[a / b / c / d / e / f / g / gif / h / hr / k / m / o / p / r / s / t / u / v / vg / vm / vmg / vr / vrpg / vst / w / wg] [i / ic] [r9k / s4s / vip] [cm / hm / lgbt / y] [3 / aco / adv / an / bant / biz / cgl / ck / co / diy / fa / fit / gd / hc / his / int / jp / lit / mlp / mu / n / news / out / po / pol / pw / qst / sci / soc / sp / tg / toy / trv / tv / vp / vt / wsg / wsr / x / xs] [Settings] [Search] [Mobile] [Home]
Board
Settings Mobile Home
/g/ - Technology

Name
Options
Comment
Verification
4chan Pass users can bypass this verification. [Learn More] [Login]
File
  • Please read the Rules and FAQ before posting.
  • You may highlight syntax and preserve whitespace by using [code] tags.

08/21/20New boards added: /vrpg/, /vmg/, /vst/ and /vm/
05/04/17New trial board added: /bant/ - International/Random
10/04/16New board for 4chan Pass users: /vip/ - Very Important Posts
[Hide] [Show All]


[Advertise on 4chan]


File: 1752487908152702.png (668 KB, 531x897)
668 KB
668 KB PNG
Is encrypting specific directories better than full-disk encryption?
>>
>>108503143
>is x better than y
better how? what are your criterions?
>>
>>108503143
>is leaking metadata better than not leaking metadata?
>yellow fever
>>
>>108503143
>is encrypting less better than encrypting more?
>>
it's worse but it can be good enough
>>
>>108503143
no, but do both
>>
>>108503143
best solution right now
>tpm/secure boot based root encryption with automatic unlocking with secure boot enabled.
>user home directories encrypted with systemd-homed, automatic decryption with user password
completely transparent and fully encrypted.
>>
MODS
>>
>>108503143
depends, as usual, on your goals
the problem will full-disk is that once the machine is on the key is in memory and then all the usual attacks on your OS/software apply whereas with specific encryption an attack on that may only give you access to ciphertext
although there's little argument against both full-disk and then specific encryption unless you're trying to hide the fact that you're using encryption at all
>>
>>108503143
>irrelevant time-wasting question
>lust provoking image
>>
>>108503143
self-encrypted drives with ext4
>>
>>108503604
Alpine's wiki has a guide for steganographically embedding one os into another.
>>
>>108503218
>criterions
Retard
>>
>>108503604
I vaguely remember reading that even with FDE (with or without encrypted /boot on a USB along with its LUKS headers), there are still indicators that imply there being an encrypted OS on a drive instead of it being just a drive secure erased with random data. This applies to plain mode as well. I remember one of the points being in relation to the partition table being an indication.

I have no use case for that level of obscurity, but it's still interesting to read about.
>>
>>108503369
The password in question? 1234 of course.
>>
>>108504036
Shut the fuck up. Don't bully him. He's under my protection and you are going to address him with respect.
>>
>>108503143
I'd encrypt her full-disk if you get what I mean.
>>
File: 1759785377471366.jpg (180 KB, 1242x1428)
180 KB
180 KB JPG
>>108503143
you should be using full disk encryption on everything that is the default. use specific folder/file/archive encryption on top of that if you handle sensitive information like crypto encryption keys,personal shit,extralegal recreational narcotics related shit .... in case you suspect someone would try to snatch your pc from you while the entire drive is decrypted


a better idea for this if you actually handle sensitive shit you want encrypted is to just install tails os on a usb drive and keep the sensitive shit on there and only insert+decrypt it when you need it
>>
>>108504036
>I'm a fag who randomly switches to latin grammar for literally NO FUCKING REASON
I'm glad your datums are being harvested by this website
>>
>>108504796
let the EOP mutt have fun for gods sake



[Advertise on 4chan]

Delete Post: [File Only] Style:
[Disable Mobile View / Use Desktop Site]

[Enable Mobile View / Use Mobile Site]

All trademarks and copyrights on this page are owned by their respective parties. Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.