Encrypt your Linux with LUKS, like seriously.
from lunatique@lemmy.ml to privacy@lemmy.ml on 12 Oct 14:31
https://lemmy.ml/post/37434213

This makes a world of difference. I know many people may know of it but may not actually do it. It Protects your files in case your computer is ever stolen and prevents alphabet agencies from just brute forcing into your Laptop or whatever.

I found that Limine (bootloader) has the fastest decryption when paired with LUKS at least for my laptop.

If your computer isn’t encrypted I could make a live USB of a distro, plug it into your computer, boot, and view your files on your hard drive. Completely bypassing your Login manager. If your computer is encrypted I could not. Use a strong password and different from your login

Benefits of Using LUKS with GRUB Enhanced Security

Compatibility with GRUB

#privacy

threaded - newest

anonfopyapper@lemmy.world on 12 Oct 14:51 next collapse

Pretty much all beginner friendly distros have this thing (Fedora Debian Ubuntu Mint). You just have to enable it. Also make sure if you are using secure boot - remove Microsoft keys and generate your own. Also its nice to have bios password setup too.

jif@piefed.ca on 12 Oct 18:56 next collapse

I did not know this about secure boot, I always just disabled it.

pemptago@lemmy.ml on 12 Oct 21:23 next collapse

It’s easy-- if you install on a single drive. If you want home on a separate drive, encryption is not so easy, and you have to learn about cryptsetup, crypttab, etc. Quite a steep learning curve compared to the installer. I do hope distros provide better coverage of this in the future. Having home on a separate drive and encrypted is just good practice.

ElectricWaterfall@lemmy.zip on 13 Oct 00:06 collapse

Watch out about removing Microsoft’s keys! Some video drivers (nvidia) will only work with Microsoft’s keys and you might brick your system. Only remove Microsoft’s keys if you know what you’re doing.

Eheran@lemmy.world on 12 Oct 14:56 next collapse

What about data safety, backups etc.? If someone has access to my PC, that is already pretty catastrophic.

RotatingParts@lemmy.ml on 12 Oct 15:10 next collapse

Good question. Along the same lines, if your disk is encrypted and you make a simple backup (say using cp) is the backup encrypted and if so, how do you restore from that?

relativestranger@feddit.nl on 12 Oct 15:19 next collapse

if your system uses full disk encryption (such as via LUKS) and you simply copy files off to an external or a secondary drive for a ‘backup’, no. the copy is not encrypted unless the destination has encryption set up on it, too.

the alternative would be using a backup program, instead of a simply file copy, that encrypts its backups.

floofloof@lemmy.ca on 12 Oct 15:26 next collapse

It depends how the backup is encrypted. Most backup solutions will give you an encryption key, or a password to a key, that you have to keep safely and securely somewhere else. If you have an online password manager or a Keepass database in cloud storage, that would be a reasonable place to keep the key. Or on a USB stick (preferably more than one because they can fail) or a piece of paper which you mustn’t lose.

ruby@lemmy.dbzer0.com on 12 Oct 16:52 collapse

the backup wouldn’t be encrypted but you can use luks to encrypt the backup drive too, the same way as you’d do with a drive in your computer.

i use rsync to send off my /home to an encrypted backup drive and restoring it you just reverse the source and destination and copy the stuff back.

bjoern_tantau@swg-empire.de on 13 Oct 20:49 collapse

I started using borg backup the other day. It also keeps deleted files for however long you want, so it protects against accidental deletes. You can basically tell it the date you want to restore from.

It can also encrypt the backup for you.

raspberriesareyummy@lemmy.world on 12 Oct 15:12 next collapse

dmcrypt for backup drives. Ideally with detached encryption header, stored separately.

lunatique@lemmy.ml on 12 Oct 15:25 collapse

They can’t access your files, they just have your computer. They could delete your files by wiping your drive but they don’t have your files, ensuring your privacy

rinze@lemmy.ca on 12 Oct 15:01 next collapse

Also: encrypt everything you upload to the cloud with Cryptomator or something like that. I amazes me I used to put stuff directly in my pCloud folder.

lunatique@lemmy.ml on 12 Oct 15:11 next collapse

Facts. I put everything on cloud (mega only) compressed with AES-256

floofloof@lemmy.ca on 12 Oct 15:24 collapse

compressed with AES-256

I guess you mean encrypted.

lunatique@lemmy.ml on 12 Oct 15:31 collapse

No I meant compressed, it comes with the encryption.

<img alt="" src="https://lemmy.ml/pictrs/image/9a5d9375-5a8a-4977-ba50-a9cd7042865b.png">

Chewt@beehaw.org on 12 Oct 16:01 collapse

AES-256 is just an encryption algorithm, it doesn’t do any compression on it’s own, so it’s not quite right to say its compressed with it. Really it was compressed, then afterwards encrypted with AES-256.

lunatique@lemmy.ml on 12 Oct 16:10 collapse

Sigh. I said i compress with AES-256. I compress my files with the compression that encrypts it. Just as the screenshot shows. (Compression+AES-256) I’m the OP of this post. Give me more credit. I know they are two different things. I think you just didn’t get what I was trying to say

JohnnyCanuck@lemmy.ca on 12 Oct 16:23 next collapse

I said i compress with AES-256

To avoid confusion you could say, “along with”, or fully say, “I encrypt with AES-256 as I compress, in one step”.

It’s not necessarily about what you know, but about what readers will understand. (For example, someone who doesn’t know better might read what you wrote and think there is some way to compress using AES-256 and go down a rabbit hole.)

Chewt@beehaw.org on 12 Oct 19:47 collapse

I understood what you meant, I was just pointing out that what you said was incorrect. Even in your reply you said

I compress my files with the compression that encrypts it.

Which is still not entirely correct. The compression is not doing any encrypting. They are two separate processes that the tool you are using is presenting as a single step for convenience. You seem to know what you are talking about, and I happen to know about cryptography, but as someone else in the thread mentioned not everyone knows how these things work. If we are trying to spread knowledge and tips in this community (like your post is doing) then I just saw this as an opportunity to clarify something that was incorrect. Not for your benefit, but for others.

floofloof@lemmy.ca on 12 Oct 15:12 next collapse

Cryptomator is good but it’s important also to keep backups of the unencrypted content of the Cryptomator vault that are not encrypted by Cryptomator. (You could encrypt the backups with another system.) Cryptomator vaults are more fragile than the underlying file system, and it’s easier for a glitch in the sync process to corrupt them so they’re unrecoverable. I have lost data due to this in the past. So it’s best to make sure all the contents of your vaults also exist somewhere else, encrypted in another way.

rinze@lemmy.ca on 12 Oct 18:08 collapse

I used borg for my backups, but why do you say Cryptomator vaults are fragile?

floofloof@lemmy.ca on 12 Oct 18:42 next collapse

It’s not that they’re especially fragile. It’s really only when you combine them with a sync process. I once had a sync go wrong and it resulted in the contents of a vault being unreadable. Because all you have are a bunch of encrypted files with meaningless names and a flattish structure, which Cryptomator interprets and mounts as a different directory structure, when something goes wrong it’s not easy to know where in the vault files the problem lies. You can’t say “ah, I’m missing the documents folder so I’ll restore that one from backup” like you could with an unencrypted directory. And if you’ve made changes since the last vault backup you can’t just restore the whole vault either. You could mount a backup of the vault from a time when it was intact, and then copy files across into your live copy, but I feel safer having a copy in another format somewhere else. Not necessary, I guess, but it can make recovery easier.

rinze@lemmy.ca on 12 Oct 19:37 collapse

Ok, I understand. In my particular use case that shouldn’t be an issue. My Cryptomator folder is local and I use it only locally. Then there’s a sync process to copy stuff to pCloud automatically, but that copy is never touched directly by my.

But in any case as you said, backups.

Eheran@lemmy.world on 12 Oct 20:43 collapse

Because he experienced data loss, as he says?

relativestranger@feddit.nl on 12 Oct 15:24 collapse

easy to use gui backup utilities (like pika and déjà dup) can also encrypt its backups

Thorry@feddit.org on 12 Oct 16:16 next collapse

and prevents alphabet agencies from just brute forcing into your Laptop or whatever

Inserting relevant XKCD as is required by internet law: xkcd.com/538/

<img alt="" src="https://feddit.org/pictrs/image/c79323be-58ff-4b8a-8750-6183d9fba5b4.png">

[deleted] on 12 Oct 16:31 next collapse

.

Coleslaw4145@lemmy.world on 12 Oct 17:10 next collapse

Not much good if they only have your laptop and not you.

bhamlin@lemmy.world on 12 Oct 18:21 next collapse

You know you’re fucked if they use a wrench. That means you don’t have to be seen publicly ever again. There’s a chance for you if they’re using a rubber hose…

monovergent@lemmy.ml on 12 Oct 22:41 next collapse

idk man, but I’d still much rather have encryption, even if I’m up against the alphabet boys:

  • They’ll be up a creek if I escape, die, or vanish into the woods first
  • If I hid a disk somewhere, I’d rather know they found it when they come to torture me, than have it inspected without hearing a word
  • If all else fails, they’ll at least have to expend a modicum of effort and resources to fight me
DarkAri@lemmy.blahaj.zone on 13 Oct 21:25 collapse

What would actually happen is a bios level rootkit that installs a nearly invisible tiny rootkit on your device everytime it starts, but this is only if you are an important target. Most police departments can also just pay a private hacking company to steal your keys by using undisclosed exploits. Encryption can work well for other things but anything you wouldn’t want state or corporations seeing, you are better off just not ever putting it on your machine.

You can be private somewhat through obscurity. Using free software that doesn’t log you, not using any machine that’s in anyway tied to you to do stuff, setting up your own point to point connection to use someone else machine as your access point. Never having a microphone or camera anywhere near your hacking machine. I’m not really that type of hacker, more of a programmer/hardware person, but it can be done somewhat safely if you take every effort to protect your identity.

This is what I would do if I want ed to do something on the internet that might actually really piss off the FBI and NSA. Something like releasing the Epstein files to dozens of independent journalists around the world or something.

I’d get cash, and leave my phone at home, go to a thrift store and buy an old laptop. Wait a couple of months, and never power it on. I download dozens of Linux distros a year before this, something as small as possible, and lightweight as possible. Nothing network, maybe even tails.

Then I’d have it sitting on a thumb drive for many months before I dropped the files. One day before a lot of rain was coming in, I’d walk, not drive or anything, without my cell phone, using the tree cover to avoid spy satellite rewind surveillance, to a location where there is open wifi or an Ethernet jack.

Then I’d use several layers of proxying and VPNs, although this would be slow as shit. All on fresh accounts. Using nested VMs, each carrying an additional layer of VPNs. I’d use this as my set up my own network, by exploiting some random machines in the wild to get my last couple layers of VPNs.

Being careful to only type one word per second and not misspelling anything or in anyway aiding in any type of correlation attack, I’d first upload it in an encrypted format to a web host to speed up the next part, then I’d copy it to many places. I would then send it to as many people as possible, probably using a script to hit many emails addresses at once. As soon as the files hit the drive, I would assume I had about 5 minutes before the black helicopters showed up. At 5 mines I’d take a super strong magnet and start destroying the laptop, then I’d run away, find another safe spot, and then incinerate it.

Then I’d never tell anyone, go home, take a nap, wake up, talk to chatGPT about my amazing nap that I overslept on, and carve out some hidden spaces at abandoned houses and stuff to stash the actual drives with the info.

If you do anything less then this, you will probably get caught. Legal evidence is one thing, but you should never underestimate the numerous surveillance technologies they employ for unconstitutional surveillance. You n leed to be mindful of fingerprinting, (using only a throw away device and destroying it afterwards in a way that it’s not obvious that it was you) nothing that has ever touched your network or any files that that came from your PC or anything. It needs to exist in a totally separate universe. No connection whatsoever) you need to be mindful of cameras, license plate scanners, cellular modem surveillance, spy satellites which can see back in time to follow someone’s footsteps back through time. Correlation attacks, common word usage that can denote your region, common misspellings that you do, the particular way you type, root kits, assume every device is compromised and if you buy a device with a camera, don’t even open it until it’s been sitting for months and then remove the cameras and microphones, and never power it up anywhere near your house.

Another thing to be mindful of is fingerprinting your downloads, don’t download something on your PC and use it on your device.

Be wary of your footprints, this is why I said you would want to do this before a storm but perhaps maybe you would even tie wood to your shoes.

If you did this you could leak something like the Epstein files and probably get away with it, but if you are one of the few people who live in a neighborhood who is a hacker, I would expect that you’d have dozens of FBI agents watching every move you do and combing through your past to find any infraction that they could try to blackmail you with.

Never ever, trust an electronic device is better advice.

Tenderizer78@lemmy.ml on 12 Oct 16:19 next collapse

The same issue applies to Windows 10. I think the TPM (and a BIOS password) is supposed to address this for Windows 11 but I presume you could flush the NVRAM and access the files anyway. I don’t know what exact safeguards there are.

Either way, I am far more trustful of passwords I enter myself. Such as wafersGeezAfterCraze.

BennyCHill@hexbear.net on 12 Oct 23:18 collapse

TPM uses parts of your system like hardware configuration, bios version, can even use parts of the OS, to generate a hashcode to decrypt your drive, so if anything gets replaced it wont automatically decrypt. what this allows is to have a much more complex decryption key and allows you to rely on OS security and much simpler passwords to protect your data because your OS (which cannot be replaced without breaking TPM) will protect against brute force attacks with retry delays and limits.

dysprosium@lemmy.dbzer0.com on 13 Oct 08:52 collapse

But it doesn’t protect against a cold boot attack though?

BennyCHill@hexbear.net on 17 Oct 23:09 collapse

both intel and amd have introduced memory encryption a couple gens. ago although not supported on all devices.

LadyCajAsca@hexbear.net on 12 Oct 16:30 next collapse

I think I know how this works with rEFInd, but I haven’t done it because… my drive is a dual-boot so… yeah, unless I get a laptop and install only Linux in 2030 maybe I’ll do it by then… But by then, I might need the extra security anyway.

lunatique@lemmy.ml on 12 Oct 16:34 collapse

You can still encrypt it with LUKS while dual booting in the year 2025.

LadyCajAsca@hexbear.net on 12 Oct 18:51 collapse

fair, I JUST researched it, but, I only have that drive, where my data is, sooo if I mess up, woops, there goes my system.

I guess I’ll do it if I setup my next computer…?

bruhbeans@lemmy.ml on 12 Oct 17:27 next collapse

Also: back in the day, you could wipe a drive with GNU Shred or just “dd if=/dev/zero of=/dev/hda”. SSDs and NVMe drives have logic about where and what to overwrite that makes this less effective, leading to the possibility of data recovery from old drives. If the data is always encrypted at rest and the key is elsewhere (not on the drive, in a yubikey or TPM chip or your head), then the data is not recoverable.

HakFoo@lemmy.sdf.org on 12 Oct 17:43 collapse

From what I understand, some modern drives effectively encrypt everything at rest, but have the key on file internally so it decrypts transparently. This allows for a fast “wipe” where it just destroys the key instead of having to overwrite terabytes.

bruhbeans@lemmy.ml on 12 Oct 17:54 collapse

that presumes trust in the drive manufacturer and their firmware

programmerlexi@sh.itjust.works on 12 Oct 17:48 next collapse

I found that Limine (bootloader) has the fastest decryption when paired with LUKS at least for my laptop.

Limine does not have decryption, that’s just the linux kernel.

phoenixz@lemmy.ca on 12 Oct 19:21 next collapse

I’ve been doing that since like was first introduced as a separate library already. I don’t know better than that all my files are encrypted since well over a decade, probably almost two

[deleted] on 12 Oct 19:48 next collapse

.

notabot@piefed.social on 12 Oct 20:15 collapse

You can have your machine unencrypt using the TPM module, have a look at clevis for example. Once you’ve got it set up you can pretty much forget it’s there.

stupid_asshole69@hexbear.net on 12 Oct 20:09 next collapse

Set up full backups you can reliably recover with before doing this.

With Luks there are several situations you can end up in where you can’t just pop your disk out and pull files from it, removing a first response to many common hardware failures.

TechnoCat@piefed.social on 12 Oct 21:28 next collapse

Here is the guide for Fedora: https://docs.fedoraproject.org/en-US/quick-docs/encrypting-drives-using-LUKS/

melfie@lemy.lol on 12 Oct 22:45 next collapse

Seems a lot of distros put it under an advanced section in the installer, but I think the “advanced” option should be not enabling full-disk encryption, meaning you know what you’re doing and have assessed the risk.

frongt@lemmy.zip on 12 Oct 23:05 collapse

Ideally, yes. The problem is that the non-advanced users then get prompted for their encryption key and then it’s “What are you talking about, I never set that up, what do you mean you can’t recover the photos of my grandkids!”

melfie@lemy.lol on 12 Oct 23:01 next collapse

Setting up full-disk encryption on a Steam Deck with an on-screen keyboard should definitely be an option during SteamOS installation, but it’s a pain as it stands. It’s my only Linux device not using LUKS.

StopSpazzing@lemmy.world on 12 Oct 23:22 next collapse

Pointless for gaming devices, nothing to hide on them, there will also be a small overhead for nothing.

melfie@lemy.lol on 13 Oct 00:25 next collapse

Correct, nothing to hide because nobody gets their games from the high seas.

NewNewAugustEast@lemmy.zip on 13 Oct 00:56 next collapse

I use mine as a computer often. When I travel it stores notes, has my email accounts, and is a productive tool.

So yeah I would like to encrypt it. As it is I use vaults and back up encrypted to my own cloud. But it would be nice to simply do the whole thing.

StopSpazzing@lemmy.world on 13 Oct 03:29 collapse

Ok fair. But most of those tools are cloud based? Then wouldnt have to worry about an overhead lr encryption when the drive fails.

NewNewAugustEast@lemmy.zip on 13 Oct 03:33 collapse

Encryption really is not much overhead with a modern processor.

I do believe the steam deck uses a modern processor with hardware cryptology.

StopSpazzing@lemmy.world on 13 Oct 05:19 collapse

1-3% overhead, last i check couple years ago. No clue now.

BunScientist@lemmy.zip on 13 Oct 21:42 collapse

your gaming account may be able to do some damage

bjoern_tantau@swg-empire.de on 13 Oct 20:42 collapse

That’s one of the reasons why I installed OpenSUSE Tumbleweed on my Deck. I used unl0kr to put in my passphrase on boot. Unfortunately OpenSUSE removed the framebuffer device and the DRM backend doesn’t work correctly at the moment.

Bigfishbest@lemmy.world on 12 Oct 23:06 next collapse

Dang, if those agencies ever see my Civilization 4 save games, I’ll be so royally embarrassed that I spent so much time on it that they could blackmail me to anything.

arthur@lemmy.zip on 13 Oct 02:44 collapse

They should, because Civ5 is way better xD

IronBird@lemmy.world on 13 Oct 04:48 collapse

obligatory SMAC is best comment

gi1242@lemmy.world on 13 Oct 03:54 next collapse

I found it better to just encrypt one folder with all my sensitive info (I use gocryptfs). i saw no reason to have my zshrc and init.lua encrypted 🙂 and I just encrypt data I don’t want in the hands of others…

Ashiette@lemmy.world on 13 Oct 09:34 next collapse

Browsing history, Downloads folder, cache, etc. That’s good to have encrypted.

Nalivai@lemmy.world on 13 Oct 10:03 next collapse

Just encrypt your home then.

Jason2357@lemmy.ca on 13 Oct 15:38 collapse

Don’t forget /tmp, and maybe logs too. Theres docker storage and kvm image locations if you use that. Maybe others. FDE also makes an evil maid attack much less trivial too.

Nalivai@lemmy.world on 14 Oct 00:27 collapse

I don’t know, I don’t see a lot of damage or unpleasantness stemming from someone getting into my /tmp, but I don’t want any llm being fed contents of my /home. I am less afraid of an attack, as I am irked by corpos putting fingers into my shit

pupbiru@aussie.zone on 14 Oct 05:32 collapse

corpos aren’t who you’re protecting against with encrypted drives… they’re not going to gain access to anything via bypassing your OS: they get everything via software you’ve installed or things like tracking

the main thing you’re protecting against with encryption is theft (or if you think you’re being physically targeted, it also stops them from modifying your system… eg replacing your kernel or a binary that gives them access somehow)

Jason2357@lemmy.ca on 14 Oct 16:33 next collapse

Indeed. Best to think of disk encryption as protection from physical access -i.e., theft, but also accidentally recycled drives later on. It provides zero protection from somebody attacking your running system, that’s the job of the operating system and client software like web browsers. While the system is running, the drive is decrypted and unprotected.

I just prefer fde because it’s simpler. There’s no guessing about what needs to be encrypted and what doesn’t. There isn’t any human-noticiable performance impact on modern computers, so there’s not really a downside besides having 2 password prompts whenever I actually do a full reboot.

Nalivai@lemmy.world on 17 Oct 18:27 collapse

Yeah, but the thing is, I’m not really afraid about anyone else. If someone steals my laptop or finds it or whatever, I don’t really care about what they do with my docker cache. And I’m not a target of any particular hacker group. I just feel dirty when corpos train their LLM on my data to sell me useless shit back, so that’s kind of the only thing that I would like to avoid.

pupbiru@aussie.zone on 18 Oct 03:34 collapse

i think they’re 2 different, but equally important things to protect against

shit companies using your information is almost guaranteed so you want to protect against that, but FDE does nothing for that

but losing your laptop with an unprotected disk can be catastrophic for your life… your entire browser session (so probably your email, and therefor password resets and confirmations), any cloud (or self hosted storage with saved credentials) storage that you have… idk about you, but the contents of my disk are plenty to steal my identity even without needing to social engineer, and with my email and other bits of info that’s plenty to social engineer probably anything up to and including a passport

training an LLM on chats might make you feel dirty, but an unencrypted disk can ruin your life for years and cause problems potentially forever

smiletolerantly@awful.systems on 13 Oct 20:58 next collapse

Also I am pretty sure I have at least some secrets in my shell history

gi1242@lemmy.world on 14 Oct 11:50 collapse

ur def right about this. there are a few other things (e. g. cached mail etc) that would be good to encrypt, which I don’t do right now.

if my computer gets stolen I figure no one will bother with my data unless they stand to immediately gain financially. e.g. ransom. my data (I have backups) or access my bank info (I keep this encrypted) and steal my identity. so I protect against this as best as I can without sacrificing usability too much

Magnum@lemmy.dbzer0.com on 13 Oct 10:49 next collapse

You act like encrypting the whole drive makes it take more power or something

gi1242@lemmy.world on 13 Oct 19:19 collapse

so the issue with whole drive encryption is that all the data is decrypted 100% of the time I’m using the device. even when I sleep the device …

with one folder, I ensure it’s unmounted and encrypted before my computer sleeps.

smiletolerantly@awful.systems on 13 Oct 20:58 next collapse

And what is the advantage of that?

offspec@lemmy.world on 13 Oct 21:19 collapse

Files are encrypted at rest, if they are not actively interfacing with the encrypted mount it is secure. If you encrypt your entire system it’s safe from attacks when powered off, but as soon as you’re booted in the machine is fully accessible.

Magnum@lemmy.dbzer0.com on 13 Oct 22:56 collapse

But when your Computer is on and the drive is mounted, its also decrypted and available? What’s the attack vector here? Someone coming into my house yoinking my computer while its asleep without interrupting the power?

gi1242@lemmy.world on 13 Oct 23:06 next collapse

usually I sleep my laptop and take it with me. with full disk encryption, if my bag gets stolen my files are all decrypted if the attacker gets past the lock screen.

getting past a lock screen is much easier than breaking encryption ofc

more importantly my desktop is online 24/7 with a static IP. if I get hacked they get all my data (bank passwords etc). but with the one folder encryption, if I get hacked they get my zshrc and init.lua 🙂

Magnum@lemmy.dbzer0.com on 14 Oct 08:51 collapse

So the solution is to not put the laptop asleep but turning it off.

gi1242@lemmy.world on 14 Oct 11:35 collapse

lol no. i currently reboot once every two weeks and find it a chore. (it’s my one complaint about arch as the kernel updates are so frequent). I’m def not going to waste time reopening all my windows and tabs every time I open my computer just to keep my zshrc encrypted. i realized long ago that security and usability are inversely related, and I picked the middle ground that suits me

f4f4f4f4f4f4f4f4@sopuli.xyz on 14 Oct 02:22 collapse

I have seen the use of such a device by gov’t agencies; basically a large UPS that clips onto the AC plug’s prongs so that a running server or desktop PC can be confiscated without power being interrupted.

Magnum@lemmy.dbzer0.com on 14 Oct 08:50 next collapse

So just don’t put your Computer to sleep, but turn of off when you leave it?

gi1242@lemmy.world on 14 Oct 11:42 collapse

this sounds cool. if my desktop is plugged into the wall, how would they unplug it to plug it into their device without my computer losing power momentarily?

f4f4f4f4f4f4f4f4@sopuli.xyz on 14 Oct 17:05 collapse

It splices into the live power cord and supplies the same voltage in parallel. When the connection is verified good, the PC is powered from battery and can be unplugged from the wall.

gi1242@lemmy.world on 14 Oct 18:45 collapse

jeez. so strip the live wire. splice in UPS. then switch over. sounds hard (and dangerous)

ryannathans@aussie.zone on 14 Oct 01:38 collapse

Do both

gi1242@lemmy.world on 14 Oct 11:36 collapse

I did think about this… but decided against it in the end. maybe on my next computer

pineapplelover@lemmy.dbzer0.com on 13 Oct 04:19 next collapse

Yeah but then you need to type in two passwords. A little annoying

JustARegularNerd@aussie.zone on 13 Oct 08:46 next collapse

It’s quite possible to set up LUKS with a USB key instead.

Landslide7648@discuss.tchncs.de on 13 Oct 08:53 collapse

What if they get your laptop and your USB key then

JustARegularNerd@aussie.zone on 13 Oct 11:32 collapse

Obviously that would be a total compromise. However this all depends on your threat model and how you usually use your laptop, and if someone were to steal it, would they also mug you for your flashdrive?

In my case, I just type the passphrase I have into the laptop, although my homelab server uses a USB so that it can unattended reboot, and I can put the USB in a secure location if it doesn’t need to reboot unattended.

Otherwise, in my case I usually go out with a laptop that if stolen, is only worth about $150 AUD so not a big financial hit. While I have LUKS as a passphrase, I’m not likely to be a target of any individual or entity that, if they really wanted my data, would also mug me for a USB key, so I could live with either.

pfr@lemmy.sdf.org on 13 Oct 09:16 next collapse

Sarcasm?

bjoern_tantau@swg-empire.de on 13 Oct 20:53 collapse

That’s what TPM is supposed to solve. As long as nothing changes on the PC you don’t have to input a decryption password and access is protected by your usual user password.

pineapplelover@lemmy.dbzer0.com on 13 Oct 21:55 collapse

On one of my computers I have LUKS and requires me to type in two passwords. Not sure if it has TPM

bjoern_tantau@swg-empire.de on 14 Oct 02:59 collapse

Could be a misconfiguration. Can happen when you have more than one partition that is encrypted. Grub would decrypt only root and fail to pass through the passphrase to decrypt the others. Can be fixed by putting a decryption key somewhere on the root partition and adding that to the other partitions.

That’s definitely not how it should be, unless you have two different passphrases.

Azenis@lemmy.world on 13 Oct 11:16 next collapse

I wanna encrypt my BTRFS system, but not the FAT32 boot part. Only the Linux kernels are on FAT32 anyway, and I don’t care about encrypting those — they’re public stuff, not private files. I just let limine-entry-tool hash them to make sure they’re clean for booting, that’s totally fine for me.

I don’t like putting kernels on the Linux filesystem for GRUB — it just makes booting slower and causes random issues.

MonkderVierte@lemmy.zip on 13 Oct 11:48 next collapse

This makes a world of difference

Yep. Can’t recover /home if you fuck around.

Keep it simple and stupid it is for me. I prefer to encrypt only my sensible files. And the browser runs in volatile memory.

kossa@feddit.org on 13 Oct 14:59 next collapse

And don’t forget folks: if this drive contains your whole digital identity, make sure your next ones do have the keys. If something happens to you, it is impossible to retrieve logins, photos, whatever your kin/whomever might need from that drive.

Same goes for e.g. homeservers, VPSs or anything your family relies on: tell them where they find the relevant logins and who could possibly help them, if they’re not capable. Grieving is hard enough, if they figure they also lost all memories of the beloved one, that’s terrible.

AnimalsDream@slrpnk.net on 14 Oct 00:44 next collapse

Last time I had LUKS setup on my main laptop, there was a surprizingly sharp hit in performance.

I’m glad I have the option, but is it really the most appropriate thing for me to use right now? It just doesn’t make sense to talk about security and privacy without a clear threat model first.

lunatique@lemmy.ml on 14 Oct 01:00 next collapse

Sigh. It doesn’t impact performance. That had a had a higher chance of being the type of partition you created. Also, in the PRIVACY group are you really confused about why you want privacy?

AnimalsDream@slrpnk.net on 14 Oct 01:13 collapse

The type of partition I created was Debian’s default settings at the time.

This is where the threat modeling comes in. The laptop in question is not currently likely to be physically searched - nor does it contain any data that is likely to put me at any risk if it is searched, and the more prudent things I can be doing to protect my privacy have more to do with getting away from Android/Play Store, and being less dependent on other surveillance-capitalism services like YouTube, Google Maps, etc.

I will likely use LUKS again in the future, but there are broader overhauls I need to make to my digital life first.

lunatique@lemmy.ml on 14 Oct 01:16 collapse

Look you don’t need to be searched or expecting a search. If someone steals your laptop you are covered SIGNIFICANTLY more if it’s encrypted which gives you privacy because they wouldn’t be able to see your data. Doesn’t matter if it’s a risk to you. It’s for the privacy. It’s the mindset not just the random act

AnimalsDream@slrpnk.net on 14 Oct 01:26 collapse

Currently I have fragments of my data stored on at least half a dozen devices that I’ve accumulated over the years. My digital life is as messy as my adhd brain. I plan on setting up a NAS at some point, and will likely both consolidate all my data there and use LUKS. But until then encrypting one drive is the least of my problems.

Although anti-theft tech in my laptop might be kind of neat.

monovergent@lemmy.ml on 14 Oct 09:28 collapse

What kind of CPU is in that laptop? The vast majority of x86 CPUs from the past 10 years include hardware acceleration for AES encryption so that the performance hit is negligible.

AnimalsDream@slrpnk.net on 14 Oct 15:29 collapse

It’s a Thinkpad P51 with a Xeon chip of some sort. Yeah I don’t know what happened there, only that switching to fedora without full disk encryption has resulted in much greater performance, like a difference between being able to do some gaming or not. So many variable changed there that I don’t even know if the crypto had anything to do with it.

awake01@lemmy.world on 14 Oct 01:54 next collapse

I like to keep a key on a USB so the computer boots either with a ridiculously strong backup password or a key on a USB drive. I like tiny little USB drives. So, if you find yourself in an airport or wherever and you just “lose” the USB then the device is automatically locked down.

LaSirena@lemmy.world on 14 Oct 02:26 next collapse

It took me several attempts to get this right, but it’s a game changer.

awake01@lemmy.world on 14 Oct 03:09 collapse

Yep, I made sooooo many notes and tried a bunch of different options. In the end I was able to get it working well with Grub,l and Arch.

phx@lemmy.world on 14 Oct 03:55 collapse

I built a small set of scripts to decrypt when the initrd starts and can load from a file in the initrd (from separate volume), EFI, or various combinations of passphrase in GRUB. The main intent isn’t to keep out somebody with physical access to the machine and sufficient time but rather makes it a lot easier to make the data unrecoverable when the drive is disposed of.

mazzilius_marsti@lemmy.world on 14 Oct 04:07 next collapse

arch linux was what forced me to use LUKS on all of my installs regardless of distros, btw.

i used the standard layout:/boot, /, /home, swap. So when the installs break, the best way to fix is to use the archiso and remount and re arch-chroot.

Well… i found out that without LUKS, anybody can use any distros live cd and mount my stuff.

At first, I used LUKs only on the main partitions: so / and /home, or just / if no separate /home. Swap remains unencrypted. Boot is also unencrypted.

You could encrypt those too but need more work and hackery stuff:

  • encrypted boot: can be slow if you boot the compututer from cold. There’s also this thing where you need to enter the password twice => think Fedora has an article to get around this. Iirc, it involves storing the boot’s encrypted password as a key deep within the root directory.

  • encrypted swap: the tricky thing is to use this with hibernation. I managed to get it to work once but with Zram stuff, I dont use hibernation anymore. It involved writing the correct arguments in the /boot/grub/grub.cfg. Basically tells the bootloader to hibernate and resume from hibernation with the correct UUID.

BrilliantantTurd4361@sh.itjust.works on 14 Oct 05:02 collapse

Encfs + pam mount home.

/tmp and var/run in tmpfs

No swap.