Lock-in prevention
Posted: Mon Feb 20, 2017 3:05 pm
First of all thank you for such an easy-to-use tool! VERY secure, transparent and convenient tool!
There is one thing that keeps us from using it full-time though (currently only being used for quick one-time only encryption for - say - sending a file over the net and immediately decrypt it at the other end). My question is time related (and I fear a fundamental one, not tied to AES crypt per se):
Say we have encrypted files using the current (or old) AES crypt program and we want to un-encript it 10 years later. In the mean time we (1) do not have the corresponding AES crypt program version (installer) anymore but only a much more recent version.. Or - worse - (2) Packetizer / AES crypt has seized to exist and source code has long been forgotten so no specific program is available to us anymore. But in both cases we do have the password and the encrypted files at hand.
[*] How would one commence to un-encrypt the data after 10 years in those two cases?
Luckily it is open-sourced , so chances of forcefully being locked in is covered (which can not be said about many other (encryption) initiatives)!
There is one thing that keeps us from using it full-time though (currently only being used for quick one-time only encryption for - say - sending a file over the net and immediately decrypt it at the other end). My question is time related (and I fear a fundamental one, not tied to AES crypt per se):
Say we have encrypted files using the current (or old) AES crypt program and we want to un-encript it 10 years later. In the mean time we (1) do not have the corresponding AES crypt program version (installer) anymore but only a much more recent version.. Or - worse - (2) Packetizer / AES crypt has seized to exist and source code has long been forgotten so no specific program is available to us anymore. But in both cases we do have the password and the encrypted files at hand.
[*] How would one commence to un-encrypt the data after 10 years in those two cases?
Luckily it is open-sourced , so chances of forcefully being locked in is covered (which can not be said about many other (encryption) initiatives)!