Hi Uri, there are use cases where it is enough to encrypt file contents and you don't care about the directory structure, file sizes or file metadata being public. For these cases, a (fixed version of) EncFS works just as well.
However, this metadata being public gives an attacker more information than you might think at first glance. Say you store some directories, each has ~20 files and each file has ~3MB. This is probably a music CD collection. Or say you store a copy of the Windows 8 CD (or any other set of files the attacker has access to). By looking at the distribution of file sizes over directories, an attacker can say with fair certainty whether you're storing this set of files or not. Another potential problem are watermarking attacks. So in general, my opinion is to better be safe than sorry and keep things as confidential as possible. But there certainly are use cases where this level of confidentiality is not needed. Best, Sebastian On 08.02.2016 18:36, Blumenthal, Uri - 0553 - MITLL wrote: > It is unclear to me what kind of information you expect the adversary to > learn from the current EncFS structure with encrypted filenames (and the > other protections, like block-encoding file names, etc), what what in your > opinion that adversary could do with that information. > > I wonder if the extra complexity and fragility this mechanism introduces > are worth the extra protection it offers. > > For example, I couldn’t care less that my directory structure is revealed. > Hiding file names is plenty good enough for my use case. > > For those who’d rather have a completely opaque container, there is > VeraCrypt. > -- > Regards, > Uri Blumenthal > > > > > On 2/8/16, 04:23, "Sebastian Messmer" <heinzis...@web.de> wrote: > >> Hey Anthony, >> >> thank you. Tell me what you think after you tried it out. >> If you have input on the way I intend to solve the directory conflict >> problem, I'd also be happy to hear it. >> >> Just as you can with EncFS, you can interleave multiple encrypted file >> systems in CryFS if you keep the configuration file out of the base >> directory. You can also for example obfuscate the actual file system >> size by adding random blocks (or alternatively a second CryFS file >> system with random data). >> >> Best >> Sebastian >> >> On 08.02.2016 01:47, Anthony Thyssen wrote: >>> I look forward to testing out this out. As I have said in the past, >>> this is the 'next step' in the File System Level of Encryption (As >>> opposed to Disk/Partition or individual File based encryption). >>> >>> The point about a changes to a directory on two different systems >>> causing a synchronization conflict is something I never even thought >>> of, and will require some very careful handling. Otherwise files added >>> on one system may become 'lost'. >>> >>> I also look forward to attempting to 'interleave' multiple encrypted >>> file systems into the same encrypted data store, Something I often do >>> with EncFS without problems. >>> >>> Thank you for your efforts, Cloud Filesystems have become a major part >>> of the world, and Encrypted Filesystems has become vital to making >>> this secure, even form the providers of such systems. >>> >> >> -------------------------------------------------------------------------- >> ---- >> Site24x7 APM Insight: Get Deep Visibility into Application Performance >> APM + Mobile APM + RUM: Monitor 3 App instances at just $35/Month >> Monitor end-to-end web transactions and take corrective actions now >> Troubleshoot faster and improve end-user experience. Signup Now! >> http://pubads.g.doubleclick.net/gampad/clk?id=272487151&iu=/4140 >> _______________________________________________ >> Encfs-users mailing list >> Encfs-users@lists.sourceforge.net >> https://lists.sourceforge.net/lists/listinfo/encfs-users > ------------------------------------------------------------------------------ > Site24x7 APM Insight: Get Deep Visibility into Application Performance > APM + Mobile APM + RUM: Monitor 3 App instances at just $35/Month > Monitor end-to-end web transactions and take corrective actions now > Troubleshoot faster and improve end-user experience. Signup Now! > http://pubads.g.doubleclick.net/gampad/clk?id=272487151&iu=/4140 > _______________________________________________ > Encfs-users mailing list > Encfs-users@lists.sourceforge.net > https://lists.sourceforge.net/lists/listinfo/encfs-users ------------------------------------------------------------------------------ Site24x7 APM Insight: Get Deep Visibility into Application Performance APM + Mobile APM + RUM: Monitor 3 App instances at just $35/Month Monitor end-to-end web transactions and take corrective actions now Troubleshoot faster and improve end-user experience. Signup Now! http://pubads.g.doubleclick.net/gampad/clk?id=272487151&iu=/4140 _______________________________________________ Encfs-users mailing list Encfs-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/encfs-users