this post was submitted on 16 Jan 2025
171 points (98.3% liked)

Linux

51180 readers
614 users here now

From Wikipedia, the free encyclopedia

Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991 by Linus Torvalds. Linux is typically packaged in a Linux distribution (or distro for short).

Distributions include the Linux kernel and supporting system software and libraries, many of which are provided by the GNU Project. Many Linux distributions use the word "Linux" in their name, but the Free Software Foundation uses the name GNU/Linux to emphasize the importance of GNU software, causing some controversy.

Rules

Related Communities

Community icon by Alpár-Etele Méder, licensed under CC BY 3.0

founded 5 years ago
MODERATORS
 

I was recently intrigued to learn that only half of the respondents to a survey said that they used disk encryption. Android, iOS, macOS, and Windows have been increasingly using encryption by default. On the other hand, while most Linux installers I've encountered include the option to encrypt, it is not selected by default.

Whether it's a test bench, beater laptop, NAS, or daily driver, I encrypt for peace of mind. Whatever I end up doing on my machines, I can be pretty confident my data won't end up in the wrong hands if the drive is stolen or lost and can be erased by simply overwriting the LUKS header. Recovering from an unbootable state or copying files out from an encrypted boot drive only takes a couple more commands compared to an unencrypted setup.

But that's just me and I'm curious to hear what other reasons to encrypt or not to encrypt are out there.

(page 3) 50 comments
sorted by: hot top controversial new old
[–] chronicledmonocle@lemmy.world 3 points 1 month ago

Every endpoint device I use is using full disk encryption, yes.

[–] bjwest@lemmy.ml 3 points 1 month ago (3 children)

I don't encrypt my entire drive, but I do have encrypted directories for my sensitive data. If I did encrypt an entire drive, it would only be the drive containing my data not the system drive.

load more comments (3 replies)
[–] potentiallynotfelix@lemmy.fish 2 points 1 month ago

Mostly I don't, but I want to start to. I only have one laptop encrypted and of course I keep my phones encrypted.

[–] merthyr1831@lemmy.ml 2 points 1 month ago

I don't but admittedly I don't do much stuff on my laptop that's super secure. it's mainly for gaming and the odd programming project.

[–] Laitinlok@lemmy.laitinlok.com 2 points 1 month ago

Yes because my distro also have encrypted /boot included

[–] KrispeeIguana@lemmy.ml 2 points 1 month ago

My issue is that I can never remember "a couple more commands" for the life of me. And I use Arch BTW, so the likelihood of me needing those is a bit higher than usual.

[–] yozul@beehaw.org 2 points 1 month ago

For my laptop, yeah. I rarely actually use it though. For my desktop not so much. I really don't keep that much personal information on it to begin with, and if someone breaks into my house they could probably get more by stealing the desk my computer is sitting on then by stealing the computer. It just feels like a silly thing to waste my time with.

[–] notarobot@lemm.ee 2 points 1 month ago

Yes. I have sensitive info in my PC (work credentials) and in the case of a break-in, last thing I want is to jeopardize my job.

[–] data1701d@startrek.website 2 points 1 month ago

I don't do it for my desktop because 1) I highly doubt my desktop would get stolen. 2) I installed Linux before I was aware of encryption, and don't have any desire to do a reinstall on my desktop at this time.

For my laptop, yes, I do (with exception of the boot partition), since it would be trivial to steal and this is a more recent install. I use clevis to auto-unlock the drive by getting keys from the TPM. I need to better protect myself against evil maids, though - luckily according to the Arch Wiki Clevis supports PCR registers.

[–] ilickfrogs@lemmy.world 2 points 1 month ago

I encrypt my desktop and laptop but not my servers. On desktop, that excludes drives that aren't my OS/boot drive.

[–] borari@lemmy.dbzer0.com 2 points 1 month ago

I don’t have FDE (BitLocker) enabled on my Windows 11 gaming PC. It sits in my house and has nothing on it but video games and video game related shit. I don’t even have my password manager installed for logging in to Steam, GoG or whatever other launcher. I manually type passwords in from the vault on my phone if the app doesn’t support QR code login like discord. Also I paid for this ridiculous m.2 nvme drive, I’m not going to just give up iops bc i want my game install files encrypted.

I don’t use FDE on my NAS. Again it doesn’t leave my house. I probably should I guess, bc there is some stuff on there that would cause me to have industry certs revoked if they leaked, but idk I don’t. Everything irreplaceable is backed up off site, but the down time it would take to rebuild my pirated media libraries from scratch vs just swapping disks and rebuilding has me leery.

I have FDE enabled on both my MacBooks. They leave the house with me, it seems to make sense.

I don’t use FDE on Linux VMs I create on the MacBooks, the disk is already encrypted.

My iphone doesn’t have the option to not use FDE I don’t think.

I use encrypted rsync backups to store NAS stuff in the cloud. I use a PGP key on my yubikey to further encrypt specific files on my MacBooks as required beyond the general FDE.

[–] savvywolf@pawb.social 2 points 1 month ago

I encrypt my home folder and Windows install just in case someone breaks into my house and steals my computer. Super annoying entering my password each boot though.

[–] NewOldGuard@hexbear.net 2 points 1 month ago

Yes absolutely, it is the building block of my security posture. I encrypt because I don’t want thieves to have access to my personal data, nor do I want law enforcement or the state to have access if they were to raid my house. I’m politically active and a dissident so I find it vital to keep my data secure and private, but frankly everybody should be doing it for their own protection and peace of mind

[–] Zorsith@lemmy.blahaj.zone 2 points 1 month ago

Of course, I'm paranoid and don't trust the US government. Or any government really. "First they came for _____" and all that; Id rather just tell them to pound sand immediately instead of get caught with my pants down.

[–] CsXGF8uzUAOh6fqV@lemmy.world 2 points 1 month ago* (last edited 1 month ago) (2 children)

I don't, I didn't do it back then and I ended up using this system for much longer than I thought I would(4+ years). I want to do it next time but I don't feel like reinstalling just for that.

load more comments (2 replies)
[–] boredsquirrel@slrpnk.net 2 points 1 month ago

Yes because it is one click

If I delete my drive, it is rubbish

It doesnt impact my performance much

[–] ocean@lemmy.selfhostcat.com 2 points 1 month ago (8 children)

I encrypt my laptop and desktops and I think it’s worth it. I regret encrypting my servers because they need passwords to turn on. I couldn’t figure out how to handle it when away.

[–] data1701d@startrek.website 3 points 1 month ago (1 children)

Do your servers have TPM? Clevis might be the way to go; I use it on my Thinkpad and it makes my life easy. If the servers don’t have TPM, Clevis also supports this weird thing called Tang, which from what I can tell basically assures that the servers can only be automatically decrypted on your local network. If Clevis fails, you can have it fall back to letting you enter the LVM password.

[–] ocean@lemmy.selfhostcat.com 2 points 1 month ago

I have not tried any of those three things: TPM, Clevis, or Tang. Thanks for recommending.

I tried to setup a keyfile on /, /boot, and /root.

I tried a keyfile on a usb

I also tried to use dropbear to allow ssh unlock.

Sadly these didn’t work and drove me crazy for two nights.

load more comments (7 replies)
load more comments