When comparing GNU Privacy Guard vs EncFS, the Slant community recommends GNU Privacy Guard for most people. In the question“What are the best file encryption tools?” GNU Privacy Guard is ranked 1st while EncFS is ranked 4th. The most important reason people chose GNU Privacy Guard is:
GPG works on OS X, Linux, and Windows with [extensive selection of wrappers](https://www.gnupg.org/related_software/frontends.html).
Ranked in these QuestionsQuestion Ranking
GPG works on OS X, Linux, and Windows with extensive selection of wrappers.
Pro Supports expiring signatures
GPG keys by default expire after a set amount of time. The amount can be changed and this feature can be turned off.
Pro Supports paired keys
Allows for encrypted communication.
Pro Volume and individual file encryption
With GPG you can encrypt you whole volume or files individually.
Pro Multiple types of encryption algorithms
GPG supports public key cryptography (RSA EIGamal, DSA), symmetrical key algorithms (Blowfish, AES, IDEA, etc), cryptographic hash functions (RIPEMD, SHA), and compression (ZIP, ZLIB, BZIP2).
Pro Both CLI and GUI versions available
GPG can be installed as a command line tool, or you can choose between several different GUI frontends available for it.
Pro Encrypts on per-file basis
This makes it suitable for using with Dropbox or similar cloud storage platforms.
Works on Linux, OS X and experimentally on Windows.
Pro Configuration is stored in the working directory
The configuration for EncFS is in the form of a dotfile (.encfs6.xml) and it's stored in the working directory. This way you only have to remember the passphrase because all the other metadata is stored in the configuration file.
Con It may be hard to find a GUI frontend that suits your needs
If you decide not to use the CLI version of GPG, it may be hard to find a GPG GUI version that suits your needs simply because of the sheer number of different versions available.
Con Not up to speed with modern cryptography practices
From some audits in the past, EncFS has had some issues with being up-to-date as far as cryptography practices go. For example, it uses the same key for encryption and authentication or file holes not being authenticated.