Practical guidance for everyday users: what to encrypt, cloud-provider risks, and friendly tool recommendations.
If exposing a file would cause *harm, identity theft, financial loss, legal risk,* or *embarrassment*, encrypt it before storing or sharing.
Most mainstream cloud services encrypt data in transit and at rest — but that doesn’t always mean only you can read the files. Understand the difference between provider-managed keys and client-side (zero‑knowledge) encryption.
iCloud encrypts most data on Apple’s servers, but Apple manages the encryption keys for many items by default which means they can assist with recovery and — in certain circumstances — access the data. Apple has offered an optional Advanced Data Protection (end-to-end) feature in some regions that makes iCloud data readable only by the account owner, but availability and legal/regulatory changes may affect how that works in your country.
Dropbox encrypts data at rest and in transit but can manage the keys (so Dropbox can assist with recovery or respond to legal requests). Dropbox offers more advanced key management for business customers and there are client-side tools that add zero‑knowledge encryption on top.
Files on Google Drive are encrypted in transit and at rest using strong encryption. Google Workspace offers client-side encryption options for organisations, but for typical personal accounts Google controls the storage keys by default.
Bottom line: if you want cloud storage where the provider can’t read your files, use client-side (zero-knowledge) encryption before upload.
// Example: Quick 7-Zip command to create an encrypted archive 7z a -t7z -p -mhe=on secure-files.7z /path/to/folder // -p prompts for password, -mhe=on encrypts file names too
For whole-disk protection on a laptop, enable BitLocker (Windows) or FileVault (macOS) — these protect the device if lost or stolen, but do not stop cloud providers from seeing files uploaded without client-side encryption.