Do you encrypt your drives and why or why not?
from monovergent@lemmy.ml to linux@lemmy.ml on 16 Jan 21:07
https://lemmy.ml/post/24866843

I was recently intrigued to learn that only half of the respondents to a survey said that they used disk encryption. Android, iOS, macOS, and Windows have been increasingly using encryption by default. On the other hand, while most Linux installers I’ve encountered include the option to encrypt, it is not selected by default.

Whether it’s a test bench, beater laptop, NAS, or daily driver, I encrypt for peace of mind. Whatever I end up doing on my machines, I can be pretty confident my data won’t end up in the wrong hands if the drive is stolen or lost and can be erased by simply overwriting the LUKS header. Recovering from an unbootable state or copying files out from an encrypted boot drive only takes a couple more commands compared to an unencrypted setup.

But that’s just me and I’m curious to hear what other reasons to encrypt or not to encrypt are out there.

#linux

threaded - newest

socphoenix@midwest.social on 16 Jan 21:25 next collapse

I started encrypting once I moved to having a decent number of solid state drives as the tech can theoretically leave blocks unerased once they go bad. Before that my primary risk factor was at end of life recycling which I usually did early so I wasn’t overly concerned about tax documents/passwords etc being left as I’d use dd to write over the platters prior to recycling.

furrowsofar@beehaw.org on 16 Jan 23:49 next collapse

This is the primary reason for me as well. Drive disposal. Also since we only get electronic statements, want to encrypt those.

InFerNo@lemmy.ml on 17 Jan 22:17 collapse

You got me curious. Passwords yeah, but tax documents? Why?

socphoenix@midwest.social on 17 Jan 23:13 collapse

This was a few drives ago but there was a point in time when most places were giving me digital copies of tax documents which I could upload to tax prep software but things like TurboTax didn’t have an auto import. So you’d need to download them then re-upload them to the correct service. Now they do it automatically so the only thing that would match that now now is receipts for expenses/donations and what not that I need to keep track of for manual entry.

BrianTheeBiscuiteer@lemmy.world on 16 Jan 21:29 next collapse

I don’t think I encrypt my drives and the main reason is it’s usually not a one-click process. I’m also not sure of the benefits from a personal perspective. If the government gets my drives I assume they’ll crack it in no time. If a hacker gets into my PC or a virus I’m assuming it will run while the drive is in an unencrypted state anyway. So I’m assuming it really only protects me from an unsophisticated attacker stealing my drive or machine.

Please educate me if I got this wrong.

Edit: Thanks for the counter points. I’ll look into activating encryption on my machines if they don’t already have it.

PrefersAwkward@lemmy.world on 16 Jan 21:38 next collapse

A big benefit of encryption is that if your stuff is stolen, it adds a lot of time for you to change passwords and invalidate any signed in accounts, email credentials, login sessions, etc.

This is true even if a sophisticated person steals the computer. If you leave it wide open then they can go right in and copy your cookies, logins, and passwords way faster. But if it’s encrypted, they need to plug your drive into their system and try to crack your stuff, which takes decent time to set up. And the cracking itself, even if it takes only hours, would be even more time you can use to secure your online accounts.

On Linux, my installs always had a checkbox plus a password form for the encryption.

Terces@lemmy.world on 16 Jan 21:51 collapse

I think this is true for computers that are in danger of being stolen. Laptops or PCs in dorms or other shared living spaces. But I live in a relatively secure area, burglaries are very rare and my PC never leaves the building. So the benefits of encryption are pretty much negligible.

tapdattl@lemmy.world on 16 Jan 22:57 collapse

What are the downsides to encryption? Though you may have negligible benefits, if there are also negligible downsides then the more secure option should be chosen.

tired_n_bored@lemmy.world on 16 Jan 23:38 collapse

  • The LUKS encryption can get corrupted
  • The password may be forgotten
tapdattl@lemmy.world on 17 Jan 01:23 collapse

  • harddrives can be corrupted, too. That’s where backups come in
  • True, though one could use a security key or password manager to overcome that, or setup secure boot/TPM to where a password isn’t actually needed. If all else fails, again, backups.
InFerNo@lemmy.ml on 17 Jan 22:13 collapse

So when the laptop dies, the disk cannot be read anywhere because the tpm is lost?

tapdattl@lemmy.world on 18 Jan 00:48 collapse

Correct, the hard disk in the laptop can not be read. This is where having a good backup strategy is important. Similar to how if your hard disk dies you’re no longer able to access the material on the hard disk. For me, the downsides of encryption do not outweigh the benefits of having my data secure.

I enabled full disk encryption during OS installation, set up a secure passphrase, and then set up automated encrypted backups to my home server, which are automatically backed up to a remote server.

I gain peace of mind in knowing that if my laptop is stolen I’m only out the cost of the laptop, the data within is still safe and secure.

JubilantJaguar@lemmy.world on 16 Jan 21:55 next collapse

is it’s usually not a one-click process

It is, these days. Ubuntu and Fedora, for example. But you still have to select it or it won’t happen. PopOS, being explicitly designed for laptops, has it by default.

If the government gets my drives I assume they’ll crack it in no time.

Depends on your passphrase. If you follow best practice and go with, say, a 25-character passphrase made up of obscure dictionary words, then no, even a state will not be cracking it quickly at all.

If a hacker gets into my PC or a virus I’m assuming it will run while the drive is in an unencrypted state anyway.

Exactly. This is the weak link of disk encryption. You usually need to turn off the machine, i.e. lose the key from memory, in order to get the full benefits. A couple of consolations: (1) In an emergency, you at least have the option of locking it down; just turn it off - even a hard shutdown will do. (2) As you say, only a sophisticated attacker, like the police, will have the skills to break open your screenlocked machine while avoiding any shutdown or reboot.

Another, less obvious, reason for encrypting: it means you can sell the drive, or laptop, without having to wipe it. Encrypted data is inaccessible, by definition.

Encryption of personal data should be the default everywhere. Period.

monovergent@lemmy.ml on 16 Jan 22:21 collapse

Well said. LUKS implements AES-256, which is also entrusted by the U.S. government and various other governments to protect data from state and non-state adversaries.

boredsquirrel@slrpnk.net on 16 Jan 22:24 next collapse

It is a one click process if you use user friendly distros

InFerNo@lemmy.ml on 17 Jan 22:14 collapse

GNOME disks is a nice GUI that lets you setup disks with ease. Encryption can be easily setup with it.

CsXGF8uzUAOh6fqV@lemmy.world on 16 Jan 21:33 next collapse

I don’t, I didn’t do it back then and I ended up using this system for much longer than I thought I would(4+ years). I want to do it next time but I don’t feel like reinstalling just for that.

catloaf@lemm.ee on 16 Jan 21:47 collapse

Good news, you can use cryptsetup to do it in place! unix.stackexchange.com/…/is-there-a-way-to-encryp…

monovergent@lemmy.ml on 16 Jan 22:08 collapse

I wish I found a guide like that back when I first made the move to FDE. Regardless, I was adamantly against reinstalling and painstakingly replicating my customizations, so I came up with a hacky way of tacking on FDE.

It went something along the lines of:

  1. Shrinking the root partition as much as possible
  2. From Live CD, dd root partition to external drive
  3. Perform minimal encrypted install of Debian
  4. From Live CD, open LUKS container of the newly-installed Debian and overwrite the root partition within with my old root partition.
  5. Update fstab, crypttab, initramfs, and grub
  6. Cross my fingers and reboot
JubilantJaguar@lemmy.world on 16 Jan 21:35 next collapse

Absolutely. LUKS full disk encryption. Comes as an opt-in checkbox on Ubuntu, for example.

And I too cannot understand why this is not opt-out rather than opt-in. Apparently we’ve decided that only normies on corporate spyware OSs need security, and we don’t.

catloaf@lemm.ee on 16 Jan 21:44 next collapse

Because when shit breaks nobody wants to hear that their data is gone forever

JubilantJaguar@lemmy.world on 16 Jan 21:59 next collapse

And yet somehow on mobile, where most personal computing is now done, this is not a problem.

catloaf@lemm.ee on 16 Jan 22:07 collapse

Because most of that data is synced to the cloud, icloud or Google photos.

JubilantJaguar@lemmy.world on 16 Jan 22:30 next collapse

Yep. Unfortunately that’s where we are.

9tr6gyp3@lemmy.world on 17 Jan 05:01 collapse

Oh, never met anyone that despises their own data. Hell yeah, dude. Lose that data!

john89@lemmy.ca on 16 Jan 22:31 collapse

Really? It’s not because users don’t have to remember another password?

pemptago@lemmy.ml on 16 Jan 23:48 collapse

People, listen to Juvenile and “back that thang up!” That man understand the importance of data redundancy.

savvywolf@pawb.social on 16 Jan 21:46 collapse

There is a major downside to encryption: If you forget your password or your tpm fails and you’ve not backed things up, then that data is gone forever. If someone doesn’t have anything incriminating or useful to theives on their device, the easier reparability might justify not enabling it.

JubilantJaguar@lemmy.world on 16 Jan 21:58 collapse

Why is this a problem for us and not for ordinary dummies on Android? It’s been the default there for years already.

that_leaflet@lemmy.world on 16 Jan 22:26 next collapse

Phones make the encryption invisible to the user.

That’s not the case on Linux unless you’re willing to put in a bit of work to set up TPM unlocking yourself or use one of the few distros that use TPM by default, like Aeon.

And even then Aeon’s not perfect. Sooner or later the TPM will fail and you’ll have to enter your long backup password and reenroll the TPM.

JubilantJaguar@lemmy.world on 16 Jan 22:38 collapse

Yep. But typing in a password at boot is no big deal and you do then get some of the benefits of encryption. The problem, as you seem to be hinting, is the lockscreen issue. A screenlocked OS without the hardware encryption module is not actually locked down whereas Android, for instance, is. Is that right? I’ve wanted to ask how Android does this - basically, it loses the key and then regenerates it based on biometrics or whatever, each time you unlock, is that it?

john89@lemmy.ca on 16 Jan 22:30 next collapse

Android has storage encryption by default?

Why do I only need to enter 1 password?

JubilantJaguar@lemmy.world on 16 Jan 22:40 collapse

Why would you need to enter 2?

john89@lemmy.ca on 16 Jan 22:42 collapse

Well, usually you don’t need to enter any password.

I’m referring to a password to unlock the screen.

JubilantJaguar@lemmy.world on 16 Jan 22:49 collapse

That’s because you’re probably using biometrics instead.

john89@lemmy.ca on 16 Jan 22:51 collapse

How would I know? I don’t have to use biometrics when I restart the phone.

JubilantJaguar@lemmy.world on 16 Jan 22:57 collapse

Then your password or more likely PIN is what is being used to generate the encryption key. Not very strong encryption but better than nothing.

savvywolf@pawb.social on 17 Jan 01:55 collapse

Android backs up data to the cloud. If the phone breaks or gets stolen, you don’t need to recover data from it - you can just pull it from Google’s servers.

In addition, people tend to not treat their phones as “permanent storage”. The concept of losing or breaking their phone is probably more clear, so they make sure to back it up in some way to the cloud or their desktop.

Also, it’s much more likely for a phone to be stolen than a laptop or desktop.

savvywolf@pawb.social on 16 Jan 21:36 next collapse

I encrypt my home folder and Windows install just in case someone breaks into my house and steals my computer. Super annoying entering my password each boot though.

borari@lemmy.dbzer0.com on 16 Jan 21:42 next collapse

I don’t have FDE (BitLocker) enabled on my Windows 11 gaming PC. It sits in my house and has nothing on it but video games and video game related shit. I don’t even have my password manager installed for logging in to Steam, GoG or whatever other launcher. I manually type passwords in from the vault on my phone if the app doesn’t support QR code login like discord. Also I paid for this ridiculous m.2 nvme drive, I’m not going to just give up iops bc i want my game install files encrypted.

I don’t use FDE on my NAS. Again it doesn’t leave my house. I probably should I guess, bc there is some stuff on there that would cause me to have industry certs revoked if they leaked, but idk I don’t. Everything irreplaceable is backed up off site, but the down time it would take to rebuild my pirated media libraries from scratch vs just swapping disks and rebuilding has me leery.

I have FDE enabled on both my MacBooks. They leave the house with me, it seems to make sense.

I don’t use FDE on Linux VMs I create on the MacBooks, the disk is already encrypted.

My iphone doesn’t have the option to not use FDE I don’t think.

I use encrypted rsync backups to store NAS stuff in the cloud. I use a PGP key on my yubikey to further encrypt specific files on my MacBooks as required beyond the general FDE.

floofloof@lemmy.ca on 16 Jan 21:46 next collapse

I have stopped encrypting my drives, because if anything goes wrong and the system won’t boot it makes recovery more difficult. It’s a dual boot machine with Windows 11, and I had a lot of awkwardness with Bitlocker that led to me deciding to abandon encryption in both OSs. I save sensitive files to encrypted volumes in VeraCrypt.

furrowsofar@beehaw.org on 17 Jan 14:20 collapse

Bittlocker is a pain. Simply booting a maintainance disk requied me to use the recovery codes to get back into windows.

floofloof@lemmy.ca on 17 Jan 19:28 collapse

It has locked me out for attaching a USB device once or twice. Seems a bit extreme.

furrowsofar@beehaw.org on 17 Jan 20:44 collapse

I assume it has something to do with how secure boot, the TPM, and Bitlocker interact.

BioMyth@lemmy.ml on 16 Jan 21:59 next collapse

I don’t for a pretty simple reason. I have a wife, if something ever happened to me then she could end up a creek without a paddle. So by not having it encrypted then, anyone kinda technical can just pull data off the drive.

JubilantJaguar@lemmy.world on 16 Jan 22:54 next collapse

If that’s the only reason, it’s not a great one. You could solve it by storing the password with your important documents.

BioMyth@lemmy.ml on 17 Jan 16:55 collapse

It is the largest reason. Storing the password is one thing but to make the device reasonable to use I would likely store the key’s in TPM with a backup key. I don’t think she would be technical enough to use the backup keys were something additional to happen.

furrowsofar@beehaw.org on 17 Jan 14:17 collapse

Give her and your personal representatives the keys or access to the keys. Problem solved.

Same problem as you passwords and password manager.

BioMyth@lemmy.ml on 17 Jan 16:54 collapse

BioMyth

I understand that giving the keys can partially solve the access problem. But she would still possibly be unable to use the device. Additionally, I don’t know that she would be capable of using the keys without additional assistance and we don’t have other techies in our community who could step up in that capacity.

furrowsofar@beehaw.org on 17 Jan 17:11 collapse

I get it. Credential storage and recovery is a big issue. People vary in skill, ability to keep track of keys or remember how to use them, and they may not have a password manager, safe deposite box, or other locked storage to store them in.

eager_eagle@lemmy.world on 16 Jan 22:02 next collapse

I don’t xkcd.com/538/

I’m convinced the chances of me losing access to the data are higher than encryption protecting it from a bad actor.

Let’s be real, full disk encryption won’t protect a running system and if someone has physical access and really wants it, encryption won’t protect you from the $5 wrench either.

I do encrypt my phone data though, as someone running away with my phone is more realistic.

monovergent@lemmy.ml on 16 Jan 22:17 next collapse

Possibly overestimating the value of the data entrusted to me, but whenever I see that xkcd, I like to think that I at least have the option to remain silent and die with dignity if I really don’t want the contents of my disk out there.

eager_eagle@lemmy.world on 16 Jan 22:57 next collapse
plant_based_monero@lemm.ee on 17 Jan 02:46 next collapse

If I remember correctly, some USA agency said torture is ineffective because you will talk, you like it or not. When you are asking someone for a thing they don’t know they will say a lie just to stop the pain. So I guess anyone will give their password with enough time

Klear@lemmy.world on 17 Jan 10:46 collapse
Auli@lemmy.ca on 17 Jan 20:11 collapse

Nothing I have is worth dying over. I’d give up on the first threat.

Drives in server are not encrypted but backups to the cloud are. Laptop used to but causes to many issues and it doesn’t really leave the house much.

boredsquirrel@slrpnk.net on 16 Jan 22:23 next collapse

Lol police doesnt just use a hammer

patatahooligan@lemmy.world on 16 Jan 23:25 next collapse

Who’s gonna come at me with a $5 wrench because they really want my data, though? The attack I’m most likely to experience is someone stealing my laptop while I’m out traveling. That’s what full filesystem encryption solves best.

Valmond@lemmy.world on 16 Jan 23:41 collapse

Or per XKCD, where are they finding a wrench for $5??

d00phy@lemmy.world on 17 Jan 02:31 next collapse

I’d imagine you could get a decent bludgeoning wrench for around that at a pawn shop. Doesn’t need to be super functional. A pipe wrench in need of some rehabilitation would work nicely.

EveryMuffinIsNowEncrypted@lemmy.blahaj.zone on 17 Jan 09:19 collapse

Or just a pipe.

d00phy@lemmy.world on 18 Jan 23:20 collapse

For sure, but the cartoon specified a wrench.

EveryMuffinIsNowEncrypted@lemmy.blahaj.zone on 19 Jan 05:15 collapse

This is true, though I figured I’d mention it. ^^

timroerstroem@feddit.dk on 17 Jan 06:48 collapse

Here’s one for less than 4 USD. I imagine 150 mm in length would be sufficient.

Valmond@lemmy.world on 17 Jan 10:52 collapse

Wow that’s cheap!

Watch out crypt nerds!

Edit: crypto, not crypt! Leaving it 🧟‍♀️

netvor@lemmy.world on 17 Jan 21:45 collapse

It’s much worse: They can re-use the same wrench.

(Disgusting, I know… 😝 )

AnAmericanPotato@programming.dev on 16 Jan 23:47 next collapse

I’m not worried about getting raided by the KGB or anything like that, but break-ins happen and my computer equipment would be a prime target for theft.

I occasionally cycle my backup drives off-site, so I want those encrypted as well.

The cost of encryption is very close to zero, so I don’t even entertain the question of whether I should encrypt or not. I just encrypt by default.

olympicyes@lemmy.world on 17 Jan 02:14 collapse

It should be encrypted by default because most people don’t take care to dispose of their machines responsibly. I picked up a few machines destined for ewaste and the hard drives were full of tax returns.

30p87@feddit.org on 16 Jan 22:19 next collapse

Doesn’t Pop have that by default? I think others have too.

Anyway, yes for basically everything. Except my servers main partition, because otherwise recovering from crashes would be horribly annoying or unsafe if I’d use cryptssh. And if the dns+dhcp/gateway/VPN server crashes I’d definitely need 22 open.

naeap@sopuli.xyz on 16 Jan 22:20 next collapse

Yeah, on my laptop - because I travel with it and confidential data (like from my customers) could land in hands its not supposed to

No, in case of my desktop, because it’s easier to access it in case of failure

hallettj@leminal.space on 16 Jan 23:53 collapse

My thinking is similar. I’ve seen this news story more than once:

laptop stolen containing customer data… hard drive was not encrypted

I don’t generally have customer data, but it can happen every once in a while.

boredsquirrel@slrpnk.net on 16 Jan 22:23 next collapse

Yes because it is one click

If I delete my drive, it is rubbish

It doesnt impact my performance much

BlackEco@lemmy.blackeco.com on 16 Jan 22:24 next collapse

I encrypted my professional laptop’s drive in order to prevent access to company data and code in case of theft. And I’ll probably encrypt my personal laptop as well because the SSH key can access company code.

As for the desktop, I didn’t and probably never will, because theft is less likely and that would be a pain to handle for nightly backups (it is turned on with Wake-on-LAN and then a cron backs up my home directory to my NAS).

Finally, I won’t encrypt my NAS as well for the same reason: it would quickly become a hassle as I would have to manually decrypt the drives every time it boots after a power outage.

Sam_Bass@lemmy.ml on 16 Jan 22:37 next collapse

No need as none of them are networked

9tr6gyp3@lemmy.world on 17 Jan 04:59 collapse

Do you physically crush and grind your drives once they are end-of-life?

Sam_Bass@lemmy.ml on 17 Jan 07:14 collapse

I usually degauss them

9tr6gyp3@lemmy.world on 17 Jan 07:19 collapse

SSDs?

Sam_Bass@lemmy.ml on 17 Jan 07:21 collapse

Haven’t had one of those fail yet

potentiallynotfelix@lemmy.fish on 16 Jan 22:47 next collapse

Mostly I don’t, but I want to start to. I only have one laptop encrypted and of course I keep my phones encrypted.

Laitinlok@lemmy.laitinlok.com on 16 Jan 23:12 next collapse

Yes because my distro also have encrypted /boot included

Ulrich@feddit.org on 16 Jan 23:18 next collapse

Because it requires generating, memorizing and entering a secure password. Because Linux typically doesn’t support fingerprint readers or other biometrics.

9tr6gyp3@lemmy.world on 17 Jan 04:58 collapse

You can just store the key in your TPM and then you don’t have to memorize anything.

Ulrich@feddit.org on 17 Jan 05:00 collapse

Is that near the TPS reports?

Uiop@lemmy.dbzer0.com on 16 Jan 23:20 next collapse

i’d really like to. but there is ONE big problem:

Keyboard layouts.

seriously

I hate having to deal with that. when I set up my laptop with ubuntu, I tried at least 3 thymes to make it work, but no matter what I tried I was just locked out of my brand-new system. it cant just be y and z being flipped, I tried that, maybe it was the french keyboard layout (which is absolutely fucked) or something else, but it just wouldnt work.

On my mint PC I have a similar problem with the default layout having weird extra keys and I just sort of work around that, because fuck dealing with terminals again. (when logged in it works, because I can manually change it to the right one.)

Now I do have about a TerraByte of storage encrypted, just for the… more sensitive stuff…

While dealing with the problems I stumbled across a story of a user who had to recover their data using muscle-memory, a broken keyboard, the same model of keyboard and probably a lot of patience. good luck to that guy.

herrvogel@lemmy.world on 17 Jan 10:58 collapse

Have you tried peppermint or maybe coriander?

Jokes aside, I believe the password entry stage is before any sort of localization happens, meaning what your keyboard looks like doesn’t matter and the input language defaults to English. You have to type as if you’re using an English keyboard. That’s hardly a good solution if you’re unfamiliar with that layout of course.

fossphi@lemm.ee on 17 Jan 14:31 collapse

Initrd has support to configure the keyboard layout used. Consult your initrd generator’s documentation for this

Xiisadaddy@lemmygrad.ml on 16 Jan 23:26 next collapse

Depends. On external drives yes. On internal boot drive no. I had performance issues and thermal issues with it so stopped on boot drives.

patatahooligan@lemmy.world on 16 Jan 23:33 next collapse

I encrypt all my filesystems, boot partitions excluded. I started with my work laptop. It made the most sense because there is a real possibility that it gets lost or stolen at some point. But once I learned how simple encryption is, I just started doing it everywhere. It’s probably not gonna come into play ever for my desktop, but it also doesn’t really cost me anything to be extra safe.

data1701d@startrek.website on 16 Jan 23:50 next collapse

I don’t do it for my desktop because 1) I highly doubt my desktop would get stolen. 2) I installed Linux before I was aware of encryption, and don’t have any desire to do a reinstall on my desktop at this time.

For my laptop, yes, I do (with exception of the boot partition), since it would be trivial to steal and this is a more recent install. I use clevis to auto-unlock the drive by getting keys from the TPM. I need to better protect myself against evil maids, though - luckily according to the Arch Wiki Clevis supports PCR registers.

southsamurai@sh.itjust.works on 16 Jan 23:51 next collapse

It’s one of those things where it depends on the computer. My old box that’s running win 7 has nothing but music and backed up media files on it, isn’t connected to the internet at all, and there’s really no point to it being encrypted.

My laptop leaves the house, and is connected, so it gets the treatment. My general purpose PC is, though that was more just because of a random choice rather than a carefully chosen decision. I figured I’d try it for a few weeks, then nuke it if it was a problem. It hasn’t been, and I haven’t needed to do anything to it that would require a change.

The other people in the house have chosen not to.

I’m not certain I would encrypt my main desktop again, just because it’s one more thing to do, and I’m getting lazy lol. I don’t have any sensitive files at all, and if things in the world get so bad that some agency is after me, I’m going to be hiding out up in this holler I know, not worrying about leaving a computer behind. Won’t be power anyway, and the only shit they’d find is some pirated files.

I’d be more worried about my phone and my main tablet than any of the PCs, and those would either go with me, or get melted down before I left. Thermite is cheap and easy.

giacomo@lemm.ee on 16 Jan 23:55 next collapse

laptop yeah

desktop nah

astronaut_sloth@mander.xyz on 17 Jan 00:54 next collapse

Same here. My desktop is in a controlled environment, so I don’t see a need. Plus, if I do have some sort of issue, I will still be able to access those files.

Since I actually take my laptop places, I have that encrypted for sure.

d00phy@lemmy.world on 17 Jan 02:27 collapse

Yeah me too. It goes back to your threat level. How likely is it that someone is going to break into my home to steal my desktop all James Bond-like? The answer is, “not very.” Anything mobile has a significantly higher probability of falling into the wrong hands. These things are encrypted. Even the very old laptop that never leaves my house is encrypted because it could.

fmstrat@lemmy.nowsci.com on 16 Jan 23:59 next collapse

Yes, and for the life of me I don’t understand why there isn’t a default LUKS with hibernate partition in the Debian installer.

pemptago@lemmy.ml on 17 Jan 00:01 next collapse

Yes. I encrypt because theft. I know PopOS and Mint make it 1-click ez. …unless of course you want home and root on a separate drives. That scales difficulty real fast. There’s plenty of tutorials, and I managed, but I had to patch together different ones to get a basic setup-- Never mind understanding exactly what I did and repeating it (the latest challenge I’ve been dragging my feet on). I do hope this is an area that sees more development in the near future.

Jesus_666@lemmy.world on 17 Jan 00:30 collapse

That does make encryption was less appealing to me. On one of my machines / and /home are on different drives and parts of ~ are on yet another one.

I consider the ability to mount file systems in random folders or to replace directories with symlinks at will to be absolutely core features of unixoid systems. If the current encryption toolset can’t easily facilitate that then it’s not quite RTM for my use case.

NauticalNoodle@lemmy.ml on 17 Jan 02:05 next collapse

I used to, but then I nuked my install accidentally and I couldn’t recover the encrypted data. I nuke my installs fairly regularly. I just did again this past week while trying to resize my / and my /home partitions. I’ve resigned myself to only encrypting specific files and directories on demand.

My phone is fully encrypted though.

furrowsofar@beehaw.org on 17 Jan 13:50 collapse

Your recovery problem was a backup issue not an encryption issue. Consider addressing the backup issue.

NauticalNoodle@lemmy.ml on 17 Jan 14:28 collapse

I have and I’ve concluded that I’m not made of money and therefore can’t afford to have multiple terabyte drives just lying around with redundant data just in case.

If I could afford it, then I wouldn’t have been resizing my ‘/’ partition to free up 80GB of space.

obsolete@lemmy.dbzer0.com on 17 Jan 02:12 next collapse

No. I prefer the quickest way to share my data between different computers and operating systems on my home network. I will also mention that my network is not accessible over the internet.

EveryMuffinIsNowEncrypted@lemmy.blahaj.zone on 17 Jan 09:31 next collapse

Speaking as someone who doesn’t encrypt their desktop but is thinking about it:

you can’t share (readable) data over one’s home network if the sending PC is disk-encrypted?

For example, are you saying that if I send a video file from my PC, which is disk-encrypted, over LAN to my NAS, then the NAS would not be able to read said file?

furrowsofar@beehaw.org on 17 Jan 13:59 collapse

Disk encryption does not impact file sharing over the network.

Sure if you sharing by a USB portable drive you have to unlock and lock it every time you use it. That is separate thing though.

The bigger issues of encryption are one should have a good backup and recovery plan both for media and for the keys. One has to consider legacy planning too. How do your personal representatives access.

EveryMuffinIsNowEncrypted@lemmy.blahaj.zone on 18 Jan 05:29 collapse

I definitely have backups. And this explains it very well. Thank you. :)

[deleted] on 17 Jan 09:31 collapse

.

ocean@lemmy.selfhostcat.com on 17 Jan 02:43 next collapse

I encrypt my laptop and desktops and I think it’s worth it. I regret encrypting my servers because they need passwords to turn on.

ocean@lemmy.selfhostcat.com on 17 Jan 02:43 next collapse

I encrypt my laptop and desktops and I think it’s worth it. I regret encrypting my servers because they need passwords to turn on. I couldn’t figure out how to handle it when away.

data1701d@startrek.website on 17 Jan 03:14 next collapse

Do your servers have TPM? Clevis might be the way to go; I use it on my Thinkpad and it makes my life easy. If the servers don’t have TPM, Clevis also supports this weird thing called Tang, which from what I can tell basically assures that the servers can only be automatically decrypted on your local network. If Clevis fails, you can have it fall back to letting you enter the LVM password.

ocean@lemmy.selfhostcat.com on 17 Jan 03:43 collapse

I have not tried any of those three things: TPM, Clevis, or Tang. Thanks for recommending.

I tried to setup a keyfile on /, /boot, and /root.

I tried a keyfile on a usb

I also tried to use dropbear to allow ssh unlock.

Sadly these didn’t work and drove me crazy for two nights.

BCsven@lemmy.ca on 17 Jan 04:18 next collapse

Cryptab should help.

ocean@lemmy.selfhostcat.com on 17 Jan 04:38 next collapse

Any tips?

furrowsofar@beehaw.org on 17 Jan 14:14 collapse

Servers are harder and not preconfigued if you want unattended boot. The first key has to come from somewhere typically to unlock the root partition. The other keys can then be stored on that encrypted partition and are typically referenced by crypttab for auto unlock.

The first key can come from anywhere you want such as attached media like a flash drive, a over the network say via ssh, from a key server, or from the TPM. Or you could remotely connect to the console. There are bunch of how tos out there. It amounts to customizing the boot process and the initramfs. It is not simple. What makes sense depends on the threat model.

ocean@lemmy.selfhostcat.com on 17 Jan 04:38 collapse

I tried it. Wonder if I was doing something dumb…

BCsven@lemmy.ca on 17 Jan 06:30 collapse

Did you get it working, if your boot is encrypted (I think) then I think you may have a hard time. Its been about 7 years since I did it. But you can have fstab and crypttab setup to pass the password.

ocean@lemmy.selfhostcat.com on 17 Jan 11:22 collapse

That’s what I was trying to do. I think I encrypted everything as it was my second plain Linux server, not unraid or truenas. I didn’t get it working

ShortN0te@lemmy.ml on 17 Jan 16:16 collapse

With initramfs and dropbear you can make the password prompt accessible over ssh, so you can enter the password from anywhere.

Edit: For debian it is something like

  • install dropbear
  • configure dropbear for initramfs
  • generate key pair
  • generate initramfs
  • You are done.
ilickfrogs@lemmy.world on 17 Jan 02:55 next collapse

I encrypt my desktop and laptop but not my servers. On desktop, that excludes drives that aren’t my OS/boot drive.

communism@lemmy.ml on 17 Jan 03:12 next collapse

I encrypt all my drives. Me and the people I know get occasionally raided by the police. Plus I guess also provides protection for nosy civilians who get their hands on my devices. Unlike most security measures, there is hardly any downside to encrypting your drives—a minor performance hit, not noticeable on modern hardware, and having to type in a password upon boot, which you normally have to do anyway.

twinnie@feddit.uk on 17 Jan 10:28 collapse

Where do you live that you’re getting raided by the police? This sounds like one of those situations where they might use the wrench technique.

communism@lemmy.ml on 17 Jan 14:35 collapse

I don’t want to say where I live for anonymity reasons, but I will note that it’s fairly standard for political dissidents to be raided by any government so it doesn’t actually particularly narrow down my location.

What’s the wrench technique?

netvor@lemmy.world on 17 Jan 21:45 collapse

xkcd.com/538/

communism@lemmy.ml on 18 Jan 00:04 collapse

Ah lol sure. It depends on what level of state repression you’re looking at. Regular cops will just not bother trying to decrypt a drive if they don’t have the password and you don’t freely give it up (you have the right to refuse to provide a password here, it’s under the same kind of principle as having the right to not incriminate yourself), but I’m sure military intelligence etc will go to the wrench technique. Also deniable encryption for anything particularly sensitive is good for the old wrench technique.

poinck@lemm.ee on 18 Jan 09:12 collapse

How do you achieve the deniable encryption on you Linux machine?

communism@lemmy.ml on 18 Jan 15:29 collapse

I don’t do deniable encryption on my root drives, just on external drives, and store the headers on my (non-deniably encrypted) computers. But if you want to deniably encrypt your root drive, Arch Wiki has some info:

wiki.archlinux.org/title/Dm-crypt/Specialties#Enc…

You would still ultimately need an unencrypted header somewhere in order to boot your computer, so if it’s your main daily computer you’d likely carry around the USB stick all day and therefore it wouldn’t work against a state adversary who would obtain the USB stick with your header when they arrest you, if it’s on your person.

Also, it’s much more plausible that an external drive is genuinely just random data with no encrypted contents than that the drive installed into a computer has no data. I do have some USB sticks etc with genuinely nothing on them because I wiped them with /dev/urandom at some point, and they’re lying around waiting for me to need an unused USB drive. The average person doesn’t have an “unused computer” with nothing on it, just random data on the drive. Especially if you are an activist/organiser, if the state finds your computer with just pure random data on it and no encryption header I think they will assume it is deniably encrypted.

poinck@lemm.ee on 18 Jan 23:45 collapse

I see, it’s tricky. I’ll have a look in to the Arch wiki, thx.

cow@lemmy.world on 17 Jan 04:00 next collapse

Almost everything that can be is: laptops, desktop, servers (LUKS), phone (grapheneos)

cmnybo@discuss.tchncs.de on 17 Jan 04:47 next collapse

I encrypt everything that leaves my house since it could be easily lost or stolen, but it is rather inconvenient.

If someone breaks into my house, I’ve got bigger problems than someone getting their hands on my media collection. I think it would be more likely for me to mess something up and loose access to my data than for someone to steal it.

NewOldGuard@hexbear.net on 17 Jan 05:00 next collapse

Yes absolutely, it is the building block of my security posture. I encrypt because I don’t want thieves to have access to my personal data, nor do I want law enforcement or the state to have access if they were to raid my house. I’m politically active and a dissident so I find it vital to keep my data secure and private, but frankly everybody should be doing it for their own protection and peace of mind

Zorsith@lemmy.blahaj.zone on 17 Jan 05:49 next collapse

Of course, I’m paranoid and don’t trust the US government. Or any government really. “First they came for _____” and all that; Id rather just tell them to pound sand immediately instead of get caught with my pants down.

sic_semper_tyrannis@lemmy.today on 17 Jan 06:24 next collapse

I always encrypt my computer SSD as well as my external backup drive. I just wish that when installing a Linux distro and when selecting encryption that it would work with multiple drives

chronicledmonocle@lemmy.world on 17 Jan 06:39 next collapse

Every endpoint device I use is using full disk encryption, yes.

loudWaterEnjoyer@lemmy.dbzer0.com on 17 Jan 06:49 next collapse

I was recently intrigued to learn that only half of the respondents to a survey said that they used NO disk encryption.

Is the other half alright?

Quazatron@lemmy.world on 17 Jan 09:00 collapse

Yes.

If my computers are stolen or lost with the luggage, or if I suddenly die (as one sometime does), I don’t want whoever goes through my computers to get hold of my ex-girlfriends nudes, my credentials for online banking or my porn habits.

loudWaterEnjoyer@lemmy.dbzer0.com on 17 Jan 09:52 collapse

I was looking for people who are not using encrypted storage.

hubobes@sh.itjust.works on 17 Jan 06:59 next collapse

My Laptop and Phone have encrypted drives, my Desktop doesn’t.

Mwa@lemm.ee on 17 Jan 07:35 next collapse

I don’t wanna risk losing anything on the drive thats important .

Quazatron@lemmy.world on 17 Jan 08:53 next collapse

That is a good reason to backup, but has nothing to do with encryption.

Mwa@lemm.ee on 17 Jan 09:03 next collapse

I meant if I lose my encryption key I lose the data on the disk.

mholiv@lemmy.world on 17 Jan 09:17 collapse

That is a good reason to backup, but has nothing to do with encryption.

(For real though I have a backup of all of my drive LUKS headers stored on several media types on and off site.)

keegomatic@lemmy.world on 17 Jan 15:23 collapse

How would backing up help with that, though, assuming the backups are also encrypted?

I meant if I lose my encryption key I lose the data on the disk.

If they lose the key they lose the data in the backups, too. So that concern is not a good reason to backup, in my eyes.

Then, if the backups are not encrypted, then doesn’t that undermine the value of encrypting your drive/user data partition in the first place?

mholiv@lemmy.world on 17 Jan 15:30 collapse

Just backup the LUKs header files. No need to encrypt them as they’re inherently secure as the hard drives they would originally reside on.

EveryMuffinIsNowEncrypted@lemmy.blahaj.zone on 17 Jan 09:15 collapse

That is a good reason to backup

This is true.

but has nothing to do with encryption.

I disagree with this. If you forget the password for decrypting your drive, then you will have lost “anything on the drive that’s important”. I know because it happened to me long ago, and so now I too have been wary of disk encryption ever since then.

Quazatron@lemmy.world on 17 Jan 12:13 collapse

Encryption and backup are orthogonal domains. If you don’t understand why, I’m sure you’re not going to take a random strangers’ opinion on the subject.

utopiah@lemmy.ml on 17 Jan 13:58 collapse

Mind expanding just a bit through? IMHO it’s not orthogonal in the sense that either your backups are :

  • unencrypted and thus your is are safe (you have copies you can access despite losing your keys) but not secure (someone else can read the content too)
  • encrypted and thus your data is NOT safe if you lose your keys but secure

Isn’t it?

Quazatron@lemmy.world on 17 Jan 14:36 next collapse

I keep backups (regular, incremental, remote) to keep my data safe in case something happens to my local data. This protects me from things like theft, hardware failure, accidental deletion of some important files. Having multiple generations (daily, weekly, monthly) will protect me when I delete some files and only realize weeks later.

All of this is a separated issue to having encryption or not. I encrypt both local and backup copies, and store the keys in a password manager.

See what works for you, but don’t confuse the issues.

netvor@lemmy.world on 17 Jan 21:38 collapse

TBH even the way you phrased your question kind of proves it’s orthogonal. Yes, you can have the full matrix:

encrypted | backed up
----------|----------
       no |        no
       no |       yes
      yes |        no
      yes |       yes

In each case, you have a different set of problems.

  • Encrypting a particular medium only means that it’s going to be harder to gain access to the data on that medium (harder for everyone, but trillions of less harder for someone who knows the password.
    • That’s regardless of whether you also have a backup.
  • Backing up just means that a copy of the data exists somewhere else.
    • That’s regardless of whether this or the other copy is encrypted.

Sure, eventually, the nature of your data’s safety will be affected by both.

Disclaimer: I’m by no means a security expert, don’t take what I write here as advice!

Eg. I encrypt my disks. When I do, I basically encrypt everything, ie. all partitions (except /boot). Then on those partitions, most of the data is not worth backing up since it’s either temporary or can be easily obtained anyway (system files). Well, some of the data is backed up, and some of that even ends up on disks that are not encrypted (scary, I know!) :)

To be fair, just encrypting the disks does not solve all. If someone broke to my house, they would with almost 100% chance find my computer on, which means that the disks are not encrypted (technically still are, just that LUKS provides unencrypted versions as well…) So the barrier they would have to face would be basically just the desktop lock.

For that reason I don’t encrypt hard drives on my remote server, since the server is always running in a virtual environment so by definition anyone who’s maintaining the hardware can already open files from the unencrypted drives, ie. I think it would be pointless.

gandalf_der_12te@discuss.tchncs.de on 17 Jan 11:39 collapse

May i suggest a technique for remembering the password?

write it down

but instead of writing down the password, write down questions that only you can reasonably answer. For example:

  • what was the name of the first girl i kissed?
  • where did i go to on summer camp?
  • which special event happened there?

and the answer would be: “mary beach rodeo” or idk what. this way, you construct a password out of multiple words that each are an answer to a simple question.

Mwa@lemm.ee on 17 Jan 14:42 next collapse

Maybe I might try this, and am open to advice :)

netvor@lemmy.world on 17 Jan 21:19 collapse

mary beach rodeo

thank you for sharing your password 😜

Extrasvhx9he@lemmy.today on 17 Jan 07:52 next collapse

Yeah all my drives are encrypted with LUKS mostly because of home burglaries (bad area and whatnot). I still keep backups regardless on drives that are also encrypted

Lawn_and_disorder@hexbear.net on 17 Jan 08:43 next collapse

Had nosey cops trying to get into my phones illegally recently… do not understand people that dont encrypt shit

mholiv@lemmy.world on 17 Jan 09:26 next collapse

I would strongly encourage people to encrypt their on site data storage drives even if they never leave the house and theft isn’t a realistic thing that can happen.

The issue is hard drive malfunction. If a drive has sensitive data on it and malfunctions. It becomes very hard to destroy that data.

If that malfunctioning hard drive was encrypted you can simply toss it into an e-waste bin worry free. If that malfunctioning drive was not encrypted you need to break out some heavy tools tool ensure that data is destroyed.

scholar@lemmy.world on 17 Jan 09:50 next collapse

1 torx screwdriver 1 hammer

not the hardest thing to scratch up the platters and then fold them into abstract art

IsoKiero@sopuli.xyz on 17 Jan 11:04 next collapse

I don’t bother to take out the screws. I just drill handful of holes trough the whole thing. Or if you’re really paranoid a MAP torch is enough to melt the whole thing (don’t breath the smoke).

mholiv@lemmy.world on 17 Jan 11:14 collapse

True. This does work. But it is less secure and much harder than just tossing an encrypted HDD into an e-waste bin. It probably is more fun though. 🤔

netvor@lemmy.world on 17 Jan 21:42 next collapse

Great point.

I provided reasons why I encrypted my drives but this one is even better.

(Another one could be if you need to get your computer to a repair shop, and for some reason you can’t just remove the drive.)

mholiv@lemmy.world on 19 Jan 10:41 collapse

Another one is that if you delete a file on an encrypted drive it can’t be undeleted later on. Lots of benefits.

InFerNo@lemmy.ml on 17 Jan 22:10 next collapse

If your drive starts malfunctioning, then without encryption you might be able to read some sectors and recover a few things. With encryption you are SOL.

mholiv@lemmy.world on 17 Jan 23:26 collapse

This is why backups are important. But even if the drive is encrypted recovering data is exactly as easy as recovery from a non encrypted drive.

  1. Do a ddrescue of the drive.
  2. Re apply the luks header.
  3. decrypt all non corrupt sectors
  4. Use appropriate tools to recover files.

Like you lose the same sectors if those sectors are encrypted or not.

Limeade3425@lemmy.one on 17 Jan 22:09 next collapse

I just encrypt devices that leave the house. I do have access to a hard drive crusher if I lose a drive (recently crushed a tablet that wouldn’t power on)

mholiv@lemmy.world on 17 Jan 23:27 collapse

Fair. If you have access to a crusher then maybe I can see not encrypting. But even then with non encrypted drives files can be recovered even after deleting etc.

bjwest@lemmy.ml on 18 Jan 01:22 collapse

If that malfunctioning drive was not encrypted you need to break out some heavy tools tool ensure that data is destroyed.

If by heavy tools, you mean a screwdriver and an angle grinder, then yeah, but it’s not that hard in reality.

mholiv@lemmy.world on 18 Jan 10:25 collapse

I mean if you have an angle grinder and a space to safely use it sure. But it’s still harder than just dropping the HDD off at an e-waste bin.

dbkblk@lemmy.world on 17 Jan 09:33 next collapse

I use encryption on laptops, because they can be stolen in the train, bus, etc. On work desktop, I do so as well, because there are many people around. However, on everything that stay at home, I prefer not to use it to simplifiy things and get more performance.

Bananable@feddit.nl on 17 Jan 09:37 next collapse

My laptops are encrypted in case they get stolen or someone gets access to them at uni.

Flax_vert@feddit.uk on 17 Jan 09:56 next collapse

I don’t even know how to do it

kylian0087@lemmy.dbzer0.com on 17 Jan 11:31 collapse

Tick a box when installing some distros. Like OoenSUSE.

Flax_vert@feddit.uk on 17 Jan 14:26 collapse

Never got it when installing Ubuntu. Any way of enabling it after install?

kylian0087@lemmy.dbzer0.com on 17 Jan 15:45 collapse

I dont believe it is possible to do after install

netvor@lemmy.world on 17 Jan 21:52 collapse

…well, technically, yes.

If you are well-versed in the guts of the distro (grub, /etc/fstab, /etc/crypttab…), and have extra space, you could spend part of your weekend shifting partitions around and moving everything to the encrypted side, and eventually re-configuring your install and removing the old part. (Oh and don’t forget to chown your /home data if you have multiple users.) I’ve been there, it’s not fun. It’s fun[tm]. It’s just far easier and less error prone to re-install if you can.

(Yeah, I’m stretching the definition of “enabling it” reeealy thin here… 🙃 )

kylian0087@lemmy.dbzer0.com on 17 Jan 22:56 collapse

I mean yes… but realistically no. Also the risk of data loss at that point is high. you will miss things. the best approach would be to make a proper backup reinstall and put the data back.

netvor@lemmy.world on 17 Jan 23:15 collapse

the risk of data loss at that point is high. you will miss things

that’s what makes it exciting 😓 😓 😓

twinnie@feddit.uk on 17 Jan 10:25 next collapse

I don’t really see the point. If someone’s trying to access my data it’s most likely to be from kind of remote exploit so encryption won’t help me. If someone’s breaks into my house and steals my computer I doubt they’ll be clever enough to do anything with it. I guess there’s the chance that they might sell it online and it gets grabbed by someone who might do something, but most of my important stuff is protected with two factor authentication. It’s getting pretty far fetched that someone might be able to crack all my passwords and access things that way.

It’s far more likely that it’s me trying to recover data and I’ve forgotten my password for the drive.

ReakDuck@lemmy.ml on 17 Jan 11:00 next collapse

Its that simple.

I can expand my own creativity and store every thought and creative Art, without anybody being able to find out after my death or while someone raids me.

Maybe I stored an opinion against some president, and maybe the government changed its working, which allows police to raid someone for little suspection.

You never know if you ever have something to hide. While things are okay now and today, it might be highly illegal tomorrow.

Those are ideas. But generally its only about the feeling of privacy.

MonkderVierte@lemmy.ml on 17 Jan 11:11 next collapse

No. I break my system occasionally and then it’s a hassle.

gandalf_der_12te@discuss.tchncs.de on 17 Jan 11:34 next collapse

Only encrypt the home partition, for the root partition it just unnecessarily slows down the system.

Also, I think, there could be different approaches instead of encryption. AFAIK, android doesn’t use encryption underneath, but uses a semi-closed bootloader (which means, if you install a different OS, all user data gets wiped). I’m currently investigating the feasibility of such an approach in the long term.

Katzenmann@feddit.org on 17 Jan 12:01 next collapse

Android definitely has encrypion, but it is just the user data not the programs. It you ever run mount on an android device you will see that it has lots of different partitions for that sort of stuff

furrowsofar@beehaw.org on 17 Jan 13:43 collapse

Android uses verified boot then encrypts the various profiles and the new private space seprately. This is how my GrapheneOS phone works.

Linux has a bunch of options. Ubuntu use to suggest per user encryption by ecryptfs but has since gone to partition based encryption via dm-crypt/LUKS. I still use either or both depending though ecryptfs seems depricated/discontinued and on the next upgrade I may discontinue.

Linux can support vaults too. Just locking certain folders. Encfs, and gocryptfs can do this for example. I use encfs though perhaps gocryptfs is a better choice these days. One can also use partition based solutions like dm-crypfs/LUKS or maybe even veracrypt too.

utopiah@lemmy.ml on 17 Jan 13:55 next collapse

No.

I spend a significant amount of time on other things, e.g. NOT using BigTech, no Facebook, Insta, Google, etc where I would “volunteer” private information for a discount. I do lock the physical door of my house (most of the time, not always) and have a password … but if somebody is eager and skilled enough to break in my home to get my disks, honestly they “deserve” the content.

It’s a bit like if somebody where to break in and stole my stuff at home, my gadgets or jewelry. Of course I do not welcome it, nor help with it hence the lock on the front door or closed windows, but at some point I also don’t have cameras, alarms, etc. Honestly I don’t think I have enough stuff worth risking breaking in for, both physical and digital. The “stuff” I mostly cherish is relationship with people, skills I learned, arguably stuff I built through those skills … but even that can be built again. So in truth I don’t care much.

I’d argue security is always a compromise, a trade of between convenience and access. Once you have few things in place, e.g. password, 2nd step auth, physical token e.g. YubiKeyBio, the rest becomes marginally “safer” for significant more hassle.

netvor@lemmy.world on 17 Jan 21:15 collapse

but if somebody is eager and skilled enough to break in my home to get my disks, honestly they “deserve” the content.

The problem with “my disks” is there’s always some other’s people on it, in one way or another.

But of course, it’s your call. We all have gaps in our “walls” and it’s not like I’d be pretending that LUKS is all that matters.

Omega_Jimes@lemmy.ca on 17 Jan 14:29 next collapse

I used to, but it’s proven to be a pain more often than a blessing. I’m also of the opinion that if a bad actor capable of navigating the linux file system and getting my information from it has physical access to my disk, it’s game over anyway.

ShortN0te@lemmy.ml on 17 Jan 16:21 collapse

I’m also of the opinion that if a bad actor capable of navigating the linux file system and getting my information from it has physical access to my disk, it’s game over anyway.

I am sorry but that is BS. Encryption is not easy to break like in some Movies.

If you are referring to that a bad actor breaks in and modifies your hardware with for example a keylogger/sniffer or something then that is something disk encryption does not really defend against.

Omega_Jimes@lemmy.ca on 17 Jan 19:24 collapse

That’s more what I mean. They won’t break the encryption, but at that point with physical access to my home/ computer/ servers, I have bigger problems.

There’s very little stored locally that could be worse than a situation where someone has physical access to my machine.

9488fcea02a9@sh.itjust.works on 17 Jan 14:49 next collapse

All my important files are on a NAS, so if someone steals my laptop, there’s nothing of value there without being able to log in and mount the remote file systems

ShortN0te@lemmy.ml on 17 Jan 16:10 next collapse

Full disk encryption on everything. My Servers, PCs etc. Gives me peace of mind that my data is safe even when the device is no longer in my control.

LiamMayfair@lemmy.sdf.org on 17 Jan 20:55 next collapse

Yes. Encrypting your entire hard drive has basically been a tickbox in the Fedora installer for a long time now. No reason why I wouldn’t do it. It’s, easy, doesn’t give me any problems and improves my devices security with defence-in-depth. No brainer.

data1701d@startrek.website on 17 Jan 22:49 collapse

It’s a smidge more difficult on Debian if you want to use a non-ext4 filesystem - granted for most people, ext4’s probably still fine. I use it on my desktop, which doesn’t have encryption.

SitD@lemy.lol on 17 Jan 20:56 next collapse

are you guys using the bios ssd encryption option or a software solution?

data1701d@startrek.website on 17 Jan 21:13 next collapse

I’m using LVM. The BIOS solution would be a bad idea because it would be more difficult to access the drive on other systems if you had to; LVM allows you to enter your password on other systems to decrypt.

netvor@lemmy.world on 17 Jan 21:17 collapse

Don’t you mean LUKS with LVM on top? (That’s what I use, I’m not sure LVM alone even supports encryption…)

data1701d@startrek.website on 17 Jan 21:27 collapse

Yes, fellow OpenTTD player.

netvor@lemmy.world on 17 Jan 21:57 collapse

OpenTTD player

It’s nice when people guess which AI i used to generate my avatar.

netvor@lemmy.world on 17 Jan 21:16 collapse

LUKS (I was assuming that’s kind of implied, I don’t think I ever thought of another way…)

pixeltree@lemmy.blahaj.zone on 17 Jan 21:03 next collapse

Honestly… Why bother? If someone gains remote access to my system, an encrypted disk won’t help. It’s just a physical access preventer afaik, and I think the risk of that being necessary is very low. Encrypted my work computer because we had to and that environment also made it make more sense, I technically had sensitive customer info on it, though I worked at Oracle so of course they had to make it as convoluted and shitty as possible.

data1701d@startrek.website on 18 Jan 02:12 next collapse

You’re somewhat right in the sense that the point of disk encryption is not to protect from remote attackers. However, physical access is a bigger problem in some cases (mostly laptops). I don’t do it on my desktop because I neither want to reinstall nor do I think someone who randomly breaks in is going to put in the effort to lug it away to their vehicle.

pixeltree@lemmy.blahaj.zone on 18 Jan 06:25 collapse

Certainly didn’t mean to say it’s never useful, just not useful for me

kixik@lemmy.ml on 18 Jan 05:48 collapse

Can you explain why if someone get access to your encrypted disk, they would have access to its contents?

pixeltree@lemmy.blahaj.zone on 18 Jan 06:00 collapse

If someone can execute arbitrary code on my computer, it doesn’t matter that the disk is encrypted, because I’ve already booted the machine up and entered the key. I’m certainly not the most cryptographically knowledge but using LUKS on Oracle Linux, I’d enter the key once while starting up, past that point there was no difference between an encrypted and unencrypted system. It seems logical to me, then, that if something can execute arbitrary code, it’s after that point, so encryption won’t matter to it. Encryption is more of a solution to someone physically obtaining your hard drive and preventing them from having access to the contents simply by plugging it into their system.

Or at least that’s my understanding, please correct me if I’m mistaken.

kixik@lemmy.ml on 19 Jan 08:10 collapse

Well, I think you already mentioned the key thing about encrypting disks. It’s not about protections when the block device is already decrypted and the filesystem already mount. At that point your disks are decrypted and anyone with or without physical access to your device, if gaining any access to it you’re toast. That’s true, but that’s not what disks encryption help you with, and you already mentioned. If you turn off your device, and someone steals it, or gains access to it, they can’t look at your contents, that’s it. That wouldn’t prevent malicious people, to instead plant something through UEFI for example, and you are right about that case. And if you never turn off your computer, and just do sleep to memory, then you depend on how strong your password is, or any other authentication mechanism you have…

netvor@lemmy.world on 17 Jan 21:12 next collapse

I do, laptops and workstations.

It’s just too easy not to, and there’s almost no downsides to it. (I only need to reboot, once a month or two.)

Well, unless you consider the possibility of forgetting the password a downside, so for that reason I keep the password in a password manager.

In case my laptop was stolen, there would quite a couple fewer things to worry about. Especially things like client’s data which could be under NDA’s, etc…

thebardingreen@lemmy.starlightkel.xyz on 17 Jan 21:15 next collapse

I encrypt everything, with unique complex passwords, that I have a safe mnemonic system for remembering and retrieving.

Feathercrown@lemmy.world on 17 Jan 21:25 next collapse

I have no significant private data on my disks. They can be wiped whether encrypted or not if they’re stolen. And I like that in theory if my pc explodes I can recover the data with only the drive.

Cysioland@lemmygrad.ml on 17 Jan 21:38 next collapse

I encrypt my workstations and backups thereof on external devices. To protect against theft or a lazy state-level adversary

merthyr1831@lemmy.ml on 17 Jan 22:01 next collapse

I don’t but admittedly I don’t do much stuff on my laptop that’s super secure. it’s mainly for gaming and the odd programming project.

InFerNo@lemmy.ml on 17 Jan 22:08 next collapse

My drives are not encrypted because it’s a hassle if things start going wrong. My NAS is software raid so the individual disks mean nothing anyway. The only drive that is encrypted is my backup disk and I’m not really sure if it was needed.

KrispeeIguana@lemmy.ml on 17 Jan 22:42 next collapse

My issue is that I can never remember “a couple more commands” for the life of me. And I use Arch BTW, so the likelihood of me needing those is a bit higher than usual.

flork@lemy.lol on 18 Jan 00:40 next collapse

I wanted to but everyone on Lemmy told me I was an idiot for wanting a feature Mac and Windows have had for a decade (decrypt on login) .

But seriously it’s just not there on Linux yet. Either you encrypt and have two passwords, or give up convenience features like biometrics. Anything sensitive lives somewhere else.

isVeryLoud@lemmy.ca on 18 Jan 01:59 collapse

You’re an idiot, go back to macOS you fucking normie

(/s, I’m also waiting for TPM encryption + user home encryption)

data1701d@startrek.website on 18 Jan 02:09 collapse

Clevis pretty much does TPM encryption and is in most distros’ repos. I use it on my Thinkpad. It would be nice if it had a GUI to set it up; more distros should have this as a default option.

You do have to have an unencrypted boot partition, but the issues with this can at least in be mitigated with PCR registers, which I need to set up.

jollyrogue@lemmy.ml on 18 Jan 16:07 collapse

How hard is clevis to setup?

I’ve seen it referenced for encrypted servers, but I haven’t tried setting it up.

Unencrypted boot is unfortunate. What are PCR registers?

data1701d@startrek.website on 18 Jan 21:35 collapse

(Note: Anything I say could be B.S. I could be completely misunderstanding this.)

Clevis isn’t too difficult to set up - Arch Wiki documents the process really well. I’ve found it works better with dracut that mkinitcpio.

As for PCR registers (which I haven’t set up yet but should), what I can tell, it sets the hash of the boot partition and UEFI settings in the TPM PCR register so it can check for tampering on the unencrypted boot partition and refuse to give the decryption keys if it does. That way, someone can’t doctor your boot partition and say, put the keys on a flash drive - I think they’d have to totally lobotomize your machine’s hardware to do it, which only someone who has both stolen your device and has the means/budget to do that would do.

You do need to make sure these registers are updated every kernel update, or else you’ll have to manually enter the LUKS password the next boot and update it then. I’m wondering if there’s a hook I can set up where every time the boot partition is updated, it updates PCR registers.

bjwest@lemmy.ml on 18 Jan 00:50 next collapse

I don’t encrypt my entire drive, but I do have encrypted directories for my sensitive data. If I did encrypt an entire drive, it would only be the drive containing my data not the system drive.

renzev@lemmy.world on 18 Jan 06:49 collapse

but I do have encrypted directories for my sensitive data

What do you use for encrypted directories? Ecryptfs?

sudoer777@lemmy.ml on 18 Jan 03:23 next collapse

Asahi Linux doesn’t support encryption and getting it to work requires a lot of steps and that I reinstall it which I don’t have time for, so I don’t have it enabled on my laptop, and if it gets stolen or confiscated I’m fucked.

I have it enabled on my server and phone.

soundconjurer@4bear.com on 18 Jan 03:33 collapse

@sudoer777 @monovergent , create an encrypted container? It's a little tedious, but fairly distro agnostic.

Edit: Definitely throw together scripts to simplify the process of unlocking and mounting.

https://null-byte.wonderhowto.com/how-to/hide-sensitive-files-encrypted-containers-your-linux-system-0186691/

endeavor@sopuli.xyz on 18 Jan 03:44 next collapse

I do not as I do not have any sensitive data and what data is sensitive are the digital documents which are securely encrypted by default via id card and its passwords.

If I start having something worth protecting I will turn on fedoras encryption. But until then anyone who manages to steal my 100 eur thinkpad and guess its password is welcome to try out linux and see if they like it I guess.

AnnaFrankfurter@lemmy.ml on 18 Jan 04:03 collapse

They don’t need to guess the password. If you don’t have full disk encryption I can just run another os in live mode and mount your drive and read everything. And even change the password to your fedora, by changing the hash in shadow file

endeavor@sopuli.xyz on 18 Jan 05:06 collapse

oh no, if they changed the password and I got it back somehow, I could finally have an excuse to try out mint.

bier@lemmy.blahaj.zone on 18 Jan 03:50 next collapse

I made the mistake of not setting up encryption on my main 45TB zfs pool so I’m currently backing up everything on there to tape so I can recreate the pool (also need to change from mirrored to raidz) and then copying everything back to the drives. Although writing and reading each are around 6 days continuesly. Didn’t want to bite the bullet and pay more then I absolutely had to and only got a LTO-4 drive and tapes.

notarobot@lemm.ee on 18 Jan 05:54 next collapse

Yes. I have sensitive info in my PC (work credentials) and in the case of a break-in, last thing I want is to jeopardize my job.

shirro@aussie.zone on 18 Jan 06:53 next collapse

Most mobile/laptop devices should be encrypted by default. They are too prone to loss or theft. Even that isn’t sufficient with border crossings where you are probably better off wiping them or leaving them behind.

My desktop has no valuable data like crypto, sits in a locked and occupied house in a small rural community with relatively low crime (public healthcare, social security, aging population). I have no personal experience of property theft in over half a decade.

I encrypt secrets with a hardware key. They are only accessed as needed. This is a much more appropriate solution than whole disk encryptiom for my circumstances. Encrypting Linux packages and steam libraries doesn’t offer any practical benefit and unlocking my filesystem at login would not protect from network exfiltration which is a more realistic risk. It adds overhead.and another point of failure for no real benefit.

pfr@lemmy.sdf.org on 18 Jan 09:44 next collapse

No, I don’t encrypt. I am a grown ass man and I rarely take my laptop out of my home. I don’t have any sensitive data on my various machines. I do use secure and encrypted cloud services to store things that I consider a security risk. Everything else is useless to a potential intruder.

Anonymouse@lemmy.world on 18 Jan 15:29 next collapse

I do on all my devices that can as a matter of practice, not for any real threat. I’m interested to learn about how to set it up and use it on a daily basis including how to do system recoveries. I guess it’s largely academic.

Once I switched to linux as my daily driver, I didn’t have a need to do piracy anymore since all the software I need is FOSS.

jollyrogue@lemmy.ml on 18 Jan 15:58 next collapse

I do encrypt my drives, and it’s not as transparent in Linux as it is in the others. I’m sure I could get a TPM setup for seamless boots, but I haven’t done that yet.

For mobile drivers, I still encrypt, but that locks them to one OS since LUKS isn’t cross platform. There is VeraCrypt for cross-platform encryption, but that’s one more thing to manage and install.

ipkpjersi@lemmy.ml on 18 Jan 16:24 next collapse

I used to, but not anymore, except for my laptop I plan on taking with me travelling. My work laptop and personal laptop are both encrypted.

I figure my home is safe enough, and I only really need encryption if I’m going to be travelling.

One of my friends locked himself out of his PC and all his data because he forgot his master password, and I don’t want to do that myself lol

KarnaSubarna@lemmy.ml on 18 Jan 17:29 collapse

Exactly the same rationale as mine.

hperrin@lemmy.ca on 18 Jan 16:32 next collapse

Yep. Everything except my server, which needs to be able to boot without my help. Because why not? I rarely ever reboot anything, so it doesn’t really hurt, and if anyone steals my shit they won’t get my wife’s noods.

lengau@midwest.social on 18 Jan 20:47 next collapse

Depends on the use case. Definitely for my laptop though. In fact the decryption keys only exist in two places:

  1. Inside my TPM
  2. In a safe deposit box at a bank.
mvirts@lemmy.world on 18 Jan 22:19 next collapse

I don’t encrypt because it’s too much effort to learn about it.

Id rather keep my filesystem unencrypted so that I can easily recover from problems and encrypt important files as needed, but let’s be real I don’t do that either.

yozul@beehaw.org on 19 Jan 03:44 next collapse

For my laptop, yeah. I rarely actually use it though. For my desktop not so much. I really don’t keep that much personal information on it to begin with, and if someone breaks into my house they could probably get more by stealing the desk my computer is sitting on then by stealing the computer. It just feels like a silly thing to waste my time with.

ebd6a8c9051028dc1607@lemmy.ml on 19 Jan 08:02 collapse

yes. if you live in a country without democracy. it is the only way to protect yourself and your data from nsa agent kicking your door.