You are not logged in.
Hi everyone,
I have 1 TB portable that I carry around with me for work related stuff. It holds accounting files, VMs, proprietary market data and the like. I have it formatted ext4 currently and no encryption. I've read that a journaling FS can leave an encrypted partition/drive vulnerable. I'm curious to know how any of you encryption buffs would handle this use case. I used truecrypt years ago and I know it was forked to veracrypt, is this the best way to go? Should I reformat with something like EncFS? My external HD has built in AES256 codec hardware. Should I do a veracrypt container? I'm not to concerned with needing plausible deniability or anything since I'm not walking around with super secret james bond shit. I mostly want to encrypt so if some sleeze bag swipes my HD they won't be able to see anything, and secondarily if a competitor swipes my HD their ITSec people will be really annoyed for a really long time. Thanks for your input.
Last edited by bangme (2016-06-30 23:19:25)
Offline
Journaling can lead to vulnerabilities only if you encrypt individual files/folders, not the entire block device.
The standard way to handle this is with dm-crypt.
Offline
Journaling can lead to vulnerabilities only if you encrypt individual files/folders, not the entire block device.
The standard way to handle this is with dm-crypt.
Fantastic, thank you!
Offline
+1 for dm-crypt. Very mature and stable and the wiki has all you know to know.
Last edited by graysky (2016-06-30 23:15:09)
CPU-optimized Linux-ck packages @ Repo-ck • AUR packages • Zsh and other configs
Offline