Become a fan of Slashdot on Facebook


Forgot your password?

Encrypt Filesystems with EncFS and Loop-AES 63 (Slashdot sister site) has a quick look a file encryption using EncFS and Loop-AES as examples before briefly examining other options. From the article: "you can find a number of options for filesystem encryption in Linux exist, depending on your needs. The most important thing when choosing which one to use is to be clear about your needs. Will the size of the files you need to encrypt grow or stay static? Do you need to encrypt certain files or entire partitions? What level of security do you need? Answers to these questions will help determine the most appropriate program to use."
This discussion has been archived. No new comments can be posted.

Encrypt Filesystems with EncFS and Loop-AES

Comments Filter:
  • eCryptfs (Score:5, Informative)

    by omnirealm ( 244599 ) on Monday March 20, 2006 @01:51PM (#14958174) Homepage
    Don't forget this new competitor: eCryptfs, mostly written and supported by IBM, and fully GPL: []

    It's all in the kernel, which means that shares memory mapping work (unlike userspace filesystems), and it keeps metadata on a per-file basis, which is *really* nice for things like incremental backup utilities.
  • by Trelane ( 16124 ) on Monday March 20, 2006 @02:00PM (#14958241) Journal
    Let me know when LUKS (Linux Unified Key Setup)/dm-crypt or any other of these tools can actually make a simple out-of-the-box GUI which is usable.
    Sir/Ma'am? It's time [].
  • I had a parition (approx 80 GB of data) encrypted via loop-AES in kernel 2.4. After the upgrade to kernel 2.6, I found I was unable to mount the partition correctly, unless I specified a depricated option when building the crypto loop tools.

    After doing so, I mounted the parition and everything proceeded normally...

    That is until a few months later when I upgraded my system again. Suddenly my parition was unreadable, and the previous option did not work in cryptoloop anymore. I posted for weeks on boards and IRC channels trying to decrypt this data, but no one could help me.

    So in the end I gave up on it.

    After that nightmare I am never using kernel-level decryptuon again. The fact that the routines lie in the kernel, but the utilities in userspace, makes for a maitence nightmare when you end up upgrading one but the other. From now on all my encryption options will be userspace *only*.

  • by sholden ( 12227 ) on Monday March 20, 2006 @02:47PM (#14958634) Homepage
    Why bother waiting so long:

    1. boot into the old kernel/backout the upgrade.
    2. Mount encrypted filesystem and copy data elsewhere
    3. Create encrypted filesystem such that you don't get deprecated warnings.
    4. Copy the data back.

    I really can't understand continuing with something marked deprecated anyway - certainly not doing an upgrade while doing so. What do you think deprecated means? I'd be doing steps 2-4 as soon as the deprecated option was needed.
  • by Technician ( 215283 ) on Tuesday March 21, 2006 @07:41AM (#14962945)
    What is so important that you Linux hippies feel the need to encrypt? Do you have something to hide?

    Yes I do have something to hide.

    For starters to prevent banking identity theft, I use various passwords instead of a publicly searchable mother's maiden name.

    First thing to hide is the list of all my CC's, expiration dates, phone numbers to call in case of theft, and the password used for each instead of mother's maiden name.

    Second is past years Turbo Tax tax returns. Those are a gold mine for identity thieves including SSN DOB Dependants Property address etc. You bet that goes into encrypted storage.

    3rd is Website log-ins. I visit Slashdot often enough to remember my password. The same is not true for my UBS account.

    4th is a central repository of registered software including ID number and keys.

    5th is a property inventory list including make model serial number date of purchase etc. You many not be interested in my laptop serial number, but I don't need anyone with an axe to grind listing it with the local police as stolen. Can you prove you own your laptop if someone else lists it as stolen? If it is stolen, can you provide a list including model, serial number for both police and insurance?

    This is not a complete list.

    Just what do you have on your computer that you don't mind me looking into?

    I'm sure there is something you'd rather not have public.

"It takes all sorts of in & out-door schooling to get adapted to my kind of fooling" - R. Frost