• Home
  • Latest
  • Fortune 500
  • Finance
  • Tech
  • Leadership
  • Lifestyle
  • Rankings
  • Multimedia

Trendingnow

1

Microsoft AI chief gives it 18 months—for all white-collar work to be automated by AI

2

Former top Russian official admits the country is over Putin and can 'imagine a future without him' — even elites bail as Kremlin seizes their assets 

3

Meet the 20-year-old CEO who launched a company in high school to solve Gen Z's entry-level job crisis

1

Microsoft AI chief gives it 18 months—for all white-collar work to be automated by AI

2

Former top Russian official admits the country is over Putin and can 'imagine a future without him' — even elites bail as Kremlin seizes their assets 

3

Meet the 20-year-old CEO who launched a company in high school to solve Gen Z's entry-level job crisis
Tech

How protected does laptop encryption leave you?

Robert Hackett
By
Robert Hackett
Robert Hackett
Down Arrow Button Icon
Robert Hackett
By
Robert Hackett
Robert Hackett
Down Arrow Button Icon
April 28, 2015, 10:40 AM ET
512136509
Silhouette of male hand typing on laptop keyboard at nightPhotograph by Rafe Swan — Getty Images/Cultura RF

Want to protect your personal data? Try full disk encryption—a means of locking down your computer files so that no one else with access to your machine may pry inside.

To the uninvited inspector, encrypted hard drive data looks like alphanumeric gobbledygook. To those with the right passphrase, it looks and acts as normal.

“Everyone should be running full-disk encryption on their laptops,” implores The Intercept before supplying a user-friendly tutorial on the technology. “[I]t’s the only way to protect your data in case your laptop gets lost or stolen, and it takes minimal effort to get started and use.”

Without disk encryption, your laptop is a sitting duck, Micah Lee writes:

If someone gets physical access to your computer and you aren’t using disk encryption, they can very easily steal all of your files.

It doesn’t matter if you have a good password because the attacker can simply boot to a new operating system off of a USB stick, bypassing your password, to look at your files. Or they can remove your hard disk and put it in a different computer to gain access. All they need is a screwdriver, a second computer, and a $10 USB enclosure.

That’s right. Hacking an unprotected hard drive is that simple. So make no mistake: Disk encryption is a good practice.

But beware! It will not protect you against everything. Motivated hackers, wandering-eyed shoulder surfers, compressed air can-wielding operatives, and tech-savvy “evil maids” may still all unlock your precious data, in spite of encryption’s sureties. To help illuminate the limitations and liberations of the technology, Fortune dissected The Intercept’s guide into a taxonomy.

Here’s a quick list of what disk encryption does and does not protect against.

You’re safe from…

Undesired physical access due to misplacement, thievery, or government seizure. “Encrypting your disk will protect you and your data in case your laptop falls into the wrong hands,” Lee writes.

Insistent border agents. At their edges, travelers to different countries enjoy no right to privacy.

You’re vulnerable to…

Internet surveillance and spies. Think National Security Agency.

Trick malware downloads. Be careful when choosing whether to open email attachments.

Bug exploitations. No software is perfect.

Traffic hijackers. Visit only websites that use encryption—”hypertext transfer protocol secure” (aka HTTPS)—to secure incoming and outgoing traffic.

Faulty memory. Do not forget your password.

Failure to lock unattended devices. Power off when you’re absent.

Weak passwords. “Password” is not a good password. “Th1sIsN0tMyRe@lPas$wordHackz0rz” is better.

Guest account workarounds. Cut off the other ways to access your laptop.

Direct memory access attacks. Malicious devices can be used to manipulate or read your computer’s RAM, aka random access memory storage, when your machine is unlocked.

Cold boot attacks. Using little more than a screwdriver, compressed air-can, and the laws of thermodynamics, a crafty hacker can freeze and eject your RAM after use, and then load its contents onto another disk.

“Evil maid” attacks. A bad actor can load malware onto your operating system that triggers once your machine has been unlocked—so don’t let your computer out of your sight, paranoid people.

Deprecated encryption software (like TrueCrypt). If a flaw is discovered in the program, which is all but inevitable, you’ll want someone to patch it immediately.

Shoulder surfers (who peak at passwords and PINs) and other up-to-no-gooders… “The different ways you can get hacked or surveilled are too numerous to list in full,” Lee writes.

For the “How to,” including best practices and the like, head over to The Intercept where you’ll learn how you—yes you, too—can encrypt your Windows, Mac OS X, or Linux disks. It’s easy.

Now all you need is a dab of glitter nail polish.

About the Author
Robert Hackett
By Robert Hackett
Instagram iconLinkedIn iconTwitter icon
See full bioRight Arrow Button Icon

Latest in Tech

Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025

Most Popular

Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Fortune Secondary Logo
Rankings
  • 100 Best Companies
  • Fortune 500
  • Global 500
  • Fortune 500 Europe
  • Most Powerful Women
  • World's Most Admired Companies
  • See All Rankings
  • Lists Calendar
Sections
  • Finance
  • Fortune Crypto
  • Features
  • Leadership
  • Health
  • Commentary
  • Success
  • Retail
  • Mpw
  • Tech
  • Lifestyle
  • CEO Initiative
  • Asia
  • Politics
  • Conferences
  • Europe
  • Newsletters
  • Personal Finance
  • Environment
  • Magazine
  • Education
Customer Support
  • Frequently Asked Questions
  • Customer Service Portal
  • Privacy Policy
  • Terms Of Use
  • Single Issues For Purchase
  • International Print
Commercial Services
  • Advertising
  • Fortune Brand Studio
  • Fortune Analytics
  • Fortune Conferences
  • Business Development
  • Group Subscriptions
About Us
  • About Us
  • Press Center
  • Work At Fortune
  • Terms And Conditions
  • Site Map
  • About Us
  • Press Center
  • Work At Fortune
  • Terms And Conditions
  • Site Map
  • Facebook icon
  • Twitter icon
  • LinkedIn icon
  • Instagram icon
  • Pinterest icon

Latest in Tech

New NRG Energy CEO leans into growth with ‘bring your own power’ for the AI boom and affordability with ‘virtual power plants’
Energypower
New NRG Energy CEO leans into growth with ‘bring your own power’ for the AI boom and affordability with ‘virtual power plants’
By Jordan BlumMay 17, 2026
54 minutes ago
AI poised to tilt job market leverage toward older workers
AIHiring
AI poised to tilt job market leverage toward older workers
By Victor Swezey and BloombergMay 16, 2026
9 hours ago
SpaceX heads into a record-shattering IPO with the ‘deepest moat that exists today’ as investors vow to ‘never bet against Elon’
InnovationIPOs
SpaceX heads into a record-shattering IPO with the ‘deepest moat that exists today’ as investors vow to ‘never bet against Elon’
By Jason MaMay 16, 2026
15 hours ago
tarot
AICulture
We talked to 12 tarot card readers who are using AI. They split in 2 camps, with big implications for the technology
By Ziv Epstein, Farnaz Jahanbakhsh, Vana Goblot and The ConversationMay 16, 2026
17 hours ago
liberman
Commentarystart-ups
We watched social media concentrate. The same thing is happening in AI, only at a deeper layer
By David Liberman and Daniil LibermanMay 16, 2026
19 hours ago
mustafa suleyman
AIMicrosoft
Microsoft AI chief gives it 18 months—for all white-collar work to be automated by AI
By Jake AngeloMay 16, 2026
20 hours ago

Most Popular

Microsoft AI chief gives it 18 months—for all white-collar work to be automated by AI
AI
Microsoft AI chief gives it 18 months—for all white-collar work to be automated by AI
By Jake AngeloMay 16, 2026
20 hours ago
Former top Russian official admits the country is over Putin and can 'imagine a future without him' — even elites bail as Kremlin seizes their assets 
Politics
Former top Russian official admits the country is over Putin and can 'imagine a future without him' — even elites bail as Kremlin seizes their assets 
By Jason MaMay 16, 2026
10 hours ago
Meet the 20-year-old CEO who launched a company in high school to solve Gen Z's entry-level job crisis
Future of Work
Meet the 20-year-old CEO who launched a company in high school to solve Gen Z's entry-level job crisis
By Jake AngeloMay 16, 2026
23 hours ago
The Bezos family just donated $100 million to help achieve one of Mayor Zohran Mamdani’s top campaign promises
Politics
The Bezos family just donated $100 million to help achieve one of Mayor Zohran Mamdani’s top campaign promises
By Jake AngeloMay 12, 2026
5 days ago
‘You’re not a hero, you’re a liability’: Shark Tank’s Kevin O’Leary warns Gen Z founders to stop glorifying hustle culture
Future of Work
‘You’re not a hero, you’re a liability’: Shark Tank’s Kevin O’Leary warns Gen Z founders to stop glorifying hustle culture
By Jacqueline MunisMay 16, 2026
20 hours ago
Despite having a $165 million net worth, Scarlett Johansson says work-life balance doesn’t exist—and the first step to success is admitting that
Success
Despite having a $165 million net worth, Scarlett Johansson says work-life balance doesn’t exist—and the first step to success is admitting that
By Preston ForeMay 13, 2026
4 days ago

© 2026 Fortune Media IP Limited. All Rights Reserved. Use of this site constitutes acceptance of our Terms of Use and Privacy Policy | CA Notice at Collection and Privacy Notice | Do Not Sell/Share My Personal Information
FORTUNE is a trademark of Fortune Media IP Limited, registered in the U.S. and other countries. FORTUNE may receive compensation for some links to products and services on this website. Offers may be subject to change without notice.