PitchHut logo
File-lock-desktop
Securely encrypt files and directories with ease.
Pitch

File-lock-desktop is a powerful desktop application designed for secure encryption of files and directories. With features like AES encryption and cross-platform support, it ensures maximum security and excellent performance. User-friendly and efficient, it provides the tools needed to protect important data effortlessly.

Description

Filelock: Secure File Encryption Made Easy

Filelock is a powerful desktop application designed to encrypt files and directories, ensuring that sensitive information remains secure. With its user-friendly interface and robust security features, users can easily protect their data across multiple platforms, including Windows, macOS, and Linux.

Filelock logo

Key Features

  • Comprehensive Encryption: Securely encrypt both files and directories effortlessly.
  • Optimized Performance: Leverage auto-detection for AES-NI to significantly enhance encryption speed.
  • Top-notch Security: Utilizes AES-GCM encryption for maximum data protection.
  • Secure Key Generation: Benefit from cryptographically secure key generation.
  • Cross-Platform Compatibility: Supports Windows, macOS, and Linux, allowing flexible use regardless of your operating system.

How to Use

Filelock simplifies the process of encryption, enabling users to get started quickly. For those interested in building the application themselves, follow these commands:

# Clone this repository
$ git clone git@github.com:constantin9845/File-lock-desktop.git

# Navigate to the app directory
$ cd electron-app

# Install dependencies
$ npm install

# Build and run the app
$ npm run build

Download

The latest installable version of Filelock is available for download on GitHub Releases.

Important Considerations

  • Familiarize yourself with the application by testing its usage before encrypting important data to avoid data loss.
  • Incorrect usage may lead to irreversible data loss.
  • On Linux and macOS, excessive key generation in a short period may lead to exhaustion issues with /dev/urandom.
  • Avoid opening Key/Tag files directly.

Usage Guidelines

  • Use the default naming convention for authentication tags and additional messages: (Auth: <file_name>_TAG, AD: <file_name>_Additional_Message.txt).
  • For successful decryption, ensure both the authentication tag and additional message file are located alongside the encrypted file.
  • New key files and resulting files/tags will be stored in the Downloads directory after encryption.
  • Decryption will always remove the original input files. Multiple files can be encrypted simultaneously, but only one directory can be processed at a time.

Feedback

User feedback is invaluable for improvement. Comments, questions, and concerns can be communicated via email.

Explore More

If you are interested in command-line encryption, check out Filelock-CLI, the command-line version of this application.

0 comments

No comments yet.

Sign in to be the first to comment.