Storing documents securely - other than 1Password

@ddmiller , I am so glad you mentioned Disk Decipher. I’ve been looking for a way of accessing encrypted .dmg and .sparseimage files from my iPad for a very long time-- and Disk Decipher does exactly what I need.

I use encrypted disk images as a way of adding additional protection for especially sensitive content (on top of Advanced Data Protection), but that meant (past tense) that I could only access it from a computer. Disk Decipher changes it (I can do everything I need from an iPad).

It is a hidden gem. @ace, this is software that I recommend you check into it and possibly spotlight it in an article. I really wish I had known about this a long time ago.

2 Likes

As I said, Disk Decipher is worth every penny I paid for it.

I just checked - I’ve been using it since February 2013. It didn’t initially support encrypted disk images, and back then in order to use encrypted images on my iPad I was using TrueCrypt images (then VeraCrypt when development on TrueCrypt stopped). Now I’m unlikely to need anything on Windows or Linux so I use dmg files for everything. It support sparse images as well, and it did support spares bundles as well, but Sonoma changed the sparse bundle format, so the new format support is in development.

By the way, speaking of features in development, the developer Richard Huveneershas a features request page on Gitlab if you can think of a feature you need that it doesn’t support.

And having typed all this I am thinking I should make a further donation. It is a fantastic app.

1 Like

I picked up a copy (and all the filesystem licences). It’s a sweet little app, indeed. I probably won’t want to lock myself into Apple’s disk image format, but I’m very glad it exists! I’m just sorry that so much of the filesystem and image code is proprietary. It makes me sad.

Encrypto is a simple but solid app that will store documents securely. And if you want to keep certain information encrypted but invisible to prying eyes, I’ll suggest using steganography again with Outguess.
Of course, both rely on the app being able to be run again for decryption (note for truly paranoid: delete the app so no one would think of looking for files encrypted by them, in which case the app has to be re-downloaded to decrypt them.) Apple’s encrypted disk images probably aren’t going to go away for a long time and are likely the most future-proofed. I suppose they can have a new extension added (maybe .plist among a large number of other pref files?) to their names and be stowed away somewhere in ~/Library/Preferences or the like where they attract no attention. Or rename them with a period in front to make them invisible to casual searches.
Naturally, this relies on you being able to remember the file names and the extension type to reapply so you can decrypt them, as well as the password used. I’d suggest a very long but memorable password (maybe a favorite quotation) used on all of them. It won’t be easily broken but will be easy to recall.