this post was submitted on 30 Nov 2023
0 points (NaN% liked)
Linux
48021 readers
953 users here now
From Wikipedia, the free encyclopedia
Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991 by Linus Torvalds. Linux is typically packaged in a Linux distribution (or distro for short).
Distributions include the Linux kernel and supporting system software and libraries, many of which are provided by the GNU Project. Many Linux distributions use the word "Linux" in their name, but the Free Software Foundation uses the name GNU/Linux to emphasize the importance of GNU software, causing some controversy.
Rules
- Posts must be relevant to operating systems running the Linux kernel. GNU/Linux or otherwise.
- No misinformation
- No NSFW content
- No hate speech, bigotry, etc
Related Communities
Community icon by Alpár-Etele Méder, licensed under CC BY 3.0
founded 5 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
In that case, without encryption, your safety is zero. That's the exact scenario that full-drive encryption was designed for.
Well... shit. Thank you for your great advice. I'm gonna look for how I can secure my data.
Out of curiosity what sort of safety did you think an unencrypted hard drive had?
I mean no offense and I think it's a perfectly fine question to ask, I just want to understand what you expected.
I had the expection that Linux is already set up as a multi-user environment and has that feature built in.
Of course that "isolation" of data, as I had it in my mind, wouldn't be really secure, but it doesn't have to be that for me. I just don't want anyone to access it easily.
Simplified, there's two layers to data protection, physical and logical. Linux or basically any correctly configured modern operating system provides logical protection, i.e. access under the running OS is only granted to authorized users. Granted you can still put holes in here, e.g. a webserver is misconfigured and allows access to any user to all files it can read. However, from the OS perspective, everything is fine, as the webserver can still only read what it's allowed to.
Data encryption protects data at rest, i.e. when no operating system enforcing the logical protection is running. The case has already been described so I'm not gonna repeat that here.
It's important to understand that in general, these two measures are completely seperate from each other. Device encryption won't help against logical attacks, and logical protection won't help against offline attacks. You need both if you can't rule out an attack vector completely (i.e. your server sits in a secure safe that can't be opened by anyone not authorized to, then encryption might not be necessary).
No poorly not. Just as Windows by default. Systemd-homed is a solution for that but afaik its questionable if its ready. Would be great if Distros like Fedora shipped it by default.
An encrypted system rather than an encrypted user partition is still necessary, because attackers could replace system files or simply add a service that uploads your stuff somewhere, or manipulate sudo, or log your password etc.
Now we all want to know if you have child porn
"You must be a criminal if you have curtains"
Wtf, no?!
If I had CP, I wouldn't ask publicly and make myself vulnerable.
I just don't wanna have anyone snooping around my stuff, just as everyone else.