Understanding FileFortress Encryption Options
Choose the right encryption mode for your needs
Overview
FileFortress encrypts your local database to protect sensitive information like cloud storage credentials and file metadata. You can choose between two encryption modes: automatic (machine-specific) or custom password.
Encryption Modes
Mode 1: Automatic Encryption (Machine-Specific)
How It Works
Uses your operating system's built-in encryption APIs (DPAPI on Windows, Keychain on macOS, Secret Service on Linux) to encrypt the database. The encryption key is tied to your user account on that specific machine.
Pros
Cons
Setup
filefortress init
Mode 2: Custom Password
How It Works
Uses a password you provide to encrypt the database with AES-256 encryption. You must provide this password (or a key file containing it) with every command.
Pros
Cons
Setup
filefortress --password YourSecurePassword init --create-key-file ~/filefortress.key
Usage
# With password
filefortress --password YourSecurePassword remotes list
# With key file (recommended)
filefortress --key-file ~/filefortress.key remotes list
Decision Flowchart
No → Continue to next question
No → Use Custom Password mode for more control
Use Case Recommendations
Recommended: Automatic Encryption
Simple, secure, no password management needed.
Recommended: Custom Password + Key File
Share database across devices with key file for convenience.
Recommended: Custom Password + Key File
Key file enables automated scripts without interactive password entry.
Security Considerations
Automatic Encryption Security
What It Protects Against:
What It Doesn't Protect Against:
Best Practices:
Custom Password Security
Password Strength Requirements:
Key File Security:
Key File Management
Creating a Key File
# During init
filefortress --password YourPassword init --create-key-file ~/filefortress.key
# Or create manually
echo "YourPassword" > ~/filefortress.key
chmod 600 ~/filefortress.key # Linux/Mac only
Using a Key File
filefortress --key-file ~/filefortress.key [command]
Backing Up Key Files
Option 1: Encrypted Cloud Storage
Store key file in encrypted cloud storage (e.g., encrypted folder in Dropbox, Google Drive with client-side encryption)
Option 2: Password Manager
Store the password itself in a password manager like 1Password, LastPass, or Bitwarden
Option 3: Multiple Secure Locations
Keep copies on multiple devices you control, each with restricted permissions
Migration Between Modes
From Automatic to Custom Password
filefortress --password NewPassword init --create-key-file ~/filefortress.keyfilefortress --key-file ~/filefortress.key remotes scan --allFrom Custom Password to Automatic
filefortress initfilefortress remotes scan --allRecovery Procedures
Lost Password/Key File
Corrupted Database
If your database becomes corrupted:
filefortress device info to verify corruptionBest Practices Summary
| Scenario | Recommended Mode | Key Practices |
|---|---|---|
| Single device, personal use | Automatic Encryption | Strong OS password, full disk encryption |
| Multiple devices, personal use | Custom Password + Key File | Strong password, backup key file securely |
| Server/automation | Custom Password + Key File | Restrict key file permissions, monitor access |
| Shared/team environment | Individual accounts (Automatic) | Each user has own database and encryption |