You are not logged in.
I am looking to encrypt my data. I'd rather not encrypt my /home partition (or any other partition) and stick with a container that I can hide inside it. Truecrypt comes to mind, but I know there are other solutions out there like eCryptFS and loop-AES (I have used the latter a few years back for full-disk encryption).
I was just wondering if Truecrypt is the way to go, or if there are any better solutions for this setup? I already use GnuPG for ad-hoc file encryption, but using it to encrypt whole directories would be rather cumbersome I imagine .
Got Leenucks? :: Arch: Power in simplicity :: Get Counted! Registered Linux User #392717 :: Blog thingy
Offline
I use ecryptfs as per the wiki and then wrote a simple script like this to deal with my ~/Private folder when I need to encrypt something:
#
# Script to make creation of encrypted files easier.
# L. G. Gagnon, Nov 2010
#
#this line 6 below does not act as planned
ans=`zenity --entry --hide-text --text="Enter your encryption passphrase now."`
echo $ans | ecryptfs-add-passphrase
mount -i /home/larry/Private
zenity --info --text="About to launch file manager.\nMove files you wish to encrypt to the Private directory.\nWhen done exit file manager to encrypt and unmount."
xfe /home/larry/Private
umount -i /home/larry/Private
exit 0
Philosophy is looking for a black cat in a dark room. Metaphysics is looking for a black cat in a dark room that isn't there. Religion is looking for a black cat in a dark room that isn't there and shouting "I found it!". Science is looking for a black cat in a dark room with a flashlight.
Offline
Maybe my information is out of date, but the last I heard, Truecrypt has some minor security flaws.
A solution that comes to mind would be to create an encrypted partition using LUKS + LVM, which you mount in your home directory using a crypttab.
However, I'm under the impression that this also creates information leaks (eg think about what's going in /tmp and /var), and really the safest bet is to use full disk encryption with only /boot left unencrypted.
Last edited by /dev/zero (2011-11-18 00:30:53)
Offline
I've used encfs. It uses fuse for the filesystem interface and acts very much like an encrypted directory – growing and shrinking on demand.
I was happily impressed with how simple it is to use: you don't have to be root to create an encrypted container and it's layered on top of the existing filesystem, meaning no reformatting or setting up a separate partition.
It doesn't hide files should someone get their hands on your PC, but they won't be able to read the encrypted file or determine a stored file's unencrypted name.
Offline
Not sure if this is exactly what you want but you could look at using "Elettra" ( http://www.winstonsmith.info/julia/elettra/ ) and have a large container with all your private files stored inside with jumble of static-like padding filling the gaps, where each or all files have a certain password to extract the desired (single, group, or all) file(s) from the container. This should create what's called a "plausible deniability" because there's no telling what's actually data and what's just jumble inside the container, also helped with compression. The website and docs detail it much better (with different methods of storing, etc), and will also show whether or not it's something you want to try. This method of "plausible deniability" is better suited for pro-active defense when faced with real-life opposition as opposed to remote intrusion, I think so. I still prefer loop-AES for external drives and partitions, but it's getting harder to maintain a loop-AES (losetup) system especially with all the GIT updates going on. AFAIK, it's one of the best encryption methods (which I think we've discussed before). Anyway, (*disappears*)
Offline
Thanks guys, I'll look into those.
/dev/zero: I was afraid of Truecrypt having some problems. Nevertheless fully encrypting the whole disk seems to be a bit overkill for what I'm trying to achieve - the main goal is my data being safe when my laptop gets lost or stolen, not when it's active.
Got Leenucks? :: Arch: Power in simplicity :: Get Counted! Registered Linux User #392717 :: Blog thingy
Offline
Ha, so paranoia kicks in again
When it comes to security -- the simpler the better. I just use gpg to encrypt text/pdf/tar.xz files.
Also, don't forget email passwords. For instance, if you have thunderbird/claws your passwd is stored in MD5 form in .mozilla/.claws dir. IMHO this is security-by-obscurity because anyone could rip-off the decoding code (it's OSS) and use it to extract passwords. The only software, to my knowledge, which interfaces with gpg on-the-fly is msmtp, so you can store your password in an encrypted file.
Last edited by Leonid.I (2011-11-18 17:19:58)
Arch Linux is more than just GNU/Linux -- it's an adventure
pkill -9 systemd
Offline
i'm using http://www.arg0.net/encfs
Offline
I use ecryptfs with the Private folder automatically mounted when I login. I symlink things like Firefox and Thunderbird to it. I backup /home with encfs.
Ryzen 9 5950X, X570S Aorus Pro AX, RX 6600, Arch x86_64
Offline