Advertisement
If you have a new account but are having problems posting or verifying your account, please email us on hello@boards.ie for help. Thanks :)
Hello all! Please ensure that you are posting a new thread or question in the appropriate forum. The Feedback forum is overwhelmed with questions that are having to be moved elsewhere. If you need help to verify your account contact hello@boards.ie
Hi there,
There is an issue with role permissions that is being worked on at the moment.
If you are having trouble with access or permissions on regional forums please post here to get access: https://www.boards.ie/discussion/2058365403/you-do-not-have-permission-for-that#latest

Do you encrypt your hard drive(s)?

  • 14-11-2010 3:37pm
    #1
    Closed Accounts Posts: 4,564 ✭✭✭


    I do. Nothing beats an entire LVM container encrypted with LUKS. I mean, it's not that hard to setup during an install for instance on modern Linux distros. Honestly, key based authentication and encryption should be mandatory on all systems, including sensitive ones.
    As a "citizan", you are within your rights to protect your privacy. This isn't North Korea. Encrypt as you please. I suggest blowfish. I know a few people use TrueCrypt for files, but would you bother with the whole disk(including swap)? AIB could learn a thing or two:pac:


Comments

  • Registered Users, Registered Users 2 Posts: 1,226 ✭✭✭blubloblu


    There's nothing worse than encrypting something, storing it away for a few years and completely forgetting the passphrase.


  • Closed Accounts Posts: 4,564 ✭✭✭Naikon


    blubloblu wrote: »
    There's nothing worse than encrypting something, storing it away for a few years and completely forgetting the passphrase.

    Yeah, that would suck donkey balls. I can't think of any way to circumvent this situation, except maybe for a cool biometric device currently not available for use.
    Mind you, there was a case in the UK not that long ago where a guy was jailed for not revealing his key. "But Officer, I 'forgot' the key!" should be an acceptable excuse imo;)


  • Registered Users, Registered Users 2 Posts: 13,073 ✭✭✭✭bnt


    Yep - on my Ubuntu netbook, I have an encrypted /home directory, which I back up to an encrypted USB drive. In there, some "core" files go on to Dropbox too.

    You are the type of what the age is searching for, and what it is afraid it has found. I am so glad that you have never done anything, never carved a statue, or painted a picture, or produced anything outside of yourself! Life has been your art. You have set yourself to music. Your days are your sonnets.

    ―Oscar Wilde predicting Social Media, in The Picture of Dorian Gray



  • Closed Accounts Posts: 910 ✭✭✭Jagera


    I would - I spent a few hours trying to encrypt a USB driveto work on Linux & Windows. I couldn't get it going, so I gave up. I will come back to it though.

    I wanted to partition the drive, 80% encrypted, and 20% non - for general non secure purposes.


  • Registered Users, Registered Users 2 Posts: 37,485 ✭✭✭✭Khannie


    Not currently. Would be interested in switching /home to an encrypted drive though. Is it much hassle?


  • Advertisement
  • Banned (with Prison Access) Posts: 10,087 ✭✭✭✭Dan_Solo


    Naikon wrote: »
    This isn't North Korea.
    No, but can't US Border Control demand access to your files and even image your hard drive if they so feel like?


  • Registered Users, Registered Users 2 Posts: 37,485 ✭✭✭✭Khannie


    AFAIK TrueCrypt has a feature that means you can hide a partition entirely (and therefore deny its existence).

    Demand all ye want. If you don't know something's there it wont do you any good. :)


  • Banned (with Prison Access) Posts: 10,087 ✭✭✭✭Dan_Solo


    Khannie wrote: »
    AFAIK TrueCrypt has a feature that means you can hide a partition entirely (and therefore deny its existence).

    Demand all ye want. If you don't know something's there it wont do you any good. :)
    Well, Truecrypt can deny its existence, but if YOU deny its existence and US Border Control find it... your ticket might be automatically switched to "Destination: Guantanamo. One way." :D


  • Registered Users, Registered Users 2 Posts: 16,930 ✭✭✭✭challengemaster


    Dan_Solo wrote: »
    No, but can't US Border Control demand access to your files and even image your hard drive if they so feel like?

    Someone should inform them there's easier ways to get pr0n :D :pac:


  • Moderators, Recreation & Hobbies Moderators, Science, Health & Environment Moderators, Technology & Internet Moderators Posts: 93,562 Mod ✭✭✭✭Capt'n Midnight


    Naikon wrote: »
    Yeah, that would suck donkey balls. I can't think of any way to circumvent this situation, except maybe for a cool biometric device currently not available for use.
    Mind you, there was a case in the UK not that long ago where a guy was jailed for not revealing his key. "But Officer, I 'forgot' the key!" should be an acceptable excuse imo;)
    Biometrics could change over time, a cut on your finger tip.

    Those people in Anglo should not be handed out a get out of jail free card.


  • Advertisement
  • Moderators, Recreation & Hobbies Moderators, Science, Health & Environment Moderators, Technology & Internet Moderators Posts: 93,562 Mod ✭✭✭✭Capt'n Midnight


    bw wrote: »
    I would - I spent a few hours trying to encrypt a USB driveto work on Linux & Windows. I couldn't get it going, so I gave up. I will come back to it though.

    I wanted to partition the drive, 80% encrypted, and 20% non - for general non secure purposes.
    encfs is just about the easiest to use for individual folders

    sudo apt-get install encfs
    encfs ~/.hidden ~/visible


    at next logon just use up arrow to get the encfs line again

    You will now have a hidden folder in home with encrypted files in it
    visible is a temporary mirror image of the hidden folder - except that everything there is decrypted


    each file is encrypted (including the name - so go by date/size) so you can email them or archive them one by one, just drop back in the hidden folder to have them appear decrypted in the other. This can be handy since a bad sector won't take out the full volume, data recovery on encrypted files isn't exactly easy.


    BTW since memory is cheap just put tmp into it ,
    this may also improve your battery life if using a laptop.


  • Moderators, Recreation & Hobbies Moderators, Science, Health & Environment Moderators, Technology & Internet Moderators Posts: 93,562 Mod ✭✭✭✭Capt'n Midnight


    Naikon wrote: »
    I do. Nothing beats an entire LVM container encrypted with LUKS.

    security.png

    "Actual actual reality: nobody cares about his secrets. (Also, I would be hard-pressed to find that wrench for $5.)"



    If you are paranoid then you should at least have multiple layers
    - BIOS passworded and set to do memory test on each boot (not fast boot)
    - HDD password ( set in BIOS and different to one for BIOS)
    - Filesystem encrypted
    - Home folder encrypted with different algorithm
    - Don't bother wiping swap file on shutdown, buy more ram instead of using swap

    To stop someone nicking passwords out of RAM - perhaps some fancy lock when laptop is closed, of course you will also need to disable USB / CD / LAN boot options as well.


    Then again I know someone who didn't remember that his home drive was encrypted during an install and a failed upgrade later he's not a happy bunny.


  • Closed Accounts Posts: 910 ✭✭✭Jagera


    If you are paranoid then you should at least have multiple layers
    - BIOS passworded and set to do memory test on each boot (not fast boot)
    - HDD password ( set in BIOS and different to one for BIOS)
    - Filesystem encrypted
    - Home folder encrypted with different algorithm
    - Don't bother wiping swap file on shutdown, buy more ram instead of using swap
    - keep post-it-notes with passwords hidden under the keyboard


  • Moderators, Recreation & Hobbies Moderators, Science, Health & Environment Moderators, Technology & Internet Moderators Posts: 93,562 Mod ✭✭✭✭Capt'n Midnight


    Dan_Solo wrote: »
    No, but can't US Border Control demand access to your files and even image your hard drive if they so feel like?
    TBH this is like smuggling guns into the US it's a stupidity filter

    you can buy weapons in Walmart,
    you want IED's ? buy a copy of Make and head down to the hardware store

    you want to keep your data secure ?
    vanilla install and use the cloud / download your info after you get to the states


Advertisement