#diskencryption

Lucas de Senaseninha@bsd.network
2025-04-27

OpenBSD users, can you tell me your experience of full-disk encryption on a SSD?

Is the encryption overhead noticiable compared to plain SSD? Or is it as slow as HDD?
How often have you lost files due to a poweroff letting your partition on an inconsistent state?

#openbsd #ssd #fde #DiskEncryption

Feikefjelle
2025-02-25

@darkling @nicholasr @nixCraft does indeed support swap files, they problebly work fine, they are just very unorthodox and therefore difficult to setup.

The swap file you would use if you want , in theory at least...
brings mé more issues than what's worth!

2025-02-13

#Linux folks who #encrypt; Do you encrypt everything, or just your /home partition?

#Poll #Linux #DiskEncryption #Encryption

Guillaume LouvelGullumLuvl@ecoevo.social
2025-01-06

From #Debian 13, would you use VeraCrypt or ZuluCrypt to create an encrypted disk accessible from any OS ?

Veracrypt hasn't released a .deb yet for Debian 13, so the generic installer must be used. Not sure how well it's supposed to work.

#DiskEncryption #VeraCrypt

Fossery Tech :debian: :gnome:fosserytech@social.linux.pizza
2024-11-24

My new video about VeraCrypt just released on @tilvids
From this video, you can get familiar with VeraCrypt, the encryption technology it uses, and how you can use it to create file containers and encrypted partitions

tilvids.com/w/9dA17zsidWVMU5eH

#VeraCrypt #Encryption #DiskEncryption #Security #TechVideo #OpenSource #OpenSourceSoftware #FOSS #ContentCreator #FosseryTech

2024-11-24
2024-10-28

So. Linux 🐧

My PC runs Linux (Fedora) and with the current gen Hardware in it the ancient old Question pops up again: Full Disk Encryption or not?

At least some ciphers should be HW-accellerated (AES-SNI). But then there is the hassle of entering the password. And the annoyance.

But on the other side...

What do you guys think?

#linux #encrypt #encryption #diskencryption #security #admin

2024-07-05

"A swap file can be used to reserve swap-space within an existing partition & may also be setup inside an encrypted blockdevice's partition."
So all I had to do is make sure swap file is setup in fstab & just point all resume=UUID= to the UUID of primary partition where the #swap file is & that is it. my brain exploded🤯 from how easy it was.
p.s. reminder to anyone doing #LUKS it is only as good as the password you pick so pick something good!
#CryptSetup #Linux #LVM #hibernate #DiskEncryption

2024-07-05

Long ago when I was installing #Kali #Linux on my #Dell Latitude E5570 #Laptop
I went with LVM on LUKS wiki.archlinux.org/title/dm-cr
& at the time I thought I'd go with a swap file on / (I was unaware of Swap crypt🙄)
I was never able to get hibernate to work, until now😀...
Let me say many websites & forums all say if you want hibernate to work on LUKS, you have to go with swap crypt.
Not true, if you read wiki.archlinux.org/title/Dm-cr
#CryptSetup #LVM #LUKS #SWAP #hibernate #DiskEncryption

スパックマン クリスchris_spackman@twit.social
2023-06-21

Thanks for all the suggestions and links.

I will try putting a new / temporary key into the initramfs just for while I am out of town - the chance of power outage is higher than the chance of burglary.

I'll remove the temp key and rebuild the initramfs after I get back home. Normally, I'm in front of the computer when it reboots, so entering the password manually (as I've been doing for a few years) is fine.

#DMCrypt #DiskEncryption #Linux

スパックマン クリスchris_spackman@twit.social
2023-06-20

Is there a good way to have a #Linux server reboot unattended when the root partition is dm_crypt encrypted? I'm not super worried about bad guys being physically present. More just worried that a power outage might initiate a reboot while I am not present.

Is including the key file in the initramfs (correct terminology?) that horrible a thing if physical access to the machine is not a concern?

Thoughts or advice?

#DMCrypt #DiskEncryption

2023-02-13

(1/2)

#Linux #DiskEncryption I want to check that I'm thinking about this in a way that makes sense. Context is a laptop with a #LUKS partition.

I see a lot of how-to articles floating around about using #tpm2 for LUKS decryption on device boot.
I understand that this gives convenience over a separate passphrase for decryption and still prevents:

An adversary from removing the hard drive when your machine is off and decrypting it (because the adversary won't have the TPM to decrypt).
An adversary from modifying anything in the secure boot chain and accessing a decrypted drive (because the device will then refuse to boot and decrypt the LUKS partition).

OPSEC Cybersecurity News LiveOpsecNews@aspiechattr.me
2023-01-11

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst