Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Why Not Use Full Disk Encryption on Laptops? 446

Saqib Ali asks: "According to the 2006 Security Breaches Matrix, a large number of the data leaks were caused due to stolen/missing laptops. Mobile devices will be stolen or lost, but one way to easily mitigate the harm is to use Full Disk Encryption (FDE) on all mobile devices. So, why don't we encrypt all our HDDs?"
"Cost, and performance impact are the usual arguments.

Analysis shows that the access time increases by 56%-85% after FDE. As HDDs fills up the fragmentation increases and so will the file access time. With FDE, the swap file (system's virtual memory) gets encrypted as well. This will impact the system's performance noticeably when the virtual memory is being used more often.

Encryption key & password management blues follow. What happens when the user forgets his/her new FDE password? How to manage the encryption key backup files? Who has possession of the backups of the encryption keys? What about when the users quits and does not hand over the password / encryption keys? Who can access the system and its encrypted files? How frequently does the password need to be changed? How to prevent the user from writing the passwords down? Using hardware token (RSA Token, smartcard etc) can alleviate many of the password management issues. But these hardware tokens are costly!

Cost for Full Disk Encryption solutions ranges from $0-$300.

Is it not worth using Full Disk Encryption on mobile devices after all the data leaks we have seen in the last few years?"
This discussion has been archived. No new comments can be posted.

Why Not Use Full Disk Encryption on Laptops?

Comments Filter:
  • OSX Makes it Easy (Score:5, Informative)

    by Above ( 100351 ) on Saturday October 21, 2006 @06:49PM (#16531755)
    System Preferences -> Security. Click "turn on file vault". A few minutes later, you're done.

    Also check "Use secure virtual memory" (aka encrypt swap) on the same tab.

    Now swap and your home directory (so all important data) is encrypted. The OS and applications are not. As a result performance degredation is minimal.

    In the business enviornment the business can set a recovery password in case the user forgets, dies, whatever. The user's login password is the only password they need.

    Free. Easy to use, you do nothing. Minimal performance impact. So the real reason most people aren't doing it? They are stuck with Windows bloatware or are ignorant.
  • This makes no sense (Score:5, Informative)

    by sheldon ( 2322 ) on Saturday October 21, 2006 @06:50PM (#16531765)
    What do you mean "Why don't we use full disk encryption?"

    The company I work for(financial services) has been using this for over a year now. Not just on laptops, but also all desktops in the company.

  • by Anonymous Coward on Saturday October 21, 2006 @06:54PM (#16531791)
    Posting anon for obvious reasons, but those of you banking at JPMC may rest assured that we already do use full disk encryption on laptops. Wouldn't be at all surprised to learn other banks do.
  • by Anonymous Coward on Saturday October 21, 2006 @06:56PM (#16531813)
    <snip>1) Ignorance -- it is not a built-in feature in Windows</snip>

    actually, the Encrypting File System is built into anything WinXP and after.

    http://www.microsoft.com/technet/prodtechnol/winxp pro/deploy/cryptfs.mspx [microsoft.com]

    But the technology sucks because they have no centralized key management that can be done easily for home users. Even in the enterprise its kinda tricky.
  • by Anonymous Coward on Saturday October 21, 2006 @06:59PM (#16531845)
    and it has been around since Win 2000.

    It's not really "full disk" encryption, as it applies to a single file or folder.

    See [microsoft.com]http://www.microsoft.com/technet/prodtechnol/winxp pro/deploy/cryptfs.mspx [microsoft.com] for more
  • by Anonymous Coward on Saturday October 21, 2006 @07:02PM (#16531867)
    The token is used for the storage of a cryptographic credential (key) which is used to unlock the disk key. You need a token PIN to log in to the token. This provides two-factor authentication: Something you have (the token) and something you know (the token PIN).

    Rolling SecurID codes aren't really suited for pre-boot authentication, as you need a working network to contact the ACE server to authenticate your current code (and laptop users are frequently disconnected from their corporate network).
  • Re:Vista feature (Score:5, Informative)

    by Adam9 ( 93947 ) on Saturday October 21, 2006 @07:03PM (#16531871) Journal
    That would be BitLocker [microsoft.com].
  • by Anonymous Coward on Saturday October 21, 2006 @07:04PM (#16531881)
    EFS is not full disk encryption. It's per file encryption, which allows you to do things like see the names of files, who last modified them, when they were modified, and read files from swap.
  • by Junta ( 36770 ) on Saturday October 21, 2006 @07:06PM (#16531909)
    This post written from a laptop with a LUKS-root filesystem. I catted a 280 MB file into dev null, it took 17.8 seconds. I copied that file to a filesystem on the exact same drive, umounted the filesystem, remounted it, and tested that, it took 12.5 seconds Top showed the crypt activity as taking about 50% of my cpu in the first case, my Pentium M at the time of measurement clocked only up to 800 MHz to accommodate the load. This test was repeated a few times with a small degree of variation.

    Anyway, those metrics are actually more different than I would have expected. I was hoping to demonstrate that the difference isn't that much, but objectively it is disk io performance hit. In general use I don't notice it. I already had a crappy hard drive that was dog slow, and in the end adding encryption made it... still a crappy hard drive that is dog slow, and the extra slowness I didn't even bother perceiving until I tried to measure it. I used this laptop for a few weeks with no encryption, and on the next install did encryption from the get go on everything from /, and didn't notice a problem at all.
  • eCryptfs (Score:5, Informative)

    by omnirealm ( 244599 ) on Saturday October 21, 2006 @07:11PM (#16531939) Homepage
    A new addition to the 2.6.19 Linux kernel, eCryptfs, addresses many of these problems:

    http://ecryptfs.sf.net/ [sf.net]

    eCryptfs is an actual filesystem operating at the VFS layer of the Linux kernel. It stacks on top of other filesystems like ext3 and encrypts files one at a time, with each file getting its own key.

    Who cares about encrypting libc or the x.org libraries? People want to encrypt their financial, medical, and other such data. eCryptfs makes it easy to encrypt only what users want to encrypt.

    Some ways that eCryptfs deals with the issues raised:

    What happens when the user forgets his/her new FDE password?

    The best answer is, ``You're screwed.'' That is the way it should be; without the secret, nobody -- not even you -- can get to the data.

    Now, out here in reality, things can't be quite that convenient. Try telling the CEO that his third-quarter reports are lost forever. The next-best thing is intelligent key escrow. I tend to recommend (m,n)-threshold sharing, wherein a certain number of people in a group need to collude (say, 3 out of 5 people in the company) in order to reconstruct the secret value.

    eCryptfs userspace tools have a pluggable key management infrastructure, and thus it can keep the secret value in any token device for which a module exists. These hardware devices do not need to be expensive. In fact, Thinkpads come with TPM chips built-in, and a TPM key module already exists for eCryptfs:

    http://trousers.sourceforge.net/tpm_keyring2/quick start.html [sourceforge.net]

    How to manage the encryption key backup files?> Who has possession of the backups of the encryption keys? What about when the users quits and does not hand over the password / encryption keys?

    All of these are addressed with something like (m,n)-threshold sharing:

    http://en.wikipedia.org/wiki/Secret_sharing [wikipedia.org]

    Also, because eCryptfs encrypts on a per-file basis, an incremental backup utility can just access the encrypted files on the lower filesystem. All of the information needed to decrypt the files is right in the header of each file; all you need is the key.

    Who can access the system and its encrypted files?

    This is a semantic security problem that the tools should definitely address. eCryptfs, in its current form, provides fairly flexible key management options, but the design goals of eCryptfs are much more ambitious, and they seek to address these sorts of issues:

    http://ecryptfs.sourceforge.net/ecryptfs.pdf [sourceforge.net]

    How frequently does the password need to be changed?

    Ideally, one would use eCryptfs in public key mode, so that is largely a non-issue. The secret can remain locked in a TPM chip, and the key can be escrowed.

    How to prevent the user from writing the passwords down?

    There is nothing wrong with writing passwords down, as long as the paper on which the passwords are written is stored in a location that can be made at least as secure as is necessary to protect the data that the passwords are protecting. In any event, the secret value can depend on a password *and* something else, like a file. The OpenSSL key module can be used in that way.

    Using hardware token (RSA Token, smartcard etc) can alleviate many of the password management issues. But these hardware tokens are costly!

    Not really; many laptops shipped today have TPM chips built-in.

    Oh, yeah, and all of eCryptfs -- both the kernel and userspace components -- are GPL. Give it a try.
  • by croddy ( 659025 ) on Saturday October 21, 2006 @07:12PM (#16531953)
    It's also very important to encrypt your swap space -- just think of all the crypto keys, passwords, etc. that are stored in memory. It's much easier to be sure you've secured those if you know they're being swapped to a partition that's initialized with a new random key each time the system boots.

    Really, though, it's not even that difficult to encrypt the root filesystem. The new Etch installer has this built in, and if I'm not mistaken, Vista will too.

    I'm not sure what use all those software packages are that are linked on the submitter's home page.

  • by croddy ( 659025 ) on Saturday October 21, 2006 @07:22PM (#16532029)
    You have to encrypt everything; otherwise they know which data is sensitive. Make them work for it!
  • Not a good defense (Score:5, Informative)

    by Junta ( 36770 ) on Saturday October 21, 2006 @07:26PM (#16532053)
    All the fingerprint and user authentication in the world is a poor defense against someone ripping out the drive, which is easy if the laptop is stolen. That's why it is generally a larger issue on laptops than desktops. Desktops tied to your desk at work have whatever physical security the company has invested in protecting it, leaving it open only to the possiblity of remote attackers (well, within reason, the physical security can be bypassed, but assume a perfect company for discussion). The whole threat of a laptop is physical security breaches, otherwise the discussion wouldn't be laptop-centered. As to not putting confidential stuff on laptops, it is a good idea, but that is a policy rooted in trusting the user to always be vigilant about the confidentiality of the data set they are working, trusting their judgment, and expecting them not to take convenient short cuts at 5pm on a Friday so they can get it done on the weekend without staying late or looking bad on Monday. I use full disk encryption so I don't have to even think about it. I'm fairly sure I have nothing on my laptop remotely of interest to anyone, but I never have to think too hard about it.
  • by jahurska ( 883728 ) on Saturday October 21, 2006 @07:32PM (#16532093)
    I work as a SW consultant for the mobile sector and all laptops in our firm have encrypted hard drives. The system is so that username and password is asked right when the laptop is booted kinda like bios password and after windows is loaded it automatically logins you to windows with those credentials. It's easy to use, no need to remember any additional passwords and also added benefit is that the administrators can login into it with their credentials if a user forgets his password.

    The performance hit is real and noticeable though, but mostly affects hard drive related tasks, so that does not hinder my working too much.

    Also all firms that I have been dealing with use encrypted laptops, so in my perspective the FDE is pretty widely used already :).
  • by 4alexnyc ( 826658 ) on Saturday October 21, 2006 @07:41PM (#16532131)
    Ditto for my company - very large company in FS, all 50,000 laptops are encrypted... Took a while to get senior management on board (come on, all of us in IT knew this was something that should have been done for a while) but once the decision was made, it was implemented quickly and properly (i.e.- force load on initial login).
  • by Anonymous Coward on Saturday October 21, 2006 @07:44PM (#16532147)
    A good point, but I disagree.

    "Full Disk Encryption gives you the access overhead that comes with encryption/decryption for every access to the hard disk."

    Performance overhead shouldn't be that much, considering laptop cpu speeds vs laptop disk speeds.
    I'd personally worry more about the power consumption overhead.

    "Why not just encrypt the sensitive data if you want to avoid leaks of the sensitive data?"

    Simplicity. You don't have to do a risk assessment every time you save something,
    neither do the people who really shouldn't be allowed to touch a computer, yet your company gave them laptops.
  • by Junta ( 36770 ) on Saturday October 21, 2006 @07:45PM (#16532153)
    My link full disk encryption is a company laptop.

    -Key recovery mechanism:
    In my case (and most sane companies), the IT dept with respect to this will let you proceed at your own risk with respect to laptop protected data. With any desktop/laptop install, there is a ever present risk of catastrophic disk failure, so IT policies have to dictate how to cope with sudden loss of all data on a desktop or laptop anyway, if it's because the luser forgot their password or because a drive head started skipping across the platter surface, generally it's all the same. In my case we are provided network storage space, where they manage redundancy, backups, and the associated recovery and maintenance. If the data is so damned important, stick it out there.
    I also laid out a strategy for this in another post if IT insists on key recovery. LUKS has multiple key slots and by extension can support multiple passwords. Use a key slot for the IT password unknown to the user, and one other for the user password unknown to IT. User can screw it up if they desire, but users can always screw it up if they want to, the goal is to keep a reasonable expectation of recovery, but can never win in the face of user who does not want the data recovered (unless said user is just too stupid to figure it out).

    -Corporate standards.
    The standards of the company just have to be intelligent. In my case, standards when first published required that all company data be protected, and they recommend ed gpg or windows folder encryption to start with, for linux and windows respectively. Auditors have examined my setup, and I showed them the indicators of the method I used and pointed out reference material for their review. At the end the auditors, (who were almost entirely windows people), concurred it went above and beyond the corporate standards and after my audit, future users who had a similar setup had a simple, straightforward audit.
  • by Simon Garlick ( 104721 ) on Saturday October 21, 2006 @07:49PM (#16532205)
    http://forums.pgpsupport.com/viewforum.php?f=54&si d=749efb5b59855bac7e1a06eda016e4a9 [pgpsupport.com]

    If you need a reason why people aren't encrypting their disks, visit the PGP Whole Disk Encryption forum and take your pick.
  • Re:OSX Makes it Easy (Score:1, Informative)

    by Anonymous Coward on Saturday October 21, 2006 @07:51PM (#16532209)
    XP Pro has let you do the same since it was released.

    Windows 2000 lets you encrypt folders... right click, properties, advanced, encrypt contents to secure data
  • Re:eCryptfs (Score:3, Informative)

    by omnirealm ( 244599 ) on Saturday October 21, 2006 @07:51PM (#16532217) Homepage
    How does this compare to dm-crypt and LUKS?

    dm-crypt is a block device encryption tool. eCryptfs is an actual cryptographic filesystem. Files can sit side-by-side in the same directory and be encrypted with entirely independent sets of keys. Incremental backup utilities can access the encrypted versions of the files. eCryptfs is an order of magnitude more complex and flexible than block device encryption tools.

    it seems like reinventing the wheel.

    Read the paper:

    http://ecryptfs.sourceforge.net/ecryptfs.pdf [sourceforge.net]
  • by Anonymous Coward on Saturday October 21, 2006 @07:55PM (#16532237)
    I'm posting this from a laptop with the entire disk encrypted with LUKS. It's a pentium-M notebook I use for development and mail/web. I don't notice any slowness at all. As long as you have enough memory to not use swap, it's perfect. And with the new Debian installer, it's easy too.

    Give it a try.

    Another advantage for corporate types who have to dispose of old disks securely: If all the data that's ever touched a drive has been encrypted you can probably get rid of it without the DBAN hassle. (No offense to DBAN, it's great)
  • by Junta ( 36770 ) on Saturday October 21, 2006 @07:59PM (#16532261)
    The hard disk password isn't encryption, it's just a handshake with the controller chip on the hard drive. I don't know what method they used, but generally speaking the data on the platters is unprotected and theoretically swapping the little controller board bit of the drive would bypass it.

    Whatever hardware assisted encryption there is to be had in Thinkpads would be that stuff provided for 'trusted' computing. I have no insight on what it could actually do *for* the user as opposed to against it, but also based on my experience I don't think I need to offload the work as it isn't that intensive for a single user system anyway.
  • by DoomfrogBW ( 1010579 ) on Saturday October 21, 2006 @08:22PM (#16532423)
    My employer uses EncryptionPlus Hard Disk since a data theft from a laptop in 2004 that compromised a hundred or more Social Security Numbers. I don't know how robust EP Hard disk 7.1 is, but it is such a big deal that all 60,000 employee laptops use the software.
  • by Inhibit ( 105449 ) on Saturday October 21, 2006 @08:23PM (#16532437) Homepage Journal
    "because BIOS passwords are extremely insecure. If were talking about mobile devices, and you have a BIOS password protecting valuable information, its as easy as removing the CMOS battery, waiting 15 seconds, and popping it back in."


    I'll inform all the buyers of low cost paper weights on EBay that they're missing this important feature of the IBM laptops.

    While yours is a true statement for some laptops, it isn't a blanket statement for all laptops. There are many exceptions to the rule that BIOS/HDD laptop passwords are easy to break.
  • Looks like... (Score:4, Informative)

    by Junta ( 36770 ) on Saturday October 21, 2006 @08:35PM (#16532505)
    Based on the readme, it looks like encfs (which uses fuse and openssl). It might obscure more detail (i.e. with encfs you know how many files and directories there are, and their timestamps). How does it differ from encfs (http://encfs.sourceforge.net/)?

    encfs is of course per user, and a somewhat nifty thing there is the pam_encfs module which can optionally used to get the authentication token to unlock its key. The implementation (since it's obviously has to be since it's a fuse thing) is more userspace than ecryptfs, but functionally speaking, what's the difference?

    I understand well the benefits compared with dm-crypt strategy based on the circumstances and requirements.
    With block level strategies, you have to decide the total size of the block device for protected vs. non-protected data. If you don't understand your needs well, it's difficult to apply a finer-grained approach to security, particularly if you are required to codify it into a company standard for people who you definitely won't understand perfectly the needs of. Because of this, the only generally feasible approach is to encrypt everything save for /boot (which I do). This has benefit for protecting against physical threats and people trying to reboot your system using a live cd or other such attacks. However, the key is always available to the kernel and all the data is visible, so a remote or local attack that acheives root privileges means all the data is exposed since a very coarse grained attack was used. On the bright side, it is also appropriate as a codified standard because users can't generally be trusted to correctly perform risk assessments on every save or understand all the temporary places they may save to, and it's the only way to protect swap patitions. I use dm-crypt with LUKS partitions for / and swap on my laptop, with a small /boot for the kernel and luks-enabled initrd.

    encfs and similar strategies feasibly allow finer grained policies to go into place without making the tough size decisions as is needed with block strategies. This provides all the protection from theft and such like dm-crypt does. And if the policies are fine grained and the directories are only mounted as needed, a remote attacker achieving root access will only be able to get to file systems currently mounted, which may be a smaller set than the whole. The difficulty here is that when defining a finer-grained policy, you have to know which directories could ever hold sensitive data, If you are to protect swap you can't use a swap partition, but a swapfile in a directory protected by such a scheme, and in the end on a single user system (almost all laptops), effectively no matter what all the encrypted filesystems will be mounted anyway most all the time, so it's really not ultimately much of a functional difference. I make encfs available on a couple of multi-user systems, and generally have pam_encfs there to make their home directories encrypted. /tmp is always exposed and swap is still dm-crypt protected on that system.
  • Re:eCryptfs (Score:3, Informative)

    by man_of_mr_e ( 217855 ) on Saturday October 21, 2006 @08:35PM (#16532509)
    What eCryptfs does not solve is the issue of system integrity, and secure temporary storage. What good is it to encrypt your files if they can just scan your swap partition looking for data? or /tmp? or, as someone else said, they trojan other files on your system?
  • by bluephone ( 200451 ) <grey@nOspAm.burntelectrons.org> on Saturday October 21, 2006 @08:37PM (#16532523) Homepage Journal
    The fingerprint door lock also opened with what was essentially a photocopy of the fingerprint too. A lot easier to store in your wallet and slip by security with than a gelatin finger. :)
  • Re:Looks like... (Score:3, Informative)

    by omnirealm ( 244599 ) on Saturday October 21, 2006 @08:43PM (#16532555) Homepage
    How does it differ from encfs (http://encfs.sourceforge.net/)?

    eCryptfs is kernel-native; EncFS is userspace. Since EncFS is userspace and depends on FUSE, shared memory mappings are not possible. Furthermore, FUSE incurs tremendous overhead with context switching between kernel and userspace; keeping everything native in the kernel during the page reads and writes is a big performance boost.

    eCryptfs has an entire infrastructure that is geared toward complex cryptographic policies. This work has yet to be done, but for now, eCryptfs is at least as functional as EncFS when it comes to providing data confidentiality, but eCryptfs can provide full POSIX compliance and it does not incur the overhead of continually bouncing between kernel and userspace.
  • Re:eCryptfs (Score:3, Informative)

    by omnirealm ( 244599 ) on Saturday October 21, 2006 @08:45PM (#16532571) Homepage
    What eCryptfs does not solve is the issue of system integrity, and secure temporary storage.

    Right. eCryptfs currently only provides data confidentiality for persistent storage in the event of compromise of your physical media. There is other software available to provide integrity (SLIM) and secure swap space (dm-crypt with a random key on boot).
  • by risk one ( 1013529 ) on Saturday October 21, 2006 @10:22PM (#16533033)
    Not that I generally disagree with you, but a couple of points, just to be pedantic:
    * They lifted the fingerprint off a cd jewelcase.
    * The photocopy worked on the expensive system, but not on the simple USB device. In fact the reason they kept dumbing down (in contrast to their usual mode of operation to increase complexity as needed), was that the simple methods didn't work on the usb device. Only the second balistics model worked, which was cast from a manually improved version of the captured fingerprint. When they tried the actual doorlock, everything down to the photocopy turned out to work.
     
  • Trade off... (Score:5, Informative)

    by Junta ( 36770 ) on Saturday October 21, 2006 @10:22PM (#16533035)
    The traditional method dm-crypt and cryptoloop used was basically what you say, a hash of the password was used to encrypt the entire disk. Of course, no one ever devised a way to change the password in place, and even if they did, it would require all data on the disk to be re-encrypted. The key used to actually encrypt the data would likely be cryptographically weaker to crack, in theory. If you ever ever write down the password (I don't but some do) and then lose the paper, you can never be sure about the security of your data again short of re-encrypting the whole thing. I think this is probably the single thing people not researching it thoroughly misunderstand, if the technology you see is definitely encryption of a large data set, and you can essentially instantly change the password protecting it, the key used to encrypt the actual data is certainly not the password itself, as it requires a huge amount of effort to change the key on large amounts of encryted data.

    In the LUKS scheme the key material used for the very large data set will probably be more cryptographically sound. With a large data set, cryptographically weak keys could more likely be crackable than strong keys, in a large number of the type of attacks historically seen in cryptography. A small data set (data comprised only of the actual key) is generally more resistant to data analysis attacks, so a somewhat weaker password hash based key may be less exposed in that context. If you ever think a malicious user has had opportunity to get your password (the most likely thing in general for an attacker to get), you can change the password and the old key slot be shredded such that the knowledge obtained becomes useless. Sure, the 'master password' being compromised would mean the disk is irrevocably compromised, but that would be the case in the classical strategy anyway, since changing the password isn't feasible. Now if you want to actually re-encrypt data in the way a password change would require in the previous example, you can always reformat with a different key (or re-encrypt in place if implementation allowed), and have the same degree of 'changing the master password' as you put it.

    Keep in mind the 'master password' (or rather the actual key) in this context is probably a random 256 bit value. To achieve a comparable level of randomness, a password consisting of typable characters would have to be about 40 characters long consisting of completely random keypresses. If a person is ever in a position to actually get that master key value, you've already lost the data because before they can get to that key they have to:
    -Get root privilges while the volume is mounted to get dmsetup table output, but if it's mounted they could just grab the data anyway.
    -Get low-level physical access to your hardware to begin to crack the LUKS header of the partition or the content itself. If they are in a position to do so, they could/would image your entire volume and return your drive. In which case no matter what you do to the copy you got back (re-encrypt, change password, whatever), they can continue whatever crypto-analysis they want on their image of the data as it was when they first took it. You may be able to protect newly written data, but whatever risk of breaking the encryption on existing data is permanently there once imaging is possible.
    -Get low-level access to your system and somewhere along the chain insert something to dump the key material to them once available. Again, once this is in play, it's already over no matter what you do, if they can dump that table, they can dump the data directly. In this case, let's assume one of those keyboard bugs slashdot had an article a while back was discovered by you in your system. Knowing that your passphrase is potentially compromised, with the key not based directly on the password, but just encrypted by the password, you can re-encrypt the key once the bug is removed and shred the old slot, and their keylog data becomes useless for the purposes of defeating your filesystem encryption. If the master key is essentially whatever you typed, you are significantly more hosed.
  • by tftp ( 111690 ) on Saturday October 21, 2006 @10:55PM (#16533086) Homepage
    I have a laptop here which had a failure of the +5V power supply. The input was +16V (one of IBM Thinkpads), and when applied to a 5V-rated circuits it fried /everything/ in the notebook. I tested the drive - it's dead like a doornail.

    There are several ways to encrypt the data on the HDD, and everything depends on how it is done. If you used a 3rd party s/w with a key that is generated from your passphrase then you are good. Just use the same s/w on the replacement computer, and it ought to recognize the drive.

    Unfortunately, MS encrypted folders use a key that is uniquely generated for your account, and once you lose the account (on the dead computer) you can't decrypt anything. There are ways to add corporate keys to the system, so that in a company setting it's possible to recover the data; however this is /way/ beyond abilities of a typical user.

    Finally, if the TCA [wikipedia.org] is used then the TCA engine and the HDD controller can negotiate crypto keys, and the HDD can encrypt and decrypt data as it writes or reads the platters. This method is very secure because it ties several identities together (the TCA core, the internal HDD key data, the user's password, the account's GUID etc.) and I don't think it's worth trying to break. The good news is that I don't know of any computers today that can do this; maybe Vista will offer this.

  • by lky ( 246353 ) on Saturday October 21, 2006 @11:31PM (#16533206)
    For anyone that wants to experiment with Debian, DM-Crypt and Luks, check out the howtos and/or the USB installer at http://feraga.com./ [feraga.com.]

    I've been running lately from a USB Flash Drive (1GB) with everything but /boot encrypted for over a year and haven't had a issue. I'm sure its a little slower but dont notice it much.

    This also allows you to leave a full installation with no private or incriminating data on the hard drive so if they ask to see the laptop......just let them.

  • by TheRaven64 ( 641858 ) on Sunday October 22, 2006 @12:59AM (#16533544) Journal
    There are ways to add corporate keys to the system, so that in a company setting it's possible to recover the data; however this is /way/ beyond abilities of a typical user.

    Actually, it's trivial to export the keys so you can decrypt the files from a different machine. The problem is that this functionality is not mentioned the first time you encrypt a folder, so you only find out about it when you lose days.

  • by kasperd ( 592156 ) on Sunday October 22, 2006 @01:47AM (#16533740) Homepage Journal
    Why bother encrypting the whole disk anyway?
    If you are using a hardware solution, encryption the whole disk may be the only option. Otherwise, you only need to encrypt those partitions containing sensitive data.

    My instinct would be to just encrypt /home, /tmp,
    Your instinct is not all bad :-)

    maybe /etc and /var,
    You really should encrypt /var, it does contain a tmp directory, and also some spools such as mail spool and printer spool. /etc is not the most important to encrypt, but still I would encrypt it. /usr I wouldn't encrypt unless it just happened to be on the same file system as something I wanted to encrypt. Encrypting just some directories on a file system is less practical. It requires support from the file system, and such encryptions are more complicated and thus more prone to have weaknesses because of bad design or implementation. I'd either encrypt everything but /boot, or maybe put /usr on a seperate unencrypted partition.

    and I guess /swap if I was really paranoid.
    In fact swap was the first thing I decided to encrypt on my laptop. Encrypting swap is simpler and less intrusive than everything else. Thus there is really not much reason not to encrypt swap. No need for complicated key management, just generate a new random key on every boot.
  • by TheNetAvenger ( 624455 ) on Sunday October 22, 2006 @02:10AM (#16533862)
    Question: Suppose you use FDE to encrypt your disk, then your laptop dies. Is it possible to hook it up to another machine via USB enclosure and recover the data?

    (I apologize for my ignorance, I've never looked into disk encryption before


    A USB or passcode can be used to access the volume with most of the full volume technologies.

    Using the newest one in town as an example, Vista's BitLocker, you can use a USB device to backup your key. Bitlocker also will allow a non TP computer to encrypt a volume as long as the computer has a USB drive and the system is capable of seeing it at boot, and then uses the USB device in place of the TP mechanisms.

    Most technologies have passkey or other methods that are user accessible, so that a volume will never be lost due to any hardware failures except if the drive itself fails.

  • by Burz ( 138833 ) on Sunday October 22, 2006 @02:26AM (#16533960) Homepage Journal
  • Comment removed (Score:2, Informative)

    by account_deleted ( 4530225 ) on Sunday October 22, 2006 @02:55AM (#16534088)
    Comment removed based on user account deletion
  • by majest!k ( 836921 ) * <slash@noSpAm.majestik.net> on Sunday October 22, 2006 @03:16AM (#16534180)
    Unfortunately, MS encrypted folders use a key that is uniquely generated for your account, and once you lose the account (on the dead computer) you can't decrypt anything. There are ways to add corporate keys to the system, so that in a company setting it's possible to recover the data; however this is /way/ beyond abilities of a typical user.

    If you have an encrypted file from a Windows XP computer, as long as you know the logon password for the account that encrypted the file, you can decrypt the file. Check out EFS Key [lostpassword.com].
  • by AmiMoJo ( 196126 ) on Sunday October 22, 2006 @07:11AM (#16535312) Homepage Journal
    For years now, it has been possible to get hardware encryption for ATA drives that operates at above maximum ATA spec speed, i.e. it is totally transparent and does not cause any reduction in performance.

    The cheap stuff only uses 3DES and they key is a USB thumb drive type device, not very secure. But you can get AES capable devices which use password hashes supplied by the BIOS. Something like this... http://www.enovatech.net/products/mx_info.htm [enovatech.net]
  • by Mr_Perl ( 142164 ) on Sunday October 22, 2006 @09:35AM (#16536056) Homepage
    Gentoo makes encryption of your home partition + swap dead simple. Set up your tmp directories with tmpfs (like you should anyhow on a laptop)

    1. Modprobe dm-crypt
    2. emerge cryptsetup, run it once after losetup to initialize your device.
    3. edit /etc/cryptfs based on the examples

    You can do the root fs with a little more effort but most people won't store anything sensitive outside of their home directory anyway.
  • by gripen40k ( 957933 ) on Sunday October 22, 2006 @01:28PM (#16537604)
    Or for windows try Truecrypt [truecrypt.org] (I think there is a linux version as well). It works like a dream, and there are some really niffty features (like addition of plausible deniability). It's pretty cool.

The Tao is like a glob pattern: used but never used up. It is like the extern void: filled with infinite possibilities.

Working...