Does Jow Forums use encryption on their drives? If yes what kind and on which drives?

Does Jow Forums use encryption on their drives? If yes what kind and on which drives?

Attached: SmallFileVaultIcon.png (300x300, 63K)

Other urls found in this thread:

debian.org/releases/jessie/amd64/apcs03.html.en
umart.com.au/Orico-Aluminium-L95SS-Laptop-CD-ROM-Bay-Drive-Bracket-For-2-5-SATA-Drive_39557G.html
twitter.com/NSFWRedditVideo

No

base64 on floppie disks

just standard luks on /home unless I'm doing subversive anti-gov shit & then it's a container within a container using veracrypt
>inb4 I should be using truecrypt 7.1a...

You're glowing btw.

Attached: trump-israel.jpg (2500x1596, 599K)

your pic on my macbook pro. windows bitlocker on my windows system drives.

I just googled "hard drive encryption" and this logo looked nice. Didn't know it was mac lol

it's filevault.

A LUKS container with whatever dm-crypt settings Fedora defaults to, on /sysroot and /var/home

ROT26 on entire drive

>defaults
OH NO NO NO

>My excuse of a distro has insane defaults, therefore that's the case everywhere

Attached: 34089uiorejfg20rjdkgsgdg.png (640x480, 407K)

Only on my laptop, since I assume my hose (and therefore my non-laptop machines) are physically secure. That said, I encrypt the whole disk on my laptop, I fail to see the point of this shit where only /home is encrypted.

No, because I'm not a pedophile and I want to maxamize the odds of fixing problems and recovering data.

Yes, because I deal with HIPAA protected data and I'm legally required to have encryption.

luks on sda1

The point of only encrypting /home is that your actually confidential data (ranging from pics and documents to ssh keys) will likely be stored there. It doesn't really matter if the attacker can make a copy of all the software packages you have installed.

imagine being so dumb that you think only bad people use encryption. i bet you think only bad people use guns too, huh user.

Disk encryption is a meme. Keep your shit on a flash drive.

luks on solus with my entire system disk, my data disk and my reserve disk

Fuck that. Most of the times I became my own victim. Learned from that and never touched any form of encryption.

But that is unironically true

No. I only encrypt backups of my porn/Jow Forums shit, and purely to prevent friends/family from accessing it if they find it.

underage b&

have sex

>still storing anything locally

Use Linux LUKS with the settings you like, on all drives - not least because it makes disposing of, selling or RMA'ing drives safer.

I don't encrypt because I'm not a schizonigger that likes to LARP as some "most wanted" criminal. The CIA isn't after me.

Why the hell would the CIA be after you if you encrypt? Is it illegal now?

This just has to do with basic data safety policy. At some point your machines fail or get old and you dispose of them. You can either make a fuss with physically wrecking them until they're irrecoverable to the degree you want, or you can just not do this because you encrypted everything.

BTW unless you're in a banana IT nation, your schizogovernment is doing it, your schizocompanies are doing it, your schizointernet is doing it, and so on.

Guess what, it costs basically nothing and is just safer.

1. Why would I care what someone finds on my computer?
2. How would they manage to get access to it?
3. What makes you think I'd dispose of my computer once it fails?

You should be using truecrypt 7.1a. It's been properly audited.

>1. Why would I care what someone finds on my computer?
Because you didn't bother to entirely remove passwords, banking and transaction information, personal details, some business related emails, and who knows the fuck what else off your drive.

You also won't have done it if the machine failed.

> 2. How would they manage to get access to it?
Either by hooking up parts or maybe by removing HDD platters or some other way.

> 3. What makes you think I'd dispose of my computer once it fails?
I was assuming you're not the type of messy person that lives with all their garbage, because that is rare. Maybe you do. I don't really care, I went with the much higher probability of you being the usual person who tosses broken things.

user doesn't know about tech niggers that scrape computer for cookies, insecure password managers, "social security number.txt" and other private info.

Attached: ld6m6ctoror21.png (774x774, 822K)

>Why would I care what someone finds on my computer?
When you grow up to be big boy, Billy, you will get a job and you will have to handle sensitive data. You will want to protect and encrypt that data so no one can interfere with your work. Unless you will flip burgers when you grow up, then you don't count.

> Because you didn't bother to entirely remove passwords, banking and transaction information, personal details, some business related emails, and who knows the fuck what else off your drive.
If my HDD were to die, then I would probably put it away on a box somewhere. I guess I would destroy it with a hammer though.
> You also won't have done it if the machine failed.
Fair point.
>Either by hooking up parts or maybe by removing HDD platters or some other way.
That would be implying that they SPECIFICALLY want my HDD. If someone broke into my house, I'm sure they have bigger priorities like stealing my money instead of some random retard's HDD. I also doubt the average thieving nigger knows how to crack open an unencrypted HDD, at best they'll just steal my PC and wipe it with a new installation, without considering I could have CC details on the drive.
> I was assuming you're not the type of messy person that lives with all their garbage, because that is rare. Maybe you do. I don't really care, I went with the much higher probability of you being the usual person who tosses broken things.
Unless lightning struck my house and burned my shit, I don't have a reason to throw out my entire fucking PC. I can always reuse parts of my current build like the case.

so you do not even use a passcode on your phone?

> If my HDD were to die, then I would probably put it away on a box somewhere. I guess I would destroy it with a hammer though.
Well, with one single storage and nothing else you could do that and that would be perhaps reasonably (but not equally) safe.

>That would be implying that they SPECIFICALLY want my HDD
Not at all. They might get them from HDD disposal/recycling stockpiles or such.

> Unless lightning struck my house and burned my shit, I don't have a reason to throw out my entire fucking PC.
Most people do, and the ones that don't still may throw out HDD, SSD and other components. I did this a lot of times before, both because IDE drives and older aren't really useful anymore (even the power cost to operate them is generally not worth it) and because drives fail.

Bit-locker with a TPM module

A passcode isn't the same as encryption, retard. And yes, I do use a passcode.

actually their is an increase in tech theft sometimes they just stick a pre programmed usb made by hacker friend that copies files with specific keywords. they can even just stick a keylogger in your computer, ofc that would mean they probably have anytime access to your computer. plus encryption wouldn't help in the case of a keylogger

Correct but they're still a rudimentary amount of protection against unwanted access to your phone.

I have a veracrypt encrypted file for muh 2d porn.
I don't really encrypt because I dual boot Windows and macOS and they can't really read each other's filesystems when encrypted.
Also I don't really want to take the performance hit.

> trusting microsoft bitlocker
Wut?

why do you use a passcode if you wouldn't care what someone finds on your computer? what changes from your computer to your phone?

>I fail to see the point of this shit where only /home is encrypted.
because muh /home is on a separate disk/partition so *if* muh os shits the bed the only data lost is the os's files which is usually a doddle to reinstall. Also what this guy said.

Attached: 6736812427_c375d6afe6_o.jpg (1001x1500, 1.02M)

That is stupid, you can't set a folder as a partition, the path starts with the partition.

>It doesn't really matter if the attacker can make a copy of all the software packages you have installed
i am no scientist but wouldn't that mean the attacker could easily add something into your un-encrypted OS?

Attached: chicken_1f414.png (160x160, 15K)

yes

No, because I'm not a terrophile and I have nothing to hide and I love Israel.

>If yes what kind and on which drives?
Full disk encryption on work laptop. Like that, if it gets lost/stolen, I'm not in deep shit. I keep offline backups so I can recover from the loss with just money and irritation, but no panic.

I don't care about the government reading what I do. If they want to know, I can tell them so much. With diagrams. And slideshows. They'll want to cut their own wrists by when I've done explaining what I do in depth! BWAHAHAHAAA!

imagine being the guy that got fired for leaking company secrets

Attached: ad_139560514.jpg (644x484, 25K)

>They'll want to cut their own wrists by when I've done explaining what I do in depth! BWAHAHAHAAA!
Same for me, but at the beginning introduction when I just jump into phys-chem for a brief moment. And that is just telling briefly what I do.

Someone recently dropped a usb flash drive with all the police workers personal data. Imagine being him right now.

I've literally been doing it for decades.

I'll explain since you clearly need it

>put /home as a subfolder on same drive as /
>os fucks the doggy
>reinstall, have to reformat /
>but wai... what about all muh data on /home
>sorry kiddo...

>put /home on separate partition
>or better yet, another fucking drive formatted for solid file use - xfs or similar with the bogstandard luks home encryption
>os makes love to the canine
>reinstall, format / and leave /home sitting there WITH ALL YOUR FUCKING DATA INTACT
>if you're clever (I know, punching up a bit) you'll have a script set for you package manager so that all you need to do to reinstall programs you know & love is run the fucking script

debian.org/releases/jessie/amd64/apcs03.html.en

But you know - you go ahead calling me stupid.

Attached: il_fullxfull.1978290479_sz28.jpg (794x1191, 147K)

I use filevault on my macOS partition on my 15" MBP and bitlocker on one of my windows drives just to be safe, I'm not worried about governments getting into my shit as much as the kinds of random thieves that would steal a laptop.

but it's not you mouth breathing bootlicker

What Windows are you using, I can't seem to do anything like that to any of my folders

*giggles*

why would anyone give all private files to service technician in the case u have too rma stuff?

Would it work if Im logged out?

>>But you know - you go ahead calling me stupid.
Well, you're stupid. One you could accomplish something similar by just restoring from the backups that you should have anyway. Your whole drive, not just the OS, should be able to take a shit without you losing anything and without you having to resort to some special partitioning scheme. Two, restoring /home isn't enough, because there's a bunch of stuff you might want to change that is system-wide, not user-specific, and that lives in /etc. Three considering that every program feels free to dump all sorts of dotfiles and sometimes assorted other garbage all over your home directory, I for one think its a bad idea to keep your actual non-configuration files there. Make an /user directory or some such that the system, package manager, and applications don't already have ideas about using as a default location. Oh, bonus, four: not separating partitions simplifies your life. Something suddenly needs 10GB in /tmp? well, it can have it so long as there's that much space on the drive, without you having to fuck with LVM or remount /tmp somewhere else or yadda yadda yadda.

Once you've dumped the superfluous baggage of a separate /home overboard you can then easily encrypt the whole drive. I'd much rather know that a thief or evil maid will have trouble getting at not just at my human-created files, but also at the OS, and whatever may be lurking in it. Single-partition also makes swap encryption trivial: Whole drive is encrypted. Make a swap file - not a partition - and put it on the drive. Done.

tl;dr: you're a fucking idiot.

kewl blogpost tho m8!

>he doesn't use tmpfs...

are you suggesting everyone should use the exact setup you do? from the sound of it you are too poor to even have multiple drives in your setup.

given that the primary use case for disk encryption is laptops, since those are most at risk of theft or physical tampering, yes, most laptops are only going to have one drive.

Veracrypt all of my sensitive HDD/partitions and run it in the background. Any non-encrypted partition will not contain any/minimal sensitive information.

I don't need it against NSA/etc but its enough to protect myself from trash/other people.

The performance loss with Veracrypt encryption vs non-encryption is only around 10% write speed on my HDDs.

>Disk encryption is a meme
God save us from these supra-intellectuals

*holds your drive*
umart.com.au/Orico-Aluminium-L95SS-Laptop-CD-ROM-Bay-Drive-Bracket-For-2-5-SATA-Drive_39557G.html

my /home is on an external usb. Ususally I use esata but if the laptop I've got only has usb3 it just werks with minimal bottlenecks....

Again, just to be clear - your "advice" is horrendously flawed and the fact that you've double downed on it just makes you look all the more stupid.

gud chatting.

Attached: Kaho_Dental Dam.jpg (1163x1200, 139K)

>what kind
LUKS2.
>and on which drives?
The ones in my home server.

FDE on laptop and any external that I might have to take with me. I also have encrypted partitions on most of my drives that have backups of everything important (scans of IDs, pics of any expencive stuff I have, incurance papers, some photos etc.).

do you really not have m.2 or msata ssd + a 2.5 mechanical hard drive in your laptop? maybe your just brainlet

e4m

this

the only sane answer so far

Not him, but I'm not doing anything that the American government would frown upon. Just mine.

LUKS on all my drives.