When comparing File Camouflage vs Email an encrypted .EXE file (AxCrypt), the Slant community recommends File Camouflage for most people. In the question“What are the best ways to transmit sensitive information over the Internet?” File Camouflage is ranked 8th while Email an encrypted .EXE file (AxCrypt) is ranked 13th. The most important reason people chose File Camouflage is:
File Camouflage allows you to encrypt your sensitive information and then after hide it in the JPEG image of your choice. With this program an innocent family photo or photo of your pet can be used to disguise your most sensitive encrypted information.
Ranked in these QuestionsQuestion Ranking
Pros
Pro Hides file in JPEG image
File Camouflage allows you to encrypt your sensitive information and then after hide it in the JPEG image of your choice. With this program an innocent family photo or photo of your pet can be used to disguise your most sensitive encrypted information.
Pro Effective second level of protection
File Camouflage is an effective second level of protection. After encrypting and password protecting your sensitive information with AES, File Camouflage makes sure only your intended recipient knows there is even a file to decrypt by hiding it in a JPEG.
Pro Easy to use
Hiding your sensitive information with File Camouflage is extremely easy. The whole process is explained very well even for an inexperienced user.
Pro Free
Pro Ability to send an EXE file via email
Many email providers are not able to send EXE files but File Camouflage not only protects it but allows the file to be sent.
Pro Free and open source
AxCrypt is free and open source. This is beneficial because anyone can examine the source code and check for errors.
Pro No recipient software needed if emailed as .EXE.TXT
After selecting "Encrypt copy to .EXE," rename the file to ".EXE.TXT" in order to bypass email provider restrictions on sending .EXE files. Windows will then warn you that the file will become unusable but ignore it and continue to email the file. All the recipient needs to do upon arrival is rename the file back to .EXE and ignore the Windows warning message. Then simply open the self extracting file and type in the agreed upon password between the sender and recipient. This is a great advantage of AxCrypt because it does not force your recipient to download any software.
Pro Available at right click
AxCrypt is an extremely convenient encryption program because it is always available at a single right click.
Pro Password protected and optional key-file
AxCrypt encrypts each file with a passphrase and an optional key-file. Transferring a key-file (that AxCrypt can generate for you) on a separate medium and the password on another medium to your recipient is the most secure option. Although a strong password alone will do. The only caveat is that the password and key file must be transferred to your recipient and the most secure way to transfer it is physically.
Pro Once created, does not depend on other software
As long as you have the password or keyfile to your encrypted file then you can still access it. This is beneficial if the software ever becomes unsupported.
Cons
Con Encourages improper use of steganography
To hide a file in an image you need two things:
One, that the attacker cannot find the source image i.e. it has to be an image made by the user (preferably a photograph of a visually complex scene) and never put on the internet (using the pac_tron image would render the use of steganography moot, as the attacker can merely subtract a suspect image from a copy of the source image) and
two, that the file to be hidden is smaller than the cover image. With the best techniques today you can embed a file about 10% of the size of the cover image. The example in the doc hides a file 21,500% of the size of the cover image.
If you use steganography improperly you get no security, esp. as governments believe senior terrorists use steganography and thus search for it very, very, carefully.
Con Frequently prompts you to donate
File Camouflage is free although the developer does proclaim it "donationware." As a result the program frequently and annoyingly begs that you donate.
Con Requires both sender and recipient to use File Camouflage
In order for the recipient to receive the intended information they have to download and use File Camouflage.
Con Windows-only
The receiver has to be running Microsoft Windows (or a binary compatible system, like Wine).
Con Opening an .EXE file may worry some recipients
Some recipients will be cautious of opening an .EXE and may end up ignoring it. It is a good idea to inform them in advance that you will be sending an .EXE and it is safe. Another precaution is to sign the email so the recipient knows that is you.
Con Anti-virus will likely block it
Most anti-virus block or strongly warn again executable in emails. You'll likely have to rename the file and so will the end user.
Con Untrusted / not signed
Unless it's signed (i.e., you can somehow validate the signature of the attached EXE file via another method) the EXE may actually be compromized (e.g., man in the middle) and do anything on your machine as your run it.
Con AES-128 encryption
AES-128 encryption is still extremely secure but it is a lower and more outdated level of protection than what other encryption programs such as 7-Zip offer.
