How To Encrypt Files on MX Linux: GPG and Thunar 7z Guide

MX Linux offers two easy ways to encrypt files securely: terminal-based GPG for maximum control, and Thunar’s built-in 7z archiving for GUI simplicity. Both use AES-256 encryption, resistant to brute-force when paired with long passphrases.

Terminal: GPG Symmetric Encryption

GPG provides raw AES-256 file encryption without compression. Always specify --cipher-algo AES256, the default CAST5 is outdated and weak.

# Encrypt a single file (TXT, PNG, or ISO)
gpg -c --cipher-algo AES256 document.txt

# Encrypt a directory (tar first, then encrypt)
tar -cf folder.tar my_directory/
gpg -c --cipher-algo AES256 folder.tar

# Verify cipher used
gpg --list-packets document.txt.gpg

Look for “AES256 encrypted data” in output. Decrypt with gpg --output original.txt --decrypt document.txt.gpg.

GUI: Thunar 7z Archive Encryption

Thunar’s “Compress” uses Engrampa (file-roller) with p7zip backend. Select 7z for AES-256-CTR (strongest option).

  1. Right-click file/folder > “Compress…”
  2. Archive type: 7z
  3. Filename: encrypted.7z
  4. Click Password > enter long passphrase > Create

Verify: Terminal 7z l encrypted.7z shows “Method = AES256”. Extract via Thunar double-click + password.

Passphrase Strategy: Longer is Better

LUKS2 and AES-256 derive keys slowly (2-second delay per guess via Argon2id), making length the dominant factor against GPU clusters. Use 6 or more random words with spaces (spaces allowed and boost entropy).

Passphrase LengthDiceware WordsTime to Crack (1M GPU cores)
12 chars3 wordsWeeks to months 
20 chars5 wordsCenturies 
25+ chars6-7 wordsBillions of years 

Example: “zebra quantum frost velvet glyph maroon”.

Warning! No Password, No Data

Encryption is permanent. If you forget the passphrase, your files are irretrievable forever. Test decryption immediately after encrypting, and store passphrases securely (not digitally for high-value data).

Leave a Reply

Your email address will not be published. Required fields are marked *