The act of encrypting things *always* makes them (seem) more interesting.
You can use encryption to keep secrets, but, in using encryption, may let others know that you even have a secret at all.
So, the very best kind of encryption is both un-openable without a very large securely transported key AND not obviously (or even unobviously) encrypted at all.
@futurebird 16 byte/128 bit is plenty for a symmetric encryption key. Not sure I would call that "very large".
And also, you should encrypt everything, always. The real question is how you handle the keys, that is highly nontrivial.
@sophieschmieg @futurebird I don't agree with always encrypting things. A case in point is that in the UK, if you fail to hand over your encryption keys, you can be jailed for each such refusal (yeah, no such thing as double jeopardy there). And if that file was just random data you saved for testing/shits and giggles? You can never prove that it isn't an encrypted file....
If you do feel that everything should be encrypted, at least use a deniable encryption scheme.
(I've said too much)
@nihongomaamaa @sophieschmieg @futurebird if you're in a regime where they can jail you for refusing to hand over the non-existent keys to a blob of legitimately random data, I don't think "deniable" is going to save you. What stops them from just assuming you're using such a scheme when they don't find what they're looking for, and demanding the real key? Or demanding the key to the noisy low bits of your photo album, where you've obviously hidden the incriminating data?