What is the best file encryption for linux?

Marcelo Cavalcante kalibslack-Re5JQEeQqe8AvxtiuMwx3w at public.gmane.org
Thu Jul 19 19:11:21 UTC 2012


>
> Very true. There is 9 to 1 chance your thief will be a Windows guy and
> hence likely to get confused and restart the system.
>
> Actually this make me wonder, doesn't this mean the system is unprotected
> when in suspend mode?
> William
>

Well, the only thing You'll have to protect you in this case is your
password.

If your password isn't something like 123456, you'll probably have a simple
security, but enough to keep your files protected from 99% of the thiefs,
who wouldn't have enough knowledge to break into it.

===================================================

Marcelo Cavalcante Rocha - Kalib

Graduando em Sistemas de Informações - ESTÁCIO/FIC
Usuário Linux #407564 | Usuário Asterisk #1148
Fortaleza - Ceará - Brazil
Celular: +55 085 87620983
Certificações: ITIL
V3<http://www.itil-officialsite.com/Qualifications/ITILV3QualificationLevels/ITILV3FoundationQualificationinITServiceManagement.aspx>
 | CSM <http://www.scrumalliance.org/> | LPI-C1 <http://www.lpi.org/> |
LPI-C2 <http://www.lpi.org/> | LPI-C3 <http://www.lpi.org/> | Novell
CLA<http://www.novell.com/training/certinfo/cla/>
Minha Pessoa: Blog <http://www.marcelocavalcante.net>
Projetos: Tux-CE <http://www.tux-ce.org> |
Archlinux-br<http://www.archlinux-br.org>
 | Chakra <http://www.chakra-project.org/> | KDE Brasil <http://br.kde.org>
 | TLUG <http://gtalug.org/wiki/Main_Page> |
PUG-CE<http://pug-ce.python.org.br/blog/>

===================================================


Proteja meu endereço como estou protegendo o seu.
Não revele e-mail dos correspondentes: use Cco (Copia Carbonada Oculta).
Retire os endereços antes de reenviar. Dificulte assim a
disseminação de vírus e spam.



On Thu, Jul 19, 2012 at 4:06 PM, William Muriithi <
william.muriithi-Re5JQEeQqe8AvxtiuMwx3w at public.gmane.org> wrote:

>
> >
> > As others have said, I'm aware of 2 kinds:
> >     1. cryptsetup -- block layer under the filesystem
> >     2. ecryptfs -- kernel module mounted on top of directory
> > Both will be transparent while mounted, so probably the easiest to use.
> > If your thief steals it while turned on, then all bets are off. :-)
> > --
>
> Very true. There is 9 to 1 chance your thief will be a Windows guy and
> hence likely to get confused and restart the system.
>
> Actually this make me wonder, doesn't this mean the system is unprotected
> when in suspend mode?
>
> William
> > William
> >
> > On Wed, Jul 18, 2012 at 11:19:11AM -0400, Walter Dnes wrote:
> > >   I plan do some travelling and take along my netbook or laptop, I want
> > > to be able to download+send email.  Web UI sucks.  I vastly prefer
> > > downloading via "getmail".  The problem is that getmail's rc files have
> > > userid+password in plain text for each account.  The risks of losing
> the
> > > netbook/laptop are obvious.
> > >
> > >   What I'm thinking of doing is something like so...
> > >
> > > - instead of actual rc files in ~/.getmail, have symlinks pointing to
> > >   non-existant files in /dev/shm (pseudo ramdrive)
> > >
> > > - the email retrival script would
> > >   - decrypt the rc files onto /dev/shm (after asking for a passphrase).
> > >     This would make the symlinks in ~/.getmail valid
> > >   - download email, using the symlinked rc files in ~/.getmail
> > >   - and then immediately delete the real rc files in /dev/shm
> > >
> > >   The symlinks in ~/.getmail would again be pointing to non-existant
> > > files.  Does this sound feasable, and what encryption program should I
> > > use?
> > --
> > The Toronto Linux Users Group.      Meetings: http://gtalug.org/
> > TLUG requests: Linux topics, No HTML, wrap text below 80 columns
> > How to UNSUBSCRIBE: http://gtalug.org/wiki/Mailing_lists
>
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://gtalug.org/pipermail/legacy/attachments/20120719/afae1e9e/attachment.html>


More information about the Legacy mailing list