Kurt Sampson did a great job with concepts. I will give some details.
Unfortunately, Seahorse and friends do not allow symmetric encryption, although they can handle decryption of files with symmetric encryption. In the meantime, as already mentioned, you can perform encryption from the command line, for example.
gpg --symmetric --force-mdc --cipher-algo aes256 -o outfile infile
If you are happy with gpg but really want gui, you can use gpg-frontend Pyrite . It doesn't integrate with Nautilus like seahorses plugins, but it's still pretty sweet, so to speak. :)
As already mentioned, eCryptfs is a great option that sorta falls into this area, providing encryption on each file, although it does it in a much more convenient way, basically providing you with a folder that transparently encrypts / decrypts all records and reads / from it. At first it looks like an encrypted container solution, but in fact it encrypts the files individually - as soon as you unmount the folder, you will get a bunch of files with one encrypted file. This LJ article gives a good overview and contrast comparison of eCryptfs compared to some other parameters. Here's how to simply get eCryptfs:
$ mkdir ~/vault $ sudo mount -t ecryptfs ~/vault ~/vault Select key type to use for newly created files: 1) openssl 2) passphrase 3) pkcs11-helper 4) tspi Selection: 2 ....... (truncated) $ echo hello > ~/vault/encfile $ sudo umount ~/vault $ ls -a ~/vault . .. encfile $ cat ~/vault/encfile稖 )!x "3DUfw` ȿ_ E _CONSOLE W v0 + ' hV Q VZ eP l⟮j% ?O V ....... (truncated)
If you're interested, check out the ecryptfs-setup-private command ecryptfs-setup-private , which eliminates the need for sudo and allows you to automate everything. We move on.
The best other options are those mentioned by pts: TrueCrypt (it's cross-platform) and dm-crypt , which allows you to encrypt any block device (e.g. partitions, logical volumes, individual files), and then, of course, you drop fs on top of that. Do not use Cryptoloop (predecessor of dm-crypt).
I basically only have experience with Red Hat, Fedora and friends, but in them you can use the excellent gui palimpset disk management to create and modify encrypted disks / partitions directly from the gate without installing anything superfluous. Of course, the command line is used for this: cryptsetup ... here is a simple example to give you an idea of what is possible with dm-crypt, using cryptsetup to make an encrypted file system from an extensible logical volume:
lvcreate -L 2G -n mybox volgroup cryptsetup luksFormat /dev/volgroup/mybox cryptsetup luksOpen /dev/volgroup/mybox mybox mkfs.ext4 /dev/mapper/mybox cryptsetup luksClose mybox
After you have done this, Nautilus should not have problems with automatic detection, and then you can unlock it and make a secure user interface there.
EDIT: I feel stupid. When I came across this question, I was looking at gpg tags. I did not notice how many years passed until I finished typing everything and did not want to serve it. Well. Perhaps this will be useful for posterity.