Open Source Encryption Software

There are two ways you could get “locked out for good”:

  1. The encrypted file is corrupted. Because strong encryption necessarily strips out as much redundancy as possible from the original data (any remaining redundancy provides clues that help crack the encryption), an encrypted volume is more vulnerable to being irreversibly scrambled by bit errors than an equivalent amount of raw unencrypted data.

Solution: Keep backups. For obvious reasons, these should be extra copies of the encrypted files, not copies of the original data. (Also keep backup copies of the encryption software, though something like TrueCrypt should be easy enough to find and re-download if necessary.)

  1. You forget your passphrase.

Solution: Keep a record of your passphrase in a secure location, or make damn sure it’s something you won’t forget. For the latter option, you probably want to pick a technique for generating a long pseudorandom string from an easily memorized phrase – “first letter of each word” works well enough if you have enough words.

Well, I am still not sure that you do understand OTPs. Probability is irrelevant. It’s not merely very difficult to decipher OTPs without the key, it is absolutely, 100% impossible. Not just 99.9999999%, monkey-Shakespeare impossible. Utterly impossible.

This is where I was going with a pass phrase. Words interspersed with numbers. Something that resonates with me yet is not a logical sequence.

Definitely will use as many characters as I am allowed to.

Thank you all for the expert as well as lay replies. Good Straight Dope !!!