Forum Replies Created
-
AuthorPosts
-
Hello Nick,
If the password is something else than a word, essentially 8 more or less random letters and digits it will probably stand up agains most private attackers, but probably not against an attacker with a national budget such as a security agency or federal police if they are *really* determined.
AxCrypt 2 does ensure you don’t have too easy passwords, but of course it’s not fool proof, it can be “tricked” as well.
Hello Nick,
Since really changing the password is the same as changing the encryption, which means changing the encrypted files that operation must by definition be done on the files themselves. It can’t be done remotely.
If the password is weak, then it may indeed be possible to brute-force (i.e. guess) the password. It all depends on how weak the password is and how determined the attacker is.
When you use AxCrypt 2, it is actually quite hard to set a really weak password, since we require a minimum strength. For AxCrypt 1, no such check is made so there you can have the password “1” for example, or “Password”, or “qwerty” etc. That’s highly unlikely with AxCrypt 2.
If you password is either shorter than or equal to 4 or 5 characters in length, or is on the list of the most common passwords used then it’s very likely that a reasonably determined or even highly curious attacker will be able to guess it.
Hello Sarah,
Sorry, I did not read carefully enough.
There is no maximum as such, although performance may suffer with many files and folders. We are working on improving that.
I am not quite sure why it’s not working for you. Do remember that we don’t encrypt the files as they appear in the folder, you’ll have to click the ‘Broom’ icon to clean. Perhaps you can try it out with just two or three folders with two or three files each just to understand and more clearly see what is happening / not happening?
Hello Sarah,
You need to enable the option “Include subfolders” in settings. Then it should work as you expect.
Hello Gonzalo,
When you successfully sign in with your online AxCrypt ID password (i.e. our server verifies that the password is correct), the necessary information is synchronized with your local PC.
If you subsequently do:
1) Change the online password via the web.
2) Prevent AxCrypt from accessing the server in one way or another.
3) Sign in to AxCrypt on your local PC, and provide the password originally used before you did 1) and 2), then you’ll get the above dialogue.
May 30, 2018 at 09:39 in reply to: Version conflicts: Attempt to open file with V2 corrupts file for V1 #10686Hello Julius,
There is no single “downgrade to version 1” command unfortunately.
What you can do is to decrypt them, and then re-encrypt them with version 1 – and change the setting in your version 2 to not automatically upgrade. Version 2 will work fine in version 1 format as well, but not the reverse as you have found out.
May 29, 2018 at 16:49 in reply to: Version conflicts: Attempt to open file with V2 corrupts file for V1 #10684Hello Julius,
It’s not a bug. When you open a version 1-file with AxCrypt version 2, it will be upgraded to version 2 format unless you disable this function. So the file is not corrupted, it’s just upgraded and thus not recognizable by version 1 software.
You can disable this automatic upgrade.
Hello Amaury,
Yes, http://www.axantum.com describes AxCrypt 1 which is no longer maintained.
There is currently no planned date for the command-line version. You can always roll your own by integrating with the source code (it’s actually not that complicated for a simple use-case). We do have other requests for this functionality so we will try to deliver something not too far in the future.
Hello Gonzalo,
There is no “local password” with AxCrypt 1.x in any meaningful sense. Each file encrypted with AxCrypt 1 is encrypted with the password used at the time. To ‘change’ it, you’ll have to decrypt it and re-encrypt it. AxCrypt 2 normally does this automatically when you open an AxCrypt 1 file. There is also a function in AxCrypt 1 to upgrade version 1 files to version 2, and at the same time of course re-encrypt them using your version 2 password. This is probably the function you are looking for.
Hello Amaury,
What I mean to say is that sometime in the future we’ll implement a separate command line utility for AxCrypt 2. At this time we do not have one. I am sorry.
Hello Amaury,
It looks like you are trying to use an AxCrypt 1.x command line with AxCrypt 2.x. AxCrypt 2 does not support the command line as yet (and never will quite like that, it’ll be a separate command line executable), and AxCrypt 1.x is no longer maintained although it is of course available still.
Hello Nazarka,
I am very sorry to hear that you apparently are the victim of a hacker ransom attack against your files.
However, please understand that AxCrypt is just a tool that is used by millions of legitimate users for good purposes. I am very sad that a hacker has chosen AxCrypt as the tool to perform the ransom attacks.
Unfortunately in this case, AxCrypt is based on strong encryption, and it is generally not possible to crack the encryption.
What you must do is contact your local police, and have them follow the money and Internet trail to the hacker. Since others appear to be in the same situation, you may want to contact media in order to make this problem more widely known, and also gain the possibility of a group action of all the victims against the hacker.
We cannot help, we are in no way involved, and there is no way to open the files without the passphrase used.
Please read http://blog.axantum.com/2012/07/axcrypt-used-for-ransom-attacks.html for a longer discussion of what I know about this affair.
Hello Thomas Joseph,
AxCrypt 2 works just like your email software or most other password-protected systems. You sign in once, and remain signed in until signed out. Just like you can read many emails without entering the password every time, AxCrypt will do the same. The files are still encrypted, but your password is remembered until you sign out of AxCrypt.
Hello,
The message “Vous êtes déjà connectés avec ce mot de passe…” means just that – you’re already signed with the password you’re trying and it’s no use to re-enter it again, AxCrypt has already tried that password and it doesn’t work.
The reason for this is that you’ve reset your password, which you did on the 25th. Resetting your password does not regain access to already encrypted files. You need to remember the original password.
Hello,
AxCrypt 1 and 2 work the same way, as you describe, except that the original file *is* wiped. What you are seeing is probably temporary copies created by the application software itself, which AxCrypt has no control over.
This is why we always recommend to complement AxCrypt with full disk encryption for local device security.
There are other scenarios as well outside of AxCrypt’s control where the plain text may be made recoverable, such as shadow copies in Windows and journaling file systems.
If you can actually show an example where the plain text is directly recoverable after opening and closing a file with AxCrypt, please describe the exact sequence of events. Do be sure that there are no recoverable files *before* starting the test.
-
AuthorPosts