System Utilities - DashCryptMini

Description: MINIATURE VERSION NOTES: I have received many requests for a miniature version of my DashCrypt Widget. This one has a much smaller footprint for smaller displays. Thes instructions and messages on the reverse is a little harder to read, but that is a small comprimise for footprint size.

We frequently use encryption on "Eyes Only" files for storage and inter-departmental sharing. This widget utilizes the OpenSSL libraries built into OS X and uses the AES 256-bit cipher. We recommend archiving your files for smaller encrypted files. Currently, this widget does not archive before encrypting. This requires you to archive ( tar.gz, sit or zip ) directories prior to encryption.

To use this widget, begin by dragging a file or archive in the Finder, opening the Dashboard (F12) while dragging, then dropping the file on Encrypt or Decrypt. You will be prompted for a password and confirmation of your password. Click Submit and your file will be processed. After encrypting, resulting file (yourfile.enc) may be safely distributed, but remember, passwords should never be sent in cleartext in emails or other digital means. We suggest sharing passwords in person. Decrypting .enc files requires the original password. Note: This software is distributed freely and has been tested thoroughly for bugs, however, use at your own discretion. DigitalCraft Consulting is not responsible for lost data.
Author: mstclaire
Version: 1.0
Uploaded on: July 8th 2005 at 12:04 AM
Rating: (4.11 stars)   [Show Detailed Ratings]
Downloads: 2194
    Download Now »



Excellent widget. Does exactly what it says very nicely. The full version was way too big, but this one's great. When you have a 15" screen, the smaller, the better, as long as it doesn't bring down quality.

My only minor suggestions are:
- When a user drags an item onto encrypt/decrypt, and the widget opens it's drawer, that it should focus on the password using document.getElementById('password').focus()
- There should definitely not be a "confirm password" for decrypting, probably just a mistake.

Without the second thing, I would have given a 5/5.

Posted by: avnit on Jun 02, 05 (3:23 AM) for version 1.0 (current version)   View Detailed Rating

I have a question: how does it work? Can others extract the encrypted files with e.g. WinZip? Sorry for my stupidity, but right now, I don't get it - morning or not. smiley

Posted by: Lundmark on Jun 02, 05 (7:07 AM) for version 1.0 (current version)  

The DOD and NSA have rated this encryption strong enough for Top Secret materials.
AES encryption was selected to replace DES encryption for its strength and speed. The AES standard uses the Rijndael algorithm for symmetric encryption.

In lay terms, it creates a random key ( I have chosen 256-bit, while Apple's File Vault, which uses AES encryption of 128-bit keys - btw... 256-bit has 1.15 X 10^77 possible keys, which is like 128-bits possible keys squared ), uses your password and the random key as salt, encrypting the plaintext. With the fastest computer available today, it would take 100+ Trillion years (or so) to try to brute force that key. Every cipher has some ( albeit, small ) vulnerability, if you have enough time. In the case of this tool, the weakest link in the chain is your password. I can't emphasize this enough, USE GOOD PASSWORDS & KEEP THEM SECRET.

WinZip uses AES encryption, but I don't think it can convert these . If your looking to transfer these files to a Windoze user, they would have to have OpenSSL installed and use the openssl aes-256-cbc -d utility.

A good resource for more info can be found at

Posted by: mstclaire (developer) on Jun 02, 05 (9:03 PM) for version 1.0 (current version)  

Some user have had issues using DashCrypt. The only bug (loosely put) is if you rename your files, the script cannot re-attached to original extension or decrypt the file. file.tgz get encrypted to file.tgz.enc and decrypted to file.tgz. If you rename the encrypted file to anything else, decryption fails.

To work around this as a failsafe, decrypt any DashCrypt encrypted file from the Terminal with:

/usr/bin/openssl aes-256-cbc -d -in [ENCRYPTED FILENAME] -out [UNENCRYPTED FILENAME] -pass [PASSWORD]

Posted by: mstclaire (developer) on Aug 11, 05 (7:20 PM) for version 1.0 (current version)  

It seems that there IS in fact a bug with DashCrypt; my apologies to all who have had issues and my thanks to those who have tested it.

First of all, in my last post, revise the terminal command to:

/usr/bin/openssl aes-256-cbc -d -in [ENCRYPTED FILENAME] -out [UNENCRYPTED FILENAME]

Hit return and you will be prompted for your pass.

To get DashCrpyt to decrypt any stubborn file, simply put the encrypted file on the Desktop, then decrypt. It seems there is a directory location issue.

I will address this directory issue in the next version.

Posted by: mstclaire (developer) on Aug 15, 05 (5:59 PM) for version 1.0 (current version)  

I almost pulled my hair out over the last two days trying to figure out why this wouldn't decrypt my file.--I had moved it away from the desktop. This definitely needs to be addressed.

Also, I agree you shouldn't have to type in your password twice when you're decrypting a file.

Posted by: Danger on Nov 24, 05 (6:15 AM) for version 1.0 (current version)   View Detailed Rating

I've been fortunate to not have run into the bug - as I always have inadvertantly moved the file to be decrypted back to the desktop before decrypting.

Thanks for pointing this out - I look forward to a fix in the future so somewhere down the line in 5 years I forget this bug and can't unencrypt something.

Posted by: chevyorange on Oct 14, 07 (10:41 PM) for version 1.0 (current version)   View Detailed Rating

You Must Log In to Post Comments

Remember Me
Create an account | Password Reminder