163
submitted 4 days ago by monovergent@lemmy.ml to c/linux@lemmy.ml

I was recently intrigued to learn that only half of the respondents to a survey said that they used disk encryption. Android, iOS, macOS, and Windows have been increasingly using encryption by default. On the other hand, while most Linux installers I've encountered include the option to encrypt, it is not selected by default.

Whether it's a test bench, beater laptop, NAS, or daily driver, I encrypt for peace of mind. Whatever I end up doing on my machines, I can be pretty confident my data won't end up in the wrong hands if the drive is stolen or lost and can be erased by simply overwriting the LUKS header. Recovering from an unbootable state or copying files out from an encrypted boot drive only takes a couple more commands compared to an unencrypted setup.

But that's just me and I'm curious to hear what other reasons to encrypt or not to encrypt are out there.

top 50 comments
sorted by: hot top controversial new old
[-] ipkpjersi@lemmy.ml 8 points 2 days ago* (last edited 2 days ago)

I used to, but not anymore, except for my laptop I plan on taking with me travelling. My work laptop and personal laptop are both encrypted.

I figure my home is safe enough, and I only really need encryption if I'm going to be travelling.

One of my friends locked himself out of his PC and all his data because he forgot his master password, and I don't want to do that myself lol

[-] KarnaSubarna@lemmy.ml 4 points 2 days ago

Exactly the same rationale as mine.

[-] ebd6a8c9051028dc1607@lemmy.ml 2 points 2 days ago

yes. if you live in a country without democracy. it is the only way to protect yourself and your data from nsa agent kicking your door.

[-] eager_eagle@lemmy.world 88 points 4 days ago* (last edited 4 days ago)

I don't https://xkcd.com/538/

I'm convinced the chances of me losing access to the data are higher than encryption protecting it from a bad actor.

Let's be real, full disk encryption won't protect a running system and if someone has physical access and really wants it, encryption won't protect you from the $5 wrench either.

I do encrypt my phone data though, as someone running away with my phone is more realistic.

[-] patatahooligan@lemmy.world 55 points 4 days ago

Who's gonna come at me with a $5 wrench because they really want my data, though? The attack I'm most likely to experience is someone stealing my laptop while I'm out traveling. That's what full filesystem encryption solves best.

[-] Valmond@lemmy.world 26 points 4 days ago

Or per XKCD, where are they finding a wrench for $5??

[-] timroerstroem@feddit.dk 10 points 4 days ago

Here's one for less than 4 USD. I imagine 150 mm in length would be sufficient.

load more comments (2 replies)
load more comments (4 replies)
[-] AnAmericanPotato@programming.dev 28 points 4 days ago

I'm not worried about getting raided by the KGB or anything like that, but break-ins happen and my computer equipment would be a prime target for theft.

I occasionally cycle my backup drives off-site, so I want those encrypted as well.

The cost of encryption is very close to zero, so I don't even entertain the question of whether I should encrypt or not. I just encrypt by default.

load more comments (8 replies)
[-] yozul@beehaw.org 2 points 2 days ago

For my laptop, yeah. I rarely actually use it though. For my desktop not so much. I really don't keep that much personal information on it to begin with, and if someone breaks into my house they could probably get more by stealing the desk my computer is sitting on then by stealing the computer. It just feels like a silly thing to waste my time with.

[-] mvirts@lemmy.world 3 points 2 days ago

I don't encrypt because it's too much effort to learn about it.

Id rather keep my filesystem unencrypted so that I can easily recover from problems and encrypt important files as needed, but let's be real I don't do that either.

[-] lengau@midwest.social 3 points 2 days ago

Depends on the use case. Definitely for my laptop though. In fact the decryption keys only exist in two places:

  1. Inside my TPM
  2. In a safe deposit box at a bank.
[-] cmnybo@discuss.tchncs.de 39 points 4 days ago

I encrypt everything that leaves my house since it could be easily lost or stolen, but it is rather inconvenient.

If someone breaks into my house, I've got bigger problems than someone getting their hands on my media collection. I think it would be more likely for me to mess something up and loose access to my data than for someone to steal it.

[-] jollyrogue@lemmy.ml 4 points 2 days ago

I do encrypt my drives, and it’s not as transparent in Linux as it is in the others. I’m sure I could get a TPM setup for seamless boots, but I haven’t done that yet.

For mobile drivers, I still encrypt, but that locks them to one OS since LUKS isn’t cross platform. There is VeraCrypt for cross-platform encryption, but that’s one more thing to manage and install.

[-] pfr@lemmy.sdf.org 6 points 3 days ago

No, I don't encrypt. I am a grown ass man and I rarely take my laptop out of my home. I don't have any sensitive data on my various machines. I do use secure and encrypted cloud services to store things that I consider a security risk. Everything else is useless to a potential intruder.

[-] pixeltree 13 points 3 days ago

Honestly... Why bother? If someone gains remote access to my system, an encrypted disk won't help. It's just a physical access preventer afaik, and I think the risk of that being necessary is very low. Encrypted my work computer because we had to and that environment also made it make more sense, I technically had sensitive customer info on it, though I worked at Oracle so of course they had to make it as convoluted and shitty as possible.

[-] data1701d@startrek.website 4 points 3 days ago

You're somewhat right in the sense that the point of disk encryption is not to protect from remote attackers. However, physical access is a bigger problem in some cases (mostly laptops). I don't do it on my desktop because I neither want to reinstall nor do I think someone who randomly breaks in is going to put in the effort to lug it away to their vehicle.

[-] pixeltree 3 points 3 days ago

Certainly didn't mean to say it's never useful, just not useful for me

load more comments (3 replies)
[-] shirro@aussie.zone 7 points 3 days ago* (last edited 3 days ago)

Most mobile/laptop devices should be encrypted by default. They are too prone to loss or theft. Even that isn't sufficient with border crossings where you are probably better off wiping them or leaving them behind.

My desktop has no valuable data like crypto, sits in a locked and occupied house in a small rural community with relatively low crime (public healthcare, social security, aging population). I have no personal experience of property theft in over half a decade.

I encrypt secrets with a hardware key. They are only accessed as needed. This is a much more appropriate solution than whole disk encryptiom for my circumstances. Encrypting Linux packages and steam libraries doesn't offer any practical benefit and unlocking my filesystem at login would not protect from network exfiltration which is a more realistic risk. It adds overhead.and another point of failure for no real benefit.

[-] Anonymouse@lemmy.world 4 points 2 days ago

I do on all my devices that can as a matter of practice, not for any real threat. I'm interested to learn about how to set it up and use it on a daily basis including how to do system recoveries. I guess it's largely academic.

Once I switched to linux as my daily driver, I didn't have a need to do piracy anymore since all the software I need is FOSS.

[-] utopiah@lemmy.ml 18 points 4 days ago* (last edited 4 days ago)

No.

I spend a significant amount of time on other things, e.g. NOT using BigTech, no Facebook, Insta, Google, etc where I would "volunteer" private information for a discount. I do lock the physical door of my house (most of the time, not always) and have a password ... but if somebody is eager and skilled enough to break in my home to get my disks, honestly they "deserve" the content.

It's a bit like if somebody where to break in and stole my stuff at home, my gadgets or jewelry. Of course I do not welcome it, nor help with it hence the lock on the front door or closed windows, but at some point I also don't have cameras, alarms, etc. Honestly I don't think I have enough stuff worth risking breaking in for, both physical and digital. The "stuff" I mostly cherish is relationship with people, skills I learned, arguably stuff I built through those skills ... but even that can be built again. So in truth I don't care much.

I'd argue security is always a compromise, a trade of between convenience and access. Once you have few things in place, e.g. password, 2nd step auth, physical token e.g. YubiKeyBio, the rest becomes marginally "safer" for significant more hassle.

load more comments (1 replies)
[-] giacomo@lemm.ee 42 points 4 days ago* (last edited 4 days ago)
load more comments (2 replies)
[-] hperrin@lemmy.ca 3 points 2 days ago

Yep. Everything except my server, which needs to be able to boot without my help. Because why not? I rarely ever reboot anything, so it doesn’t really hurt, and if anyone steals my shit they won’t get my wife’s noods.

[-] flork@lemy.lol 8 points 3 days ago

I wanted to but everyone on Lemmy told me I was an idiot for wanting a feature Mac and Windows have had for a decade (decrypt on login) .

But seriously it's just not there on Linux yet. Either you encrypt and have two passwords, or give up convenience features like biometrics. Anything sensitive lives somewhere else.

[-] isVeryLoud@lemmy.ca 8 points 3 days ago

You're an idiot, go back to macOS you fucking normie

(/s, I'm also waiting for TPM encryption + user home encryption)

[-] data1701d@startrek.website 4 points 3 days ago

Clevis pretty much does TPM encryption and is in most distros' repos. I use it on my Thinkpad. It would be nice if it had a GUI to set it up; more distros should have this as a default option.

You do have to have an unencrypted boot partition, but the issues with this can at least in be mitigated with PCR registers, which I need to set up.

[-] jollyrogue@lemmy.ml 2 points 2 days ago

How hard is clevis to setup?

I’ve seen it referenced for encrypted servers, but I haven’t tried setting it up.

Unencrypted boot is unfortunate. What are PCR registers?

[-] data1701d@startrek.website 2 points 2 days ago

(Note: Anything I say could be B.S. I could be completely misunderstanding this.)

Clevis isn’t too difficult to set up - Arch Wiki documents the process really well. I’ve found it works better with dracut that mkinitcpio.

As for PCR registers (which I haven’t set up yet but should), what I can tell, it sets the hash of the boot partition and UEFI settings in the TPM PCR register so it can check for tampering on the unencrypted boot partition and refuse to give the decryption keys if it does. That way, someone can’t doctor your boot partition and say, put the keys on a flash drive - I think they’d have to totally lobotomize your machine’s hardware to do it, which only someone who has both stolen your device and has the means/budget to do that would do.

You do need to make sure these registers are updated every kernel update, or else you’ll have to manually enter the LUKS password the next boot and update it then. I’m wondering if there’s a hook I can set up where every time the boot partition is updated, it updates PCR registers.

[-] MonkderVierte@lemmy.ml 17 points 4 days ago

No. I break my system occasionally and then it's a hassle.

[-] twinnie@feddit.uk 16 points 4 days ago

I don’t really see the point. If someone’s trying to access my data it’s most likely to be from kind of remote exploit so encryption won’t help me. If someone’s breaks into my house and steals my computer I doubt they’ll be clever enough to do anything with it. I guess there’s the chance that they might sell it online and it gets grabbed by someone who might do something, but most of my important stuff is protected with two factor authentication. It’s getting pretty far fetched that someone might be able to crack all my passwords and access things that way.

It’s far more likely that it’s me trying to recover data and I’ve forgotten my password for the drive.

[-] communism@lemmy.ml 23 points 4 days ago

I encrypt all my drives. Me and the people I know get occasionally raided by the police. Plus I guess also provides protection for nosy civilians who get their hands on my devices. Unlike most security measures, there is hardly any downside to encrypting your drives—a minor performance hit, not noticeable on modern hardware, and having to type in a password upon boot, which you normally have to do anyway.

load more comments (7 replies)
[-] Bananable@feddit.nl 15 points 4 days ago

My laptops are encrypted in case they get stolen or someone gets access to them at uni.

[-] Omega_Jimes@lemmy.ca 11 points 3 days ago

I used to, but it's proven to be a pain more often than a blessing. I'm also of the opinion that if a bad actor capable of navigating the linux file system and getting my information from it has physical access to my disk, it's game over anyway.

load more comments (2 replies)
[-] BrianTheeBiscuiteer@lemmy.world 23 points 4 days ago* (last edited 4 days ago)

I don't think I encrypt my drives and the main reason is it's usually not a one-click process. I'm also not sure of the benefits from a personal perspective. If the government gets my drives I assume they'll crack it in no time. If a hacker gets into my PC or a virus I'm assuming it will run while the drive is in an unencrypted state anyway. So I'm assuming it really only protects me from an unsophisticated attacker stealing my drive or machine.

Please educate me if I got this wrong.

Edit: Thanks for the counter points. I'll look into activating encryption on my machines if they don't already have it.

[-] JubilantJaguar@lemmy.world 26 points 4 days ago

is it’s usually not a one-click process

It is, these days. Ubuntu and Fedora, for example. But you still have to select it or it won't happen. PopOS, being explicitly designed for laptops, has it by default.

If the government gets my drives I assume they’ll crack it in no time.

Depends on your passphrase. If you follow best practice and go with, say, a 25-character passphrase made up of obscure dictionary words, then no, even a state will not be cracking it quickly at all.

If a hacker gets into my PC or a virus I’m assuming it will run while the drive is in an unencrypted state anyway.

Exactly. This is the weak link of disk encryption. You usually need to turn off the machine, i.e. lose the key from memory, in order to get the full benefits. A couple of consolations: (1) In an emergency, you at least have the option of locking it down; just turn it off - even a hard shutdown will do. (2) As you say, only a sophisticated attacker, like the police, will have the skills to break open your screenlocked machine while avoiding any shutdown or reboot.

Another, less obvious, reason for encrypting: it means you can sell the drive, or laptop, without having to wipe it. Encrypted data is inaccessible, by definition.

Encryption of personal data should be the default everywhere. Period.

load more comments (1 replies)
[-] PrefersAwkward@lemmy.world 18 points 4 days ago

A big benefit of encryption is that if your stuff is stolen, it adds a lot of time for you to change passwords and invalidate any signed in accounts, email credentials, login sessions, etc.

This is true even if a sophisticated person steals the computer. If you leave it wide open then they can go right in and copy your cookies, logins, and passwords way faster. But if it's encrypted, they need to plug your drive into their system and try to crack your stuff, which takes decent time to set up. And the cracking itself, even if it takes only hours, would be even more time you can use to secure your online accounts.

On Linux, my installs always had a checkbox plus a password form for the encryption.

load more comments (6 replies)
load more comments (2 replies)
[-] InFerNo@lemmy.ml 5 points 3 days ago

My drives are not encrypted because it's a hassle if things start going wrong. My NAS is software raid so the individual disks mean nothing anyway. The only drive that is encrypted is my backup disk and I'm not really sure if it was needed.

load more comments
view more: next ›
this post was submitted on 16 Jan 2025
163 points (100.0% liked)

Linux

49110 readers
621 users here now

From Wikipedia, the free encyclopedia

Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991 by Linus Torvalds. Linux is typically packaged in a Linux distribution (or distro for short).

Distributions include the Linux kernel and supporting system software and libraries, many of which are provided by the GNU Project. Many Linux distributions use the word "Linux" in their name, but the Free Software Foundation uses the name GNU/Linux to emphasize the importance of GNU software, causing some controversy.

Rules

Related Communities

Community icon by Alpár-Etele Méder, licensed under CC BY 3.0

founded 5 years ago
MODERATORS