer the car, the more likely it is to have a technology-infused dashboard as well as out-of-sight processing power under the hood.


Know anyone who would benefit from this information? Please share!
Forward the email and encourage them to sign up via the online form — our public newsletter is free!

Enjoying the newsletter?

Become a PLUS member and get it all!

RoboForm box

Don’t miss any of our great content about Windows, Microsoft, Office, 365, PCs, hardware, software, privacy, security, safety, useful and safe freeware, important news, analysis, and Susan Bradley’s popular and sought-after patch advice.

PLUS, these exclusive benefits:

  • Every article, delivered to your inbox
  • MS-DEFCON Alerts, delivered to your inbox
  • MS-DEFCON Alerts available via TEXT message
  • Total access to the archive of nearly two decades of newsletters
  • No ads
  • Identification as a Plus member in our popular forums

We’re supported by donations — choose any amount for a one-year membership.

Join Today buttonGift Certificate button

The AskWoody Newsletters are published by AskWoody Tech LLC, Fresno, CA USA.

Your subscription:

Microsoft and Windows are registered trademarks of Microsoft Corporation. AskWoody, AskWoody.com, Windows Secrets Newsletter, WindowsSecrets.com, WinFind, Windows Gizmos, Security Baseline, Perimeter Scan, Wacky Web Week, the Windows Secrets Logo Design (W, S or road, and Star), and the slogan Everything Microsoft Forgot to Mention all are trademarks and service marks of AskWoody Tech LLC. All other marks are the trademarks or service marks of their respective owners.

Copyright ©2022 AskWoody Tech LLC. All rights reserved.