I was recently intrigued to learn that only half of the respondents to a survey said that they used disk encryption. Android, iOS, macOS, and Windows have been increasingly using encryption by default. On the other hand, while most Linux installers I’ve encountered include the option to encrypt, it is not selected by default.

Whether it’s a test bench, beater laptop, NAS, or daily driver, I encrypt for peace of mind. Whatever I end up doing on my machines, I can be pretty confident my data won’t end up in the wrong hands if the drive is stolen or lost and can be erased by simply overwriting the LUKS header. Recovering from an unbootable state or copying files out from an encrypted boot drive only takes a couple more commands compared to an unencrypted setup.

But that’s just me and I’m curious to hear what other reasons to encrypt or not to encrypt are out there.

  • ipkpjersi@lemmy.ml
    link
    fedilink
    arrow-up
    8
    ·
    edit-2
    5 days ago

    I used to, but not anymore, except for my laptop I plan on taking with me travelling. My work laptop and personal laptop are both encrypted.

    I figure my home is safe enough, and I only really need encryption if I’m going to be travelling.

    One of my friends locked himself out of his PC and all his data because he forgot his master password, and I don’t want to do that myself lol

  • utopiah@lemmy.ml
    link
    fedilink
    arrow-up
    19
    ·
    edit-2
    6 days ago

    No.

    I spend a significant amount of time on other things, e.g. NOT using BigTech, no Facebook, Insta, Google, etc where I would “volunteer” private information for a discount. I do lock the physical door of my house (most of the time, not always) and have a password … but if somebody is eager and skilled enough to break in my home to get my disks, honestly they “deserve” the content.

    It’s a bit like if somebody where to break in and stole my stuff at home, my gadgets or jewelry. Of course I do not welcome it, nor help with it hence the lock on the front door or closed windows, but at some point I also don’t have cameras, alarms, etc. Honestly I don’t think I have enough stuff worth risking breaking in for, both physical and digital. The “stuff” I mostly cherish is relationship with people, skills I learned, arguably stuff I built through those skills … but even that can be built again. So in truth I don’t care much.

    I’d argue security is always a compromise, a trade of between convenience and access. Once you have few things in place, e.g. password, 2nd step auth, physical token e.g. YubiKeyBio, the rest becomes marginally “safer” for significant more hassle.

    • netvor@lemmy.world
      link
      fedilink
      arrow-up
      3
      arrow-down
      1
      ·
      6 days ago

      but if somebody is eager and skilled enough to break in my home to get my disks, honestly they “deserve” the content.

      The problem with “my disks” is there’s always some other’s people on it, in one way or another.

      But of course, it’s your call. We all have gaps in our “walls” and it’s not like I’d be pretending that LUKS is all that matters.

  • twinnie@feddit.uk
    link
    fedilink
    arrow-up
    16
    ·
    7 days ago

    I don’t really see the point. If someone’s trying to access my data it’s most likely to be from kind of remote exploit so encryption won’t help me. If someone’s breaks into my house and steals my computer I doubt they’ll be clever enough to do anything with it. I guess there’s the chance that they might sell it online and it gets grabbed by someone who might do something, but most of my important stuff is protected with two factor authentication. It’s getting pretty far fetched that someone might be able to crack all my passwords and access things that way.

    It’s far more likely that it’s me trying to recover data and I’ve forgotten my password for the drive.

  • Jediwan@lemy.lol
    link
    fedilink
    arrow-up
    9
    ·
    6 days ago

    I wanted to but everyone on Lemmy told me I was an idiot for wanting a feature Mac and Windows have had for a decade (decrypt on login) .

    But seriously it’s just not there on Linux yet. Either you encrypt and have two passwords, or give up convenience features like biometrics. Anything sensitive lives somewhere else.

      • data1701d (He/Him)@startrek.website
        link
        fedilink
        English
        arrow-up
        5
        ·
        6 days ago

        Clevis pretty much does TPM encryption and is in most distros’ repos. I use it on my Thinkpad. It would be nice if it had a GUI to set it up; more distros should have this as a default option.

        You do have to have an unencrypted boot partition, but the issues with this can at least in be mitigated with PCR registers, which I need to set up.

        • jollyrogue@lemmy.ml
          link
          fedilink
          arrow-up
          2
          ·
          5 days ago

          How hard is clevis to setup?

          I’ve seen it referenced for encrypted servers, but I haven’t tried setting it up.

          Unencrypted boot is unfortunate. What are PCR registers?

          • data1701d (He/Him)@startrek.website
            link
            fedilink
            English
            arrow-up
            2
            ·
            5 days ago

            (Note: Anything I say could be B.S. I could be completely misunderstanding this.)

            Clevis isn’t too difficult to set up - Arch Wiki documents the process really well. I’ve found it works better with dracut that mkinitcpio.

            As for PCR registers (which I haven’t set up yet but should), what I can tell, it sets the hash of the boot partition and UEFI settings in the TPM PCR register so it can check for tampering on the unencrypted boot partition and refuse to give the decryption keys if it does. That way, someone can’t doctor your boot partition and say, put the keys on a flash drive - I think they’d have to totally lobotomize your machine’s hardware to do it, which only someone who has both stolen your device and has the means/budget to do that would do.

            You do need to make sure these registers are updated every kernel update, or else you’ll have to manually enter the LUKS password the next boot and update it then. I’m wondering if there’s a hook I can set up where every time the boot partition is updated, it updates PCR registers.

  • shirro@aussie.zone
    link
    fedilink
    English
    arrow-up
    7
    ·
    edit-2
    6 days ago

    Most mobile/laptop devices should be encrypted by default. They are too prone to loss or theft. Even that isn’t sufficient with border crossings where you are probably better off wiping them or leaving them behind.

    My desktop has no valuable data like crypto, sits in a locked and occupied house in a small rural community with relatively low crime (public healthcare, social security, aging population). I have no personal experience of property theft in over half a decade.

    I encrypt secrets with a hardware key. They are only accessed as needed. This is a much more appropriate solution than whole disk encryptiom for my circumstances. Encrypting Linux packages and steam libraries doesn’t offer any practical benefit and unlocking my filesystem at login would not protect from network exfiltration which is a more realistic risk. It adds overhead.and another point of failure for no real benefit.

  • pixeltree@lemmy.blahaj.zone
    link
    fedilink
    arrow-up
    13
    arrow-down
    3
    ·
    6 days ago

    Honestly… Why bother? If someone gains remote access to my system, an encrypted disk won’t help. It’s just a physical access preventer afaik, and I think the risk of that being necessary is very low. Encrypted my work computer because we had to and that environment also made it make more sense, I technically had sensitive customer info on it, though I worked at Oracle so of course they had to make it as convoluted and shitty as possible.

    • data1701d (He/Him)@startrek.website
      link
      fedilink
      English
      arrow-up
      4
      ·
      6 days ago

      You’re somewhat right in the sense that the point of disk encryption is not to protect from remote attackers. However, physical access is a bigger problem in some cases (mostly laptops). I don’t do it on my desktop because I neither want to reinstall nor do I think someone who randomly breaks in is going to put in the effort to lug it away to their vehicle.

    • kixik@lemmy.ml
      link
      fedilink
      arrow-up
      2
      ·
      6 days ago

      Can you explain why if someone get access to your encrypted disk, they would have access to its contents?

      • pixeltree@lemmy.blahaj.zone
        link
        fedilink
        arrow-up
        6
        ·
        6 days ago

        If someone can execute arbitrary code on my computer, it doesn’t matter that the disk is encrypted, because I’ve already booted the machine up and entered the key. I’m certainly not the most cryptographically knowledge but using LUKS on Oracle Linux, I’d enter the key once while starting up, past that point there was no difference between an encrypted and unencrypted system. It seems logical to me, then, that if something can execute arbitrary code, it’s after that point, so encryption won’t matter to it. Encryption is more of a solution to someone physically obtaining your hard drive and preventing them from having access to the contents simply by plugging it into their system.

        Or at least that’s my understanding, please correct me if I’m mistaken.

        • kixik@lemmy.ml
          link
          fedilink
          arrow-up
          2
          ·
          5 days ago

          Well, I think you already mentioned the key thing about encrypting disks. It’s not about protections when the block device is already decrypted and the filesystem already mount. At that point your disks are decrypted and anyone with or without physical access to your device, if gaining any access to it you’re toast. That’s true, but that’s not what disks encryption help you with, and you already mentioned. If you turn off your device, and someone steals it, or gains access to it, they can’t look at your contents, that’s it. That wouldn’t prevent malicious people, to instead plant something through UEFI for example, and you are right about that case. And if you never turn off your computer, and just do sleep to memory, then you depend on how strong your password is, or any other authentication mechanism you have…

  • Omega_Jimes@lemmy.ca
    link
    fedilink
    arrow-up
    11
    arrow-down
    1
    ·
    6 days ago

    I used to, but it’s proven to be a pain more often than a blessing. I’m also of the opinion that if a bad actor capable of navigating the linux file system and getting my information from it has physical access to my disk, it’s game over anyway.

    • ShortN0te@lemmy.ml
      link
      fedilink
      arrow-up
      3
      ·
      6 days ago

      I’m also of the opinion that if a bad actor capable of navigating the linux file system and getting my information from it has physical access to my disk, it’s game over anyway.

      I am sorry but that is BS. Encryption is not easy to break like in some Movies.

      If you are referring to that a bad actor breaks in and modifies your hardware with for example a keylogger/sniffer or something then that is something disk encryption does not really defend against.

      • Omega_Jimes@lemmy.ca
        link
        fedilink
        arrow-up
        7
        ·
        6 days ago

        That’s more what I mean. They won’t break the encryption, but at that point with physical access to my home/ computer/ servers, I have bigger problems.

        There’s very little stored locally that could be worse than a situation where someone has physical access to my machine.

  • Anonymouse@lemmy.world
    link
    fedilink
    English
    arrow-up
    4
    ·
    5 days ago

    I do on all my devices that can as a matter of practice, not for any real threat. I’m interested to learn about how to set it up and use it on a daily basis including how to do system recoveries. I guess it’s largely academic.

    Once I switched to linux as my daily driver, I didn’t have a need to do piracy anymore since all the software I need is FOSS.

  • mvirts@lemmy.world
    link
    fedilink
    arrow-up
    3
    ·
    5 days ago

    I don’t encrypt because it’s too much effort to learn about it.

    Id rather keep my filesystem unencrypted so that I can easily recover from problems and encrypt important files as needed, but let’s be real I don’t do that either.

  • Uiop@lemmy.dbzer0.com
    link
    fedilink
    arrow-up
    12
    ·
    7 days ago

    i’d really like to. but there is ONE big problem:

    Keyboard layouts.

    seriously

    I hate having to deal with that. when I set up my laptop with ubuntu, I tried at least 3 thymes to make it work, but no matter what I tried I was just locked out of my brand-new system. it cant just be y and z being flipped, I tried that, maybe it was the french keyboard layout (which is absolutely fucked) or something else, but it just wouldnt work.

    On my mint PC I have a similar problem with the default layout having weird extra keys and I just sort of work around that, because fuck dealing with terminals again. (when logged in it works, because I can manually change it to the right one.)

    Now I do have about a TerraByte of storage encrypted, just for the… more sensitive stuff…

    While dealing with the problems I stumbled across a story of a user who had to recover their data using muscle-memory, a broken keyboard, the same model of keyboard and probably a lot of patience. good luck to that guy.

    • herrvogel@lemmy.world
      link
      fedilink
      arrow-up
      3
      ·
      6 days ago

      Have you tried peppermint or maybe coriander?

      Jokes aside, I believe the password entry stage is before any sort of localization happens, meaning what your keyboard looks like doesn’t matter and the input language defaults to English. You have to type as if you’re using an English keyboard. That’s hardly a good solution if you’re unfamiliar with that layout of course.

      • fossphi@lemm.ee
        link
        fedilink
        English
        arrow-up
        2
        ·
        6 days ago

        Initrd has support to configure the keyboard layout used. Consult your initrd generator’s documentation for this

  • Mwa@lemm.ee
    link
    fedilink
    English
    arrow-up
    9
    ·
    7 days ago

    I don’t wanna risk losing anything on the drive thats important .

    • gandalf_der_12te@discuss.tchncs.de
      link
      fedilink
      arrow-up
      5
      ·
      6 days ago

      May i suggest a technique for remembering the password?

      write it down

      but instead of writing down the password, write down questions that only you can reasonably answer. For example:

      • what was the name of the first girl i kissed?
      • where did i go to on summer camp?
      • which special event happened there?

      and the answer would be: “mary beach rodeo” or idk what. this way, you construct a password out of multiple words that each are an answer to a simple question.

      • EveryMuffinIsNowEncrypted@lemmy.blahaj.zone
        link
        fedilink
        English
        arrow-up
        7
        arrow-down
        1
        ·
        edit-2
        7 days ago

        That is a good reason to backup

        This is true.

        but has nothing to do with encryption.

        I disagree with this. If you forget the password for decrypting your drive, then you will have lost “anything on the drive that’s important”. I know because it happened to me long ago, and so now I too have been wary of disk encryption ever since then.

        • Quazatron@lemmy.world
          link
          fedilink
          arrow-up
          2
          arrow-down
          1
          ·
          6 days ago

          Encryption and backup are orthogonal domains. If you don’t understand why, I’m sure you’re not going to take a random strangers’ opinion on the subject.

          • utopiah@lemmy.ml
            link
            fedilink
            arrow-up
            2
            ·
            6 days ago

            Mind expanding just a bit through? IMHO it’s not orthogonal in the sense that either your backups are :

            • unencrypted and thus your is are safe (you have copies you can access despite losing your keys) but not secure (someone else can read the content too)
            • encrypted and thus your data is NOT safe if you lose your keys but secure

            Isn’t it?

            • netvor@lemmy.world
              link
              fedilink
              arrow-up
              1
              ·
              6 days ago

              TBH even the way you phrased your question kind of proves it’s orthogonal. Yes, you can have the full matrix:

              encrypted | backed up
              ----------|----------
                     no |        no
                     no |       yes
                    yes |        no
                    yes |       yes
              

              In each case, you have a different set of problems.

              • Encrypting a particular medium only means that it’s going to be harder to gain access to the data on that medium (harder for everyone, but trillions of less harder for someone who knows the password.
                • That’s regardless of whether you also have a backup.
              • Backing up just means that a copy of the data exists somewhere else.
                • That’s regardless of whether this or the other copy is encrypted.

              Sure, eventually, the nature of your data’s safety will be affected by both.

              Disclaimer: I’m by no means a security expert, don’t take what I write here as advice!

              Eg. I encrypt my disks. When I do, I basically encrypt everything, ie. all partitions (except /boot). Then on those partitions, most of the data is not worth backing up since it’s either temporary or can be easily obtained anyway (system files). Well, some of the data is backed up, and some of that even ends up on disks that are not encrypted (scary, I know!) :)

              To be fair, just encrypting the disks does not solve all. If someone broke to my house, they would with almost 100% chance find my computer on, which means that the disks are not encrypted (technically still are, just that LUKS provides unencrypted versions as well…) So the barrier they would have to face would be basically just the desktop lock.

              For that reason I don’t encrypt hard drives on my remote server, since the server is always running in a virtual environment so by definition anyone who’s maintaining the hardware can already open files from the unencrypted drives, ie. I think it would be pointless.

            • Quazatron@lemmy.world
              link
              fedilink
              arrow-up
              1
              ·
              6 days ago

              I keep backups (regular, incremental, remote) to keep my data safe in case something happens to my local data. This protects me from things like theft, hardware failure, accidental deletion of some important files. Having multiple generations (daily, weekly, monthly) will protect me when I delete some files and only realize weeks later.

              All of this is a separated issue to having encryption or not. I encrypt both local and backup copies, and store the keys in a password manager.

              See what works for you, but don’t confuse the issues.

      • Mwa@lemm.ee
        link
        fedilink
        English
        arrow-up
        5
        ·
        7 days ago

        I meant if I lose my encryption key I lose the data on the disk.

        • mholiv@lemmy.world
          link
          fedilink
          arrow-up
          2
          arrow-down
          1
          ·
          7 days ago

          That is a good reason to backup, but has nothing to do with encryption.

          (For real though I have a backup of all of my drive LUKS headers stored on several media types on and off site.)

          • keegomatic@lemmy.world
            link
            fedilink
            arrow-up
            1
            ·
            6 days ago

            How would backing up help with that, though, assuming the backups are also encrypted?

            I meant if I lose my encryption key I lose the data on the disk.

            If they lose the key they lose the data in the backups, too. So that concern is not a good reason to backup, in my eyes.

            Then, if the backups are not encrypted, then doesn’t that undermine the value of encrypting your drive/user data partition in the first place?

            • mholiv@lemmy.world
              link
              fedilink
              arrow-up
              1
              ·
              6 days ago

              Just backup the LUKs header files. No need to encrypt them as they’re inherently secure as the hard drives they would originally reside on.

  • ReakDuck@lemmy.ml
    link
    fedilink
    arrow-up
    7
    ·
    edit-2
    6 days ago

    Its that simple.

    I can expand my own creativity and store every thought and creative Art, without anybody being able to find out after my death or while someone raids me.

    Maybe I stored an opinion against some president, and maybe the government changed its working, which allows police to raid someone for little suspection.

    You never know if you ever have something to hide. While things are okay now and today, it might be highly illegal tomorrow.

    Those are ideas. But generally its only about the feeling of privacy.

  • sudoer777@lemmy.ml
    link
    fedilink
    arrow-up
    3
    ·
    edit-2
    6 days ago

    Asahi Linux doesn’t support encryption and getting it to work requires a lot of steps and that I reinstall it which I don’t have time for, so I don’t have it enabled on my laptop, and if it gets stolen or confiscated I’m fucked.

    I have it enabled on my server and phone.