<s>
Filesystem-level	B-Application
encryption	I-Application
,	O
often	O
called	O
file-based	O
encryption	O
,	O
FBE	O
,	O
or	O
file/folder	B-Application
encryption	I-Application
,	O
is	O
a	O
form	O
of	O
disk	O
encryption	O
where	O
individual	O
files	O
or	O
directories	O
are	O
encrypted	O
by	O
the	O
file	B-Application
system	I-Application
itself	O
.	O
</s>
<s>
This	O
is	O
in	O
contrast	O
to	O
the	O
full	O
disk	O
encryption	O
where	O
the	O
entire	O
partition	O
or	O
disk	O
,	O
in	O
which	O
the	O
file	B-Application
system	I-Application
resides	O
,	O
is	O
encrypted	O
.	O
</s>
<s>
Types	O
of	O
filesystem-level	B-Application
encryption	I-Application
include	O
:	O
</s>
<s>
The	O
advantages	O
of	O
filesystem-level	B-Application
encryption	I-Application
include	O
:	O
</s>
<s>
Unlike	O
cryptographic	B-Application
file	I-Application
systems	I-Application
or	O
full	O
disk	O
encryption	O
,	O
general-purpose	O
file	B-Application
systems	I-Application
that	O
include	O
filesystem-level	B-Application
encryption	I-Application
do	O
not	O
typically	O
encrypt	O
file	B-Application
system	I-Application
metadata	O
,	O
such	O
as	O
the	O
directory	O
structure	O
,	O
file	O
names	O
,	O
sizes	O
or	O
modification	O
timestamps	O
.	O
</s>
<s>
One	O
exception	O
to	O
this	O
is	O
the	O
encryption	O
support	O
being	O
added	O
to	O
the	O
ZFS	B-Application
filesystem	B-Application
.	O
</s>
<s>
Filesystem	B-Application
metadata	O
such	O
as	O
filenames	O
,	O
ownership	O
,	O
ACLs	O
,	O
extended	O
attributes	O
are	O
all	O
stored	O
encrypted	O
on	O
disk	O
.	O
</s>
<s>
The	O
ZFS	B-Application
metadata	O
relating	O
to	O
the	O
storage	O
pool	O
is	O
stored	O
in	O
plaintext	O
,	O
so	O
it	O
is	O
possible	O
to	O
determine	O
how	O
many	O
filesystems	B-Application
(	O
datasets	O
)	O
are	O
available	O
in	O
the	O
pool	O
,	O
including	O
which	O
ones	O
are	O
encrypted	O
.	O
</s>
<s>
Another	O
exception	O
is	O
CryFS	O
replacement	O
for	O
EncFS	B-Application
.	O
</s>
<s>
Cryptographic	B-Application
file	I-Application
systems	I-Application
are	O
specialized	O
(	O
not	O
general-purpose	O
)	O
file	B-Application
systems	I-Application
that	O
are	O
specifically	O
designed	O
with	O
encryption	O
and	O
security	O
in	O
mind	O
.	O
</s>
<s>
Instead	O
of	O
implementing	O
an	O
on-disk	O
format	O
and	O
their	O
own	O
block	O
allocation	O
,	O
these	O
file	B-Application
systems	I-Application
are	O
often	O
layered	O
on	O
top	O
of	O
existing	O
file	B-Application
systems	I-Application
e.g.	O
</s>
<s>
residing	O
in	O
a	O
directory	O
on	O
a	O
host	O
file	B-Application
system	I-Application
.	O
</s>
<s>
Many	O
such	O
file	B-Application
systems	I-Application
also	O
offer	O
advanced	O
features	O
,	O
such	O
as	O
deniable	O
encryption	O
,	O
cryptographically	O
secure	O
read-only	O
file	B-Application
system	I-Application
permissions	O
and	O
different	O
views	O
of	O
the	O
directory	O
structure	O
depending	O
on	O
the	O
key	O
or	O
user	O
...	O
</s>
<s>
One	O
use	O
for	O
a	O
cryptographic	B-Application
file	I-Application
system	I-Application
is	O
when	O
part	O
of	O
an	O
existing	O
file	B-Application
system	I-Application
is	O
synchronized	B-Application
with	O
'	O
cloud	O
storage	O
 '	O
.	O
</s>
<s>
In	O
such	O
cases	O
the	O
cryptographic	B-Application
file	I-Application
system	I-Application
could	O
be	O
'	O
stacked	O
 '	O
on	O
top	O
,	O
to	O
help	O
protect	O
data	O
confidentiality	O
.	O
</s>
