Encrypt Filesystems with EncFS and Loop-AES 63
Linux.com (Slashdot sister site) has a quick look a file encryption using EncFS and Loop-AES as examples before briefly examining other options. From the article: "you can find a number of options for filesystem encryption in Linux exist, depending on your needs. The most important thing when choosing which one to use is to be clear about your needs. Will the size of the files you need to encrypt grow or stay static? Do you need to encrypt certain files or entire partitions? What level of security do you need? Answers to these questions will help determine the most appropriate program to use."
eCryptfs (Score:5, Informative)
http://ecryptfs.sf.net/ [sf.net]
It's all in the kernel, which means that shares memory mapping work (unlike userspace filesystems), and it keeps metadata on a per-file basis, which is *really* nice for things like incremental backup utilities.
Re:Going nowhere slowly (Score:3, Informative)
Why I'll never use kernel level encryption again (Score:2, Informative)
After doing so, I mounted the parition and everything proceeded normally...
That is until a few months later when I upgraded my system again. Suddenly my parition was unreadable, and the previous option did not work in cryptoloop anymore. I posted for weeks on boards and IRC channels trying to decrypt this data, but no one could help me.
So in the end I gave up on it.
After that nightmare I am never using kernel-level decryptuon again. The fact that the routines lie in the kernel, but the utilities in userspace, makes for a maitence nightmare when you end up upgrading one but the other. From now on all my encryption options will be userspace *only*.
Re:Why I'll never use kernel level encryption agai (Score:5, Informative)
1. boot into the old kernel/backout the upgrade.
2. Mount encrypted filesystem and copy data elsewhere
3. Create encrypted filesystem such that you don't get deprecated warnings.
4. Copy the data back.
I really can't understand continuing with something marked deprecated anyway - certainly not doing an upgrade while doing so. What do you think deprecated means? I'd be doing steps 2-4 as soon as the deprecated option was needed.
Re:Using encryption suggests criminality (Score:3, Informative)
Yes I do have something to hide.
For starters to prevent banking identity theft, I use various passwords instead of a publicly searchable mother's maiden name.
First thing to hide is the list of all my CC's, expiration dates, phone numbers to call in case of theft, and the password used for each instead of mother's maiden name.
Second is past years Turbo Tax tax returns. Those are a gold mine for identity thieves including SSN DOB Dependants Property address etc. You bet that goes into encrypted storage.
3rd is Website log-ins. I visit Slashdot often enough to remember my password. The same is not true for my UBS account.
4th is a central repository of registered software including ID number and keys.
5th is a property inventory list including make model serial number date of purchase etc. You many not be interested in my laptop serial number, but I don't need anyone with an axe to grind listing it with the local police as stolen. Can you prove you own your laptop if someone else lists it as stolen? If it is stolen, can you provide a list including model, serial number for both police and insurance?
This is not a complete list.
Just what do you have on your computer that you don't mind me looking into?
I'm sure there is something you'd rather not have public.