WikiHOW, gives some good pieces of wisdom when it comes to keeping a secret in the most traditional way of its meaning.
When it comes to keeping your records, passwords, exchange message or any other mean that needs to stay in a close circle then you need to rely on tools that can help in achieving just that.
About the history of cryptography, there’s a lot out however if you want to hear the juice of it you can watch the video below directly from 4 top-top experts.
There’re several commercial and open-source tools out there that you can use to improve your privacy and data storage experience. In this post, I will explore some of those that I have successfully used in the past.
Ultra generally speaking public-key encryption works on a simple principle. You have a piece of my puzzle that I call it a public key. I am the only one owning the other piece which enables the translation of gibberish into plain understandable language. That is called the private key. Mathematically speaking the combination of these two keys allows the message two to be decrypted. For a visual understanding of this take a look at this video.
My choice has fallen for some time on GPG Tools. It integrates nicely into your existing platform and it offers a really safe way of communication between two parties. The way it works is that you send to another party your PUBLIC KEY and from that moment on when you send a message you can choose to encrypt the message and sign as you. On the mac, you get that little green extension on the top right of the message window and two blue/black icons on the bottom right to indicate how you set up your going to be sent a message.
If you still typing your own password when you log in or set up a new account you are doing it wrong. The likelihood that your password is going to be decrypted found is way higher than you can imagine. The best way nowadays that hackers enter the most secure places, is to generate very complicated passwords and not enter them manually. That can be easily achieved with a password manager that integrated well with your browser of choice. You need to change your mindset, starting from when you set up an account. You should remember only one password, the one that unlocks your vault's password. I have been successfully using 1Password for all my platforms and that includes mobile devices. I simply love it.
When it comes to files to encrypt in a secure vault there are way too many options and each one has some type of complexity/pain that comes with it. In general, VeraCrypt is the best compromise between pricing offers and features.
When it comes to secure your material you should not stop to the pricing option or the religious belief of open source vs closed source. You should just evaluate how much damage you will suffer for not taking the best out of all the options.
LifeHacker does a good job in listing those options, take a look, it’s worth it.
Leave your computer unattended isn’t wise but you wouldn’t read this blog post if you were that dumb so I am going to skip the usual dumb recommendations on the subject and give you just the gist of how you can avoid typing passwords together to access at your computer. Meet KEYLEMON! It uses facial recognition to grant you access to your computer. I use it for some time and it has never given me trouble. With the paid version you can use it even when low light is your default bat cave environment.
Steganography is the act of hiding information within something else. It is, arguably, favorable over encryption because encryption only obscures the meaning of the information, steganography hides the very existence of the information. There’s an interesting instructable that you follow if you want to play with that using PhotoShop or alike. If you don’t want to go that painfully and fun experience you can use an online tool that does the trick for you. As a matter of fact, the image above under the section email contains a secret message that you can decrypt using that online tool!
That is a classical way of hiding something, not in a very secure way, but in plain sight, which results in giving with low tech a surprising efficiency. That is if you are not on the line of sight of NSA :-)