Discussion Overview
The discussion revolves around methods for encrypting files and folders using command line interfaces, specifically through .vbs, cmd, or .bat scripts. Participants explore various approaches, tools, and considerations for implementing encryption on personal data, particularly in the context of Windows 10.
Discussion Character
- Exploratory, Technical explanation, Debate/contested
Main Points Raised
- Some participants inquire about the feasibility of encrypting personal data using basic scripting methods like .vbs, cmd, or .bat commands.
- One suggestion involves using a cryptography library, such as OpenSSL, while noting that there are simpler solutions available.
- Another participant proposes using WinZip or similar software to create password-protected ZIP files as an alternative method of encryption.
- There is a mention of using a fingerprint encrypted USB flash drive as a means of secure key storage.
- One participant expresses interest in implementing encryption for various file types, including .txt and Word documents, and discusses reading and encrypting data using Python functions.
- A later reply mentions the use of XOR commands in VBS as a potential method for encryption.
- Concerns are raised about the security of custom encryption algorithms, with a recommendation to use trusted tools instead.
- Another participant describes a method involving reading files as binary and encrypting the data using AES, indicating that they have developed a code capable of encrypting multiple file types.
- Discussion includes the need to access subdirectories to encrypt files systematically.
Areas of Agreement / Disagreement
Participants express a variety of methods and tools for encryption, with no clear consensus on a single approach. Multiple competing views and techniques remain present in the discussion.
Contextual Notes
Participants highlight limitations regarding password handling in command line tools, noting that passwords cannot be passed as arguments or via pipes, which may affect the implementation of encryption scripts.
Who May Find This Useful
Individuals interested in file encryption methods, particularly those looking to use scripting languages on Windows systems, may find the discussion relevant.