this post was submitted on 28 Sep 2023
61 points (91.8% liked)
Linux
48318 readers
1139 users here now
From Wikipedia, the free encyclopedia
Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991 by Linus Torvalds. Linux is typically packaged in a Linux distribution (or distro for short).
Distributions include the Linux kernel and supporting system software and libraries, many of which are provided by the GNU Project. Many Linux distributions use the word "Linux" in their name, but the Free Software Foundation uses the name GNU/Linux to emphasize the importance of GNU software, causing some controversy.
Rules
- Posts must be relevant to operating systems running the Linux kernel. GNU/Linux or otherwise.
- No misinformation
- No NSFW content
- No hate speech, bigotry, etc
Related Communities
Community icon by Alpár-Etele Méder, licensed under CC BY 3.0
founded 5 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
You can setup FDE that utilizes TPM like Windows does with bitlocker, in such a way that your backup phrase is only necessary if something about your hardware changes.
Last I set it up however, there wasn't any easy/automatic way. Searching "luks TPM" should get you started.
I've been using this guide for ages.
https://fedoramagazine.org/automatically-decrypt-your-disk-using-tpm2/
I need more than data security at rest. Reading out the keys from ram is well within my threat model.
In that case systemd won't help you either.
Care to elaborate why? I thought that systemd can encrypt your home partition when locking your device.
When locking the device sure, but you could achieve a higher level of security by turning off the machine, or using hibernate with encrypted swap. Boot on my machine with FDE and an NVME sad literally takes seconds anyway...
Haha are you serious? In that case nothing short of full disk encryption and secure boot with your own keys is remotely adequate. Do you realize, that just encrypting your /home is at most a mild obscurity measure? If an attacker has potentially access to your computer and parts of it are unencrypted or unsigned, they could easily install a keylogger that sends out your data and/or password the next time you use your computer?!
If your situation is not just a psychological case of paranoia, but a real threat, then you absolutely need to work on your security knowledge a good amount!
I don't really hppreciate your tone. Could you be a little less of a dick, please?
Keyloggers aren't in my threat model (i.e.: they aren't in the MO of my potential attackers).