this post was submitted on 16 Jan 2025
165 points (98.8% liked)

Linux

49051 readers
885 users here now

From Wikipedia, the free encyclopedia

Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991 by Linus Torvalds. Linux is typically packaged in a Linux distribution (or distro for short).

Distributions include the Linux kernel and supporting system software and libraries, many of which are provided by the GNU Project. Many Linux distributions use the word "Linux" in their name, but the Free Software Foundation uses the name GNU/Linux to emphasize the importance of GNU software, causing some controversy.

Rules

Related Communities

Community icon by Alpár-Etele Méder, licensed under CC BY 3.0

founded 5 years ago
MODERATORS
 

I was recently intrigued to learn that only half of the respondents to a survey said that they used disk encryption. Android, iOS, macOS, and Windows have been increasingly using encryption by default. On the other hand, while most Linux installers I've encountered include the option to encrypt, it is not selected by default.

Whether it's a test bench, beater laptop, NAS, or daily driver, I encrypt for peace of mind. Whatever I end up doing on my machines, I can be pretty confident my data won't end up in the wrong hands if the drive is stolen or lost and can be erased by simply overwriting the LUKS header. Recovering from an unbootable state or copying files out from an encrypted boot drive only takes a couple more commands compared to an unencrypted setup.

But that's just me and I'm curious to hear what other reasons to encrypt or not to encrypt are out there.

you are viewing a single comment's thread
view the rest of the comments
[–] netvor@lemmy.world 4 points 21 hours ago (1 children)
[–] communism@lemmy.ml 5 points 18 hours ago (1 children)

Ah lol sure. It depends on what level of state repression you're looking at. Regular cops will just not bother trying to decrypt a drive if they don't have the password and you don't freely give it up (you have the right to refuse to provide a password here, it's under the same kind of principle as having the right to not incriminate yourself), but I'm sure military intelligence etc will go to the wrench technique. Also deniable encryption for anything particularly sensitive is good for the old wrench technique.

[–] poinck@lemm.ee 2 points 9 hours ago (1 children)

How do you achieve the deniable encryption on you Linux machine?

[–] communism@lemmy.ml 1 points 3 hours ago* (last edited 3 hours ago)

I don't do deniable encryption on my root drives, just on external drives, and store the headers on my (non-deniably encrypted) computers. But if you want to deniably encrypt your root drive, Arch Wiki has some info:

https://wiki.archlinux.org/title/Dm-crypt/Specialties#Encrypted_system_using_a_detached_LUKS_header

You would still ultimately need an unencrypted header somewhere in order to boot your computer, so if it's your main daily computer you'd likely carry around the USB stick all day and therefore it wouldn't work against a state adversary who would obtain the USB stick with your header when they arrest you, if it's on your person.

Also, it's much more plausible that an external drive is genuinely just random data with no encrypted contents than that the drive installed into a computer has no data. I do have some USB sticks etc with genuinely nothing on them because I wiped them with /dev/urandom at some point, and they're lying around waiting for me to need an unused USB drive. The average person doesn't have an "unused computer" with nothing on it, just random data on the drive. Especially if you are an activist/organiser, if the state finds your computer with just pure random data on it and no encryption header I think they will assume it is deniably encrypted.