this post was submitted on 16 Jan 2025
166 points (99.4% liked)

Linux

49077 readers
244 users here now

From Wikipedia, the free encyclopedia

Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991 by Linus Torvalds. Linux is typically packaged in a Linux distribution (or distro for short).

Distributions include the Linux kernel and supporting system software and libraries, many of which are provided by the GNU Project. Many Linux distributions use the word "Linux" in their name, but the Free Software Foundation uses the name GNU/Linux to emphasize the importance of GNU software, causing some controversy.

Rules

Related Communities

Community icon by Alpár-Etele Méder, licensed under CC BY 3.0

founded 5 years ago
MODERATORS
 

I was recently intrigued to learn that only half of the respondents to a survey said that they used disk encryption. Android, iOS, macOS, and Windows have been increasingly using encryption by default. On the other hand, while most Linux installers I've encountered include the option to encrypt, it is not selected by default.

Whether it's a test bench, beater laptop, NAS, or daily driver, I encrypt for peace of mind. Whatever I end up doing on my machines, I can be pretty confident my data won't end up in the wrong hands if the drive is stolen or lost and can be erased by simply overwriting the LUKS header. Recovering from an unbootable state or copying files out from an encrypted boot drive only takes a couple more commands compared to an unencrypted setup.

But that's just me and I'm curious to hear what other reasons to encrypt or not to encrypt are out there.

(page 2) 50 comments
sorted by: hot top controversial new old
[–] [email protected] 20 points 2 days ago (1 children)

I encrypt all my drives. Me and the people I know get occasionally raided by the police. Plus I guess also provides protection for nosy civilians who get their hands on my devices. Unlike most security measures, there is hardly any downside to encrypting your drives—a minor performance hit, not noticeable on modern hardware, and having to type in a password upon boot, which you normally have to do anyway.

[–] [email protected] 4 points 2 days ago (1 children)

Where do you live that you’re getting raided by the police? This sounds like one of those situations where they might use the wrench technique.

[–] [email protected] 7 points 2 days ago (5 children)

I don't want to say where I live for anonymity reasons, but I will note that it's fairly standard for political dissidents to be raided by any government so it doesn't actually particularly narrow down my location.

What's the wrench technique?

load more comments (5 replies)
[–] [email protected] 5 points 2 days ago

Full disk encryption on everything. My Servers, PCs etc. Gives me peace of mind that my data is safe even when the device is no longer in my control.

[–] [email protected] 21 points 3 days ago* (last edited 3 days ago) (4 children)

I don't think I encrypt my drives and the main reason is it's usually not a one-click process. I'm also not sure of the benefits from a personal perspective. If the government gets my drives I assume they'll crack it in no time. If a hacker gets into my PC or a virus I'm assuming it will run while the drive is in an unencrypted state anyway. So I'm assuming it really only protects me from an unsophisticated attacker stealing my drive or machine.

Please educate me if I got this wrong.

Edit: Thanks for the counter points. I'll look into activating encryption on my machines if they don't already have it.

[–] [email protected] 26 points 3 days ago (1 children)

is it’s usually not a one-click process

It is, these days. Ubuntu and Fedora, for example. But you still have to select it or it won't happen. PopOS, being explicitly designed for laptops, has it by default.

If the government gets my drives I assume they’ll crack it in no time.

Depends on your passphrase. If you follow best practice and go with, say, a 25-character passphrase made up of obscure dictionary words, then no, even a state will not be cracking it quickly at all.

If a hacker gets into my PC or a virus I’m assuming it will run while the drive is in an unencrypted state anyway.

Exactly. This is the weak link of disk encryption. You usually need to turn off the machine, i.e. lose the key from memory, in order to get the full benefits. A couple of consolations: (1) In an emergency, you at least have the option of locking it down; just turn it off - even a hard shutdown will do. (2) As you say, only a sophisticated attacker, like the police, will have the skills to break open your screenlocked machine while avoiding any shutdown or reboot.

Another, less obvious, reason for encrypting: it means you can sell the drive, or laptop, without having to wipe it. Encrypted data is inaccessible, by definition.

Encryption of personal data should be the default everywhere. Period.

[–] [email protected] 14 points 3 days ago* (last edited 3 days ago)

Well said. LUKS implements AES-256, which is also entrusted by the U.S. government and various other governments to protect data from state and non-state adversaries.

[–] [email protected] 18 points 3 days ago (6 children)

A big benefit of encryption is that if your stuff is stolen, it adds a lot of time for you to change passwords and invalidate any signed in accounts, email credentials, login sessions, etc.

This is true even if a sophisticated person steals the computer. If you leave it wide open then they can go right in and copy your cookies, logins, and passwords way faster. But if it's encrypted, they need to plug your drive into their system and try to crack your stuff, which takes decent time to set up. And the cracking itself, even if it takes only hours, would be even more time you can use to secure your online accounts.

On Linux, my installs always had a checkbox plus a password form for the encryption.

load more comments (6 replies)
load more comments (2 replies)
[–] [email protected] 7 points 2 days ago* (last edited 2 days ago)

Its that simple.

I can expand my own creativity and store every thought and creative Art, without anybody being able to find out after my death or while someone raids me.

Maybe I stored an opinion against some president, and maybe the government changed its working, which allows police to raid someone for little suspection.

You never know if you ever have something to hide. While things are okay now and today, it might be highly illegal tomorrow.

Those are ideas. But generally its only about the feeling of privacy.

[–] [email protected] 9 points 2 days ago (11 children)

I don't wanna risk losing anything on the drive thats important .

[–] [email protected] 5 points 2 days ago (2 children)

May i suggest a technique for remembering the password?

write it down

but instead of writing down the password, write down questions that only you can reasonably answer. For example:

  • what was the name of the first girl i kissed?
  • where did i go to on summer camp?
  • which special event happened there?

and the answer would be: "mary beach rodeo" or idk what. this way, you construct a password out of multiple words that each are an answer to a simple question.

[–] [email protected] 4 points 2 days ago

Maybe I might try this, and am open to advice :)

[–] [email protected] 2 points 2 days ago

mary beach rodeo

thank you for sharing your password 😜

load more comments (10 replies)
[–] [email protected] 9 points 2 days ago

My Laptop and Phone have encrypted drives, my Desktop doesn't.

[–] [email protected] 2 points 2 days ago

My issue is that I can never remember "a couple more commands" for the life of me. And I use Arch BTW, so the likelihood of me needing those is a bit higher than usual.

[–] [email protected] 2 points 2 days ago

I don't but admittedly I don't do much stuff on my laptop that's super secure. it's mainly for gaming and the odd programming project.

[–] [email protected] 12 points 3 days ago (2 children)

i'd really like to. but there is ONE big problem:

Keyboard layouts.

seriously

I hate having to deal with that. when I set up my laptop with ubuntu, I tried at least 3 thymes to make it work, but no matter what I tried I was just locked out of my brand-new system. it cant just be y and z being flipped, I tried that, maybe it was the french keyboard layout (which is absolutely fucked) or something else, but it just wouldnt work.

On my mint PC I have a similar problem with the default layout having weird extra keys and I just sort of work around that, because fuck dealing with terminals again. (when logged in it works, because I can manually change it to the right one.)

Now I do have about a TerraByte of storage encrypted, just for the... more sensitive stuff...

While dealing with the problems I stumbled across a story of a user who had to recover their data using muscle-memory, a broken keyboard, the same model of keyboard and probably a lot of patience. good luck to that guy.

load more comments (2 replies)
[–] [email protected] 1 points 1 day ago

I made the mistake of not setting up encryption on my main 45TB zfs pool so I'm currently backing up everything on there to tape so I can recreate the pool (also need to change from mirrored to raidz) and then copying everything back to the drives. Although writing and reading each are around 6 days continuesly. Didn't want to bite the bullet and pay more then I absolutely had to and only got a LTO-4 drive and tapes.

[–] [email protected] 2 points 2 days ago

I encrypt everything, with unique complex passwords, that I have a safe mnemonic system for remembering and retrieving.

[–] [email protected] 5 points 2 days ago* (last edited 2 days ago)

I use encryption on laptops, because they can be stolen in the train, bus, etc. On work desktop, I do so as well, because there are many people around. However, on everything that stay at home, I prefer not to use it to simplifiy things and get more performance.

[–] [email protected] 11 points 3 days ago (3 children)

I started encrypting once I moved to having a decent number of solid state drives as the tech can theoretically leave blocks unerased once they go bad. Before that my primary risk factor was at end of life recycling which I usually did early so I wasn’t overly concerned about tax documents/passwords etc being left as I’d use dd to write over the platters prior to recycling.

load more comments (3 replies)
[–] [email protected] 6 points 2 days ago

Almost everything that can be is: laptops, desktop, servers (LUKS), phone (grapheneos)

[–] [email protected] 4 points 2 days ago* (last edited 2 days ago) (6 children)

I would strongly encourage people to encrypt their on site data storage drives even if they never leave the house and theft isn’t a realistic thing that can happen.

The issue is hard drive malfunction. If a drive has sensitive data on it and malfunctions. It becomes very hard to destroy that data.

If that malfunctioning hard drive was encrypted you can simply toss it into an e-waste bin worry free. If that malfunctioning drive was not encrypted you need to break out some heavy tools tool ensure that data is destroyed.

[–] [email protected] 10 points 2 days ago (2 children)

1 torx screwdriver 1 hammer

not the hardest thing to scratch up the platters and then fold them into abstract art

load more comments (2 replies)
[–] [email protected] 2 points 2 days ago (1 children)

If your drive starts malfunctioning, then without encryption you might be able to read some sectors and recover a few things. With encryption you are SOL.

load more comments (1 replies)
[–] [email protected] 2 points 2 days ago (1 children)

Great point.

I provided reasons why I encrypted my drives but this one is even better.

(Another one could be if you need to get your computer to a repair shop, and for some reason you can't just remove the drive.)

load more comments (1 replies)
[–] [email protected] 1 points 1 day ago (1 children)

If that malfunctioning drive was not encrypted you need to break out some heavy tools tool ensure that data is destroyed.

If by heavy tools, you mean a screwdriver and an angle grinder, then yeah, but it's not that hard in reality.

load more comments (1 replies)
load more comments (2 replies)
load more comments
view more: ‹ prev next ›