Skip to main content

Encrypt Cloud Backups with Rclone Crypt — Zero-Knowledge Encryption for Google Drive, S3, and More

· 5 min read
Tayson
Senior Engineer

When you upload files to Google Drive, Google can read them. When you store data on S3, Amazon can access it. Rclone's crypt remote changes this — your files are encrypted before they ever leave your machine.

Cloud providers encrypt data "at rest" on their servers, but they hold the keys. This means the provider (and potentially government agencies, hackers who breach the provider, or rogue employees) can access your files. Rclone's crypt remote provides true zero-knowledge encryption: files are encrypted on your machine before uploading, and only you have the key.

RcloneView app preview

Manage & Sync All Clouds in One Place

RcloneView is a cross-platform GUI for rclone. Compare folders, transfer or sync files, and automate multi-cloud workflows with a clean, visual interface.

  • One-click jobs: Copy · Sync · Compare
  • Schedulers & history for reliable automation
  • Works with Google Drive, OneDrive, Dropbox, S3, WebDAV, SFTP and more
WindowsmacOSLinux
Get Started Free →

Free core features. Plus automations available.

What Is a Crypt Remote?

A crypt remote is a virtual layer that sits on top of any existing cloud remote:

Your Files → Crypt Remote (encrypts) → Cloud Remote (uploads encrypted blobs)

When you read files:

Cloud Remote (encrypted blobs) → Crypt Remote (decrypts) → Your Files

The cloud provider stores only encrypted data. File names, directory names, and file contents are all encrypted. The provider cannot see what you're storing.

How Crypt Encryption Works

Encryption standards

  • File content: AES-256 in CTR mode with HMAC-SHA256 authentication.
  • File names: AES-256 EME (encrypt-mix-encrypt) with optional obfuscation.
  • Directory names: Same as file names (encrypted by default).

What gets encrypted

ComponentStandard ModeWith Name Encryption
File contents✅ Encrypted✅ Encrypted
File names❌ Visible✅ Encrypted
Directory names❌ Visible✅ Encrypted
File sizes❌ Visible (slightly padded)❌ Visible (slightly padded)
Directory structure❌ Visible✅ Encrypted

Recommendation: Always enable file name encryption for maximum privacy.

Setting Up Crypt in RcloneView

Step 1: Have an existing remote

First, add your cloud storage as a normal remote (e.g., Google Drive, S3, Backblaze B2):

Add base cloud remote

Step 2: Create a crypt remote on top

Add a new remote of type Crypt. Configure it to point at a folder on your existing remote:

  • Remote: gdrive:encrypted-backup/ (a folder on your Google Drive).
  • File name encryption: Standard (encrypted).
  • Directory name encryption: True.
  • Password: A strong password (this is your encryption key — don't lose it).
  • Password2 (salt): An additional password for extra security.

Step 3: Use the crypt remote

Now when you browse or transfer files through the crypt remote, everything is encrypted transparently. Upload through the crypt remote → files arrive encrypted on Google Drive. Download through the crypt remote → files are decrypted automatically.

Encrypted Backup Workflow

Set up an encrypted backup job

Create a Copy job from your local storage (or another cloud) to the crypt remote:

Create encrypted backup job

Schedule daily encrypted backups

Schedule encrypted backup

What the cloud provider sees

If someone browses your Google Drive, they see:

encrypted-backup/
q6r2v8s3f1g4h5j6k7l8/
a1b2c3d4e5f6g7h8i9j0k1l2m3n4.bin
p5q6r7s8t9u0v1w2x3y4z5a6b7c8.bin
m9n0o1p2q3r4s5t6u7v8/
d9e0f1g2h3i4j5k6l7m8n9o0p1q2.bin

File names are unreadable. Contents are encrypted. Even the folder structure is hidden.

What you see (through the crypt remote)

encrypted-backup/
Documents/
tax-return-2025.pdf
passport-scan.jpg
Medical/
lab-results-march.pdf

Normal, readable files — decrypted on the fly.

Practical Use Cases

1) Encrypted Google Drive backup

Your personal Google Drive for daily use. An encrypted backup of sensitive files on the same Google Drive:

gdrive:Documents/     ← Normal files (Google can see)
gdrive-crypt:Sensitive/ ← Encrypted (Google sees only blobs)

2) Encrypted S3 archive

Archive sensitive data on S3 with client-side encryption. Even if your AWS account is compromised, the data is unreadable without your password.

3) HIPAA/compliance storage

Healthcare, legal, and financial data that requires encryption at rest. Crypt remotes provide verifiable client-side encryption.

4) Cross-border data protection

Storing data in cloud regions where you don't fully trust the provider's data access policies.

Verify Encrypted Backups

Use Folder Comparison through the crypt remote to verify your encrypted backup matches the source:

Verify encrypted backup

Critical Warnings

Don't lose your password

There is no "forgot password" recovery. If you lose your crypt password, your encrypted data is permanently inaccessible. No one — not rclone, not Google, not Amazon — can recover it.

Store your password safely:

  • Write it down and store in a physical safe.
  • Use a password manager (separate from the cloud you're encrypting).
  • Keep at least two copies in different locations.

Don't modify encrypted files directly

Never edit the encrypted blobs directly on the cloud provider. Always access them through the crypt remote. Direct modification will corrupt the files.

Performance impact

Encryption adds some CPU overhead:

  • Negligible on modern desktops and laptops.
  • Noticeable on Raspberry Pi or low-power devices.
  • Doesn't affect network speed (encryption happens before upload).

Multiple Crypt Remotes

You can create different crypt remotes for different purposes:

Crypt RemotePoints ToPasswordUse Case
crypt-personalgdrive:encrypted/Password APersonal sensitive files
crypt-works3:work-encrypted/Password BWork documents
crypt-archiveb2:archive-encrypted/Password CLong-term archive

Each uses a different password and different underlying storage.

Getting Started

  1. Download RcloneView from rcloneview.com.
  2. Add your cloud storage as a regular remote.
  3. Create a crypt remote pointing at a folder on that cloud.
  4. Set a strong password and store it safely.
  5. Use the crypt remote for all sensitive file operations.
  6. Schedule encrypted backups for automation.

Your data. Your keys. Your control.


Related Guides:

Supported Cloud Providers

Local Files
WebDAV
FTP
SFTP
HTTP
SMB / CIFS
Google Drive
Google Photos
Google Cloud Storage
OneDrive
Dropbox
Box
MS Azure Blob
MS File Storage
S3 Compatible
Amazon S3
pCloud
Wasabi
Mega
Backblaze B2
Cloudflare R2
Alibaba OSS
Ceph
Swift (OpenStack)
IBM Cloud Object Storage
Oracle Cloud Object Storage
IDrive e2
MinIO
Storj
DigitalOcean Spaces