Ask Leo! #707 – How to Best Back Up Your Encrypted Data

This Week

Featured: Backing up encrypted data? You're probably doing it wrong.

Also this week: Speaking of encryption: a way to keep your cloud data secure, and what happens when the power goes out.

My most important book is still on sale! The Ask Leo! Guide To Staying Safe On The Internet - Expanded Edition is 25% off for a limited time. Yes, I consider it my most important book, because it covers what is perhaps the most important, and perpelexing, topic of all: keeping your computer, your data, and yourself safe on the internet. Grab your copy today!

Your support helps! People often ask how they can support Ask Leo!. I've put together a page that lists all the ways I can think of. While your purchases and patronage (and your coffee) help tremendously, not everything involves money! Anything, and everything is deeply appreciated to help keep Ask Leo! going. Support Ask Leo!

How to Best Back Up Your Encrypted Data

(skip)

I talk about encryption a lot. I talk about backing up even more.

Encryption is a critical component of keeping data safe and secure and out of the hands of those who shouldn't see it.

Backing up, of course, is our safety net for when things go wrong. A recent backup can save you from almost anything.

Unfortunately, I'd wager that most people are backing up their encrypted data improperly. The result is that they're not as protected by that backup as they might think they are.

The common approach

Let's assume you have some encrypted data. Specifically, that could be any of the following:

  • A password-protected Word document.
  • A “.zip” file with a password.
  • A VeraCrypt/TrueCrypt volume.
  • A collection of files encrypted by BoxCryptor or Cryptomator.
  • A file encrypted using PGP or GPG public key encryption.
  • A system protected with whole-disk encryption.

Naturally, that only skims the surface. There are many ways to encrypt data. For the purposes of this discussion, any of them will do.

The common approach is to back up the encrypted file. If “improtantdocuments.zip” has a password and is encrypted, then it's “improtantdocuments.zip” you're most likely to back up.

It's good you've backed up; don't get me wrong. That's much better than not backing up at all, of course.

But you're still at risk from threats your unencrypted data doesn't face.

When encryption goes bad

There are a couple of ways that encryption can “break”.

The most common is that you lose the password to the encrypted data. Perhaps you need the contents of an encrypted “.zip” file you created a decade ago, and have no clue as to its password. Without it, the data in that file is lost — as lost as if you simply deleted it on the day you created it. (This applies to public key encryption in cases where the private key is lost as well.)

Less common, and less expected, are disk- and file-damage-related problems — the very problems we think of using backups to protect ourselves from. For example, if the disk on which your backup “.zip” file is stored develops a bad sector anywhere within the file, it's possible the entire file will be unrecoverable. While some encryption algorithms are resilient to localized errors to minimize the damage done in cases like this, that's not true for all. Sometimes a tiny error in the wrong place can cause massive data loss if the files are encrypted.

Unencrypted files don't suffer from these issues. You'll never forget a password when there isn't one, and any file damage will be restricted to the single (or few) files within which a disk error happens to reside.

Therein lies our solution.

The better approach

Back up the data while it is unencrypted.

Expand the zip file, copy files out of the VeraCrypt volume, back up the contents of the mounted BoxCryptor volume — you get the idea. Decrypt the data, then back it up.

Depending on the scenario, this doesn't have to be hard. In the case of VeraCrypt and BoxCryptor-like tools, simply back up the contents of their mounted drives. In fact, if you're using whole-disk encryption, your backups will probably be unencrypted by default.

Of course, that means your backup now has secure data that is unencrypted. That requires one more step.

Secure differently

Now secure those backups some other way. The most common is to secure them physically — placing backup drives into locked drawers or safes or otherwise restricting physical access.

Another approach is to encrypt those backups using a different technique. For example, most image backup programs allow you to assign a password to the backups they create.

As an example, I take care to export my LastPass database in an unencrypted form, and then encrypt those backup copies using public key encryption. I also back up all the files I store encrypted in OneDrive, using Cryptomator to collect them into a zip file in unencrypted form and encrypting that using public key encryption.

By storing formerly encrypted files in their unencrypted form, we mitigate the possibility of encryption-related damage. Even if we choose to encrypt those files using a different technique, we've greatly reduced the risk of permanent damage by distributing the risk. It's significantly less likely that I would lose both my LastPass master password and my private key simultaneously, for example.

Back up, yes, but make sure you understand the ramifications and potential additional risks of backing up encrypted data. It may not be an issue for you, and that's great, but think about it now before it turns out that it has become one.

Related Links & Comments: How to Best Back Up Your Encrypted Data
https://askleo.com/43760

The Ask Leo! Guide To Staying Safe On The Internet ' Expanded Edition

Cryptomator: Encryption for Your Cloud Storage

I regularly hear concerns about using cloud storage — the biggest being that online files are at higher risk of compromise should your account or the storage be hacked. There are also concerns that your storage provider could be required to hand over your files to law enforcement agencies under certain circumstances.

Those are all valid concerns.

Cryptomator is a free encryption solution that addresses them.

Continue Reading: Cryptomator: Encryption for Your Cloud Storage
https://askleo.com/43770

If Shutting Down Windows Cleanly Is So Important, What Happens When the Power Just Goes Out?

I am aware that not going through the proper Windows shutdown can possibly have negative effects on a computer. But my question is if a computer loses power (due to a household power outage, not anything wrong with the power supply), are these negative effects strictly software related (meaning a format and reinstall would fix them), or might it cause hardware problems as well?

Shutting down Windows properly before turning off the power to your computer is important.

Not doing so can result in data loss and corruption as files are left only partially written to disk. But just turning off the switch is unlikely to actually harm your hardware.

Surprisingly, a household or other area-wide power outage turns out to be a completely different, riskier issue.

Continue Reading: If Shutting Down Windows Cleanly Is So Important, What Happens When the Power Just Goes Out?
https://askleo.com/3148

The Ask Leo! Tip of the Day

A feature exclusively available to Ask Leo! Patrons Bronze level & above.

More Ask Leo!

Tech Enthusiast Hour: I'm one of the regular hosts of the weekly Tech Enthusiast Hour podcast! Join us as we discuss the latest news & tech goings on. More information at tehpodcast.com!

Become a Patron
Ask Leo! Books
Facebook - YouTube - More..

Leo's Other Projects....

HeroicStories Since 1999, HeroicStories brings diverse, international voices to the world ' reminding us that people are good, that individuals and individual action matter. Stories - new and old - are published twice a week.

Not All News Is Bad - Each day I look for one story in the current news of the day with a positive bent. Just one. And I share it.

leo.notenboom.org - My personal blog. Part writing exercise, part ranting platform, it's where I write about anything and everything and nothing at all.

Help Ask Leo! Just forward this message, in its entirety (but without your unsubscribe link below) to your friends. Or, just point them at https://newsletter.askleo.com for their own FREE subscription!

Newsletter contents Copyright © 2018,
Leo A. Notenboom & Puget Sound Software, LLC.
Ask Leo! is a registered trademark ® of Puget Sound Software, LLC

Posted: June 5, 2018 in: 2018
Shortlink: https://newsletter.askleo.com/7891
« Previous post:
Next post: »

New Here?

Let me suggest my collection of best and most important articles to get you started.

Of course I strongly recommend you search the site -- there's a ton of information just waiting for you.

Finally, if you just can't find what you're looking for, ask me!

Confident Computing

Confident Computing is the weekly newsletter from Ask Leo!. Each week I give you tools, tips, tricks, answers, and solutions to help you navigate today’s complex world of technology and do so in a way that protects your privacy, your time, and your money, and even help you better connect with the people around you.

The Ask Leo! Guide to Staying Safe on the Internet – FREE Edition

Subscribe for FREE today and claim your copy of The Ask Leo! Guide to Staying Safe on the Internet – FREE Edition. Culled from the articles published on Ask Leo! this FREE downloadable PDF will help you identify the most important steps you can take to keep your computer, and yourself, safe as you navigate today’s digital landscape.



My Privacy Pledge

Leo Who?

I'm Leo Notenboom and I've been playing with computers since I took a required programming class in 1976. I spent over 18 years as a software engineer at Microsoft, and after "retiring" in 2001 I started Ask Leo! in 2003 as a place to help you find answers and become more confident using this amazing technology at our fingertips. More about Leo.