Menu

Show posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.

Show posts Menu

Messages - zsolt

#16
You are welcome.
The master password is sued to unlock espionage and let espionage access all the passwords it created for disk images.
Each disk image has it's own password, generated by espionage during folder encryption. You can see it if you click onto small "i" near the folder name in the folder list and then click onto copy password button.

I'm glad you got your data back,

Cheers
Zsolt
#17
Espionage 3 / Re: Limitations of Espionage 3
June 05, 2017, 01:28:05 AM
Hello Charles, Espionage is not meant to encrypt a home folder because the OS will try to access those folders earlier then Espionage can load itself and unlock the folders. It is meant to protect folders inside your home (sub)folders, for example inside your documents folder, picture folder etc. as the OS will not go deeper it will just check if the default home folders are present.

The idea is that a portion of your user data is sensitive and you keep it in a dedicated folder and then use Espionage to protect it.

I hope this helps, let me know if you have any further questions,

Cheers
Zsolt
#18
Hello, if you have the sparsebundle on your desktop, that should indicate that you either selected the "decrypt folder" and this failed, or you selected the "force remove from database" option. In both cases however, there should also be password file saved onto your desktop, this is the password you have to use to unlock the sparse bundle.
You can either type it in into dialog which appears after you doubleclick onto sparse bundle (paste is not possible, you have to type it in), or you can reimport the sparse bundle into Espionage by dragging the sparse bundle over unlocked espionage window, there you can paste the password.

Let me know how it went,

Zsolt
#19
Great, I'm glad to hit the right point :-)

In case of any further troubles or questions, let me know.

BTW the problem you encountered came with Sierra, I would call it a bug, if the mountpoint folder is on an external volume then Apple's hdiutil which is used to manipulate the disk images, fails to work properly. As long as Apple does not fix this, the workaround I provided you is the only one which works.
Sorry about the inconvenience.
#20
Good Morning Jens,

OK, in this case it might be that you are hitting the "external volume mountpoint folder on Sierra" problem.
Please create a new empty folder in your Documents folder on the boot disk, name it anyway you want.

Now unlock Espionage, click onto small "i" near the folder name in the espionage folder list, and using the mountpoint drop down menu, point Espionage to this newly created folder.

Try to unlock the folder now, if it works, you will see the content of the disk image through that new folder.

Let me know if this worked,

Thanks
Zsolt
#21
Hello Jens,

With Sierra, there is only one known problem, and this is when the moutpoint folder is on an external disk, to fix it, you create an empty folder on your boot disk and use the Espionage folder option window to point it to the new folder.

However, I'm not sure if I understand your setup properly.

Are you booting from an internal or from an external disk?
Was the folder you protected on external disk or internal disk?
Does the problem happen with each protected folder or only with this one?

Thanks
Zsolt
#22
Thanks Peter,

Zsolt
#23
Then pick one of the apps, little snitch or 1P and contact their support, let me know what they said.
I had the little flocker for a while too, but without license it was not active all the time, and did not notice these requests, in spite of having both LS and 1P installed.

Thanks for keeping me in the loop
Zsolt
#24
Hello, you should ask the app devs what do they want with that folder...
The ClamXAV I would understand as it scans the entire disk, but for the rest, no idea, little snitch should not access folders at all, only monitor network traffic and 1Pass should not do anything but it's own stuff, so the question is valid.
Do they try to access other unexpected folders too or they just want Espionage's folder?

Cheers
Zsolt
#25
Hello, indeed, there is no built in way to do this, I suppose we did not think of that possibility.

Please do the following:
Quit Espionage
go to the following folder
/Users/[your username]/Library/Application Support/com.taoeffect.Espionage3

Note that your home Library folder is hidden since Lion, to enter into it from Finder, switch to Finder, click onto "Go" menu, hold down the option key and select Library from the menu list.
You will see the license file there, just move it into the trash
Launch espionage it should say that it is unlicensed
Now apply the new license file

Thanks for your purchase and in case of any further questions, please let me know,

Till then

Zsolt
#26
Espionage 3 / Re: okTurtles e-mail
March 13, 2017, 12:42:44 PM
Thanks for your purchase, in case of any further problems or questions, feel free to let me know,

Till then

Zsolt
#27
Espionage 3 / Re: okTurtles e-mail
March 09, 2017, 12:16:21 PM
Hello, yes it does, lifetime is indeed lifetime, all future versions. Your job is only to live as long as you can, or wish :-)

Enjoy it

Zsolt
#28
Espionage 3 / Re: Internal workings
February 24, 2017, 12:57:02 AM
Helo Mark
During initial Espionage setup, the wizard will generate a random number of dummy sparse bundles, you will be asked how many and which size or it will do it random for you. This breaks the one to one relation between of total number of protected folders and number of support bundles.

Let me know if you have any further questions,

Rgds
Zsolt
#29
And you made one support tech happy too :-)

In case of any further questions or troubles,

Let me know
Zsolt
#30
Hello Philip,

Yes, this folder sharing on Mac is in general a bit clumsy and this is why I do not want to rely on it.
The thing is that if you login as user which is present on that mac, then you have access to all folders which that user can see locally no matter they are shared or not. And considering this is not a server-client setup but instead just a regular user machine, just two of them, then it is normal that you will have the credentials to log on as an existing user, and then yes, you will see the Library folder too.

But there is nothing to duplicate, you directly import the disk image from the MacBook into Espionage, so Espionage will be reading the remote disk image.

To import it, do the following:

on the macbook unlock Espionage
click onto small "i" near the folder name you want to import
using the disk image drop down menu, note the name of the disk image
click copy password button
save this password into some text file you will be able to access from iMac
go to iMac,
create one empty folder you will use to read the content of the protected folder form MacBook, any name will be ok, it can be in any path, but I suggest to place it inside user folder.
unlock espionage
open the MacBook's ...taoeffect..../Data folder
drag the correct disk image onto espionage window (on iMac)
Espionage will ask you for a password
paste the one you saved in the text file
now it will ask you for a mountpoint folder
point it to the folder you created in previous step
now you should be able to unlock the folder locally on the iMac

MAKE SURE you lock the folder, before you break the network connection between the iMac and MacBook
if the network connection is not up, if you try to unlock the folder it will simply report that the disk image is missing, no harm done

let me know how it went

Zsolt