I was recently intrigued to learn that only half of the respondents to a survey said that they used disk encryption. Android, iOS, macOS, and Windows have been increasingly using encryption by default. On the other hand, while most Linux installers I’ve encountered include the option to encrypt, it is not selected by default.

Whether it’s a test bench, beater laptop, NAS, or daily driver, I encrypt for peace of mind. Whatever I end up doing on my machines, I can be pretty confident my data won’t end up in the wrong hands if the drive is stolen or lost and can be erased by simply overwriting the LUKS header. Recovering from an unbootable state or copying files out from an encrypted boot drive only takes a couple more commands compared to an unencrypted setup.

But that’s just me and I’m curious to hear what other reasons to encrypt or not to encrypt are out there.

  • ipkpjersi@lemmy.ml
    link
    fedilink
    arrow-up
    9
    ·
    edit-2
    6 days ago

    I used to, but not anymore, except for my laptop I plan on taking with me travelling. My work laptop and personal laptop are both encrypted.

    I figure my home is safe enough, and I only really need encryption if I’m going to be travelling.

    One of my friends locked himself out of his PC and all his data because he forgot his master password, and I don’t want to do that myself lol

  • shirro@aussie.zone
    link
    fedilink
    English
    arrow-up
    7
    ·
    edit-2
    7 days ago

    Most mobile/laptop devices should be encrypted by default. They are too prone to loss or theft. Even that isn’t sufficient with border crossings where you are probably better off wiping them or leaving them behind.

    My desktop has no valuable data like crypto, sits in a locked and occupied house in a small rural community with relatively low crime (public healthcare, social security, aging population). I have no personal experience of property theft in over half a decade.

    I encrypt secrets with a hardware key. They are only accessed as needed. This is a much more appropriate solution than whole disk encryptiom for my circumstances. Encrypting Linux packages and steam libraries doesn’t offer any practical benefit and unlocking my filesystem at login would not protect from network exfiltration which is a more realistic risk. It adds overhead.and another point of failure for no real benefit.

  • pfr@lemmy.sdf.org
    link
    fedilink
    arrow-up
    6
    arrow-down
    1
    ·
    7 days ago

    No, I don’t encrypt. I am a grown ass man and I rarely take my laptop out of my home. I don’t have any sensitive data on my various machines. I do use secure and encrypted cloud services to store things that I consider a security risk. Everything else is useless to a potential intruder.

  • jollyrogue@lemmy.ml
    link
    fedilink
    arrow-up
    4
    ·
    7 days ago

    I do encrypt my drives, and it’s not as transparent in Linux as it is in the others. I’m sure I could get a TPM setup for seamless boots, but I haven’t done that yet.

    For mobile drivers, I still encrypt, but that locks them to one OS since LUKS isn’t cross platform. There is VeraCrypt for cross-platform encryption, but that’s one more thing to manage and install.

  • Anonymouse@lemmy.world
    link
    fedilink
    English
    arrow-up
    4
    ·
    7 days ago

    I do on all my devices that can as a matter of practice, not for any real threat. I’m interested to learn about how to set it up and use it on a daily basis including how to do system recoveries. I guess it’s largely academic.

    Once I switched to linux as my daily driver, I didn’t have a need to do piracy anymore since all the software I need is FOSS.

  • mvirts@lemmy.world
    link
    fedilink
    arrow-up
    3
    ·
    6 days ago

    I don’t encrypt because it’s too much effort to learn about it.

    Id rather keep my filesystem unencrypted so that I can easily recover from problems and encrypt important files as needed, but let’s be real I don’t do that either.

  • lengau@midwest.social
    link
    fedilink
    arrow-up
    3
    ·
    6 days ago

    Depends on the use case. Definitely for my laptop though. In fact the decryption keys only exist in two places:

    1. Inside my TPM
    2. In a safe deposit box at a bank.
  • ebd6a8c9051028dc1607@lemmy.ml
    link
    fedilink
    arrow-up
    2
    ·
    6 days ago

    yes. if you live in a country without democracy. it is the only way to protect yourself and your data from nsa agent kicking your door.

  • hperrin@lemmy.ca
    link
    fedilink
    English
    arrow-up
    3
    ·
    6 days ago

    Yep. Everything except my server, which needs to be able to boot without my help. Because why not? I rarely ever reboot anything, so it doesn’t really hurt, and if anyone steals my shit they won’t get my wife’s noods.

  • Yozul@beehaw.org
    link
    fedilink
    arrow-up
    2
    ·
    6 days ago

    For my laptop, yeah. I rarely actually use it though. For my desktop not so much. I really don’t keep that much personal information on it to begin with, and if someone breaks into my house they could probably get more by stealing the desk my computer is sitting on then by stealing the computer. It just feels like a silly thing to waste my time with.

  • notarobot@lemm.ee
    link
    fedilink
    Español
    arrow-up
    2
    ·
    7 days ago

    Yes. I have sensitive info in my PC (work credentials) and in the case of a break-in, last thing I want is to jeopardize my job.

  • Eager Eagle@lemmy.world
    link
    fedilink
    English
    arrow-up
    93
    arrow-down
    6
    ·
    edit-2
    8 days ago

    I don’t https://xkcd.com/538/

    I’m convinced the chances of me losing access to the data are higher than encryption protecting it from a bad actor.

    Let’s be real, full disk encryption won’t protect a running system and if someone has physical access and really wants it, encryption won’t protect you from the $5 wrench either.

    I do encrypt my phone data though, as someone running away with my phone is more realistic.

    • patatahooligan@lemmy.world
      link
      fedilink
      arrow-up
      57
      ·
      8 days ago

      Who’s gonna come at me with a $5 wrench because they really want my data, though? The attack I’m most likely to experience is someone stealing my laptop while I’m out traveling. That’s what full filesystem encryption solves best.

    • AnAmericanPotato@programming.dev
      link
      fedilink
      English
      arrow-up
      28
      ·
      8 days ago

      I’m not worried about getting raided by the KGB or anything like that, but break-ins happen and my computer equipment would be a prime target for theft.

      I occasionally cycle my backup drives off-site, so I want those encrypted as well.

      The cost of encryption is very close to zero, so I don’t even entertain the question of whether I should encrypt or not. I just encrypt by default.

    • monovergent 🏁@lemmy.mlOP
      link
      fedilink
      arrow-up
      13
      ·
      8 days ago

      Possibly overestimating the value of the data entrusted to me, but whenever I see that xkcd, I like to think that I at least have the option to remain silent and die with dignity if I really don’t want the contents of my disk out there.

      • plant_based_monero@lemm.ee
        link
        fedilink
        arrow-up
        6
        ·
        8 days ago

        If I remember correctly, some USA agency said torture is ineffective because you will talk, you like it or not. When you are asking someone for a thing they don’t know they will say a lie just to stop the pain. So I guess anyone will give their password with enough time

      • Auli@lemmy.ca
        link
        fedilink
        English
        arrow-up
        1
        ·
        edit-2
        7 days ago

        Nothing I have is worth dying over. I’d give up on the first threat.

        Drives in server are not encrypted but backups to the cloud are. Laptop used to but causes to many issues and it doesn’t really leave the house much.

    • olympicyes@lemmy.world
      link
      fedilink
      English
      arrow-up
      6
      ·
      8 days ago

      It should be encrypted by default because most people don’t take care to dispose of their machines responsibly. I picked up a few machines destined for ewaste and the hard drives were full of tax returns.

    • astronaut_sloth@mander.xyz
      link
      fedilink
      English
      arrow-up
      10
      ·
      8 days ago

      Same here. My desktop is in a controlled environment, so I don’t see a need. Plus, if I do have some sort of issue, I will still be able to access those files.

      Since I actually take my laptop places, I have that encrypted for sure.

    • d00phy@lemmy.world
      link
      fedilink
      English
      arrow-up
      3
      ·
      8 days ago

      Yeah me too. It goes back to your threat level. How likely is it that someone is going to break into my home to steal my desktop all James Bond-like? The answer is, “not very.” Anything mobile has a significantly higher probability of falling into the wrong hands. These things are encrypted. Even the very old laptop that never leaves my house is encrypted because it could.

  • cmnybo@discuss.tchncs.de
    link
    fedilink
    English
    arrow-up
    44
    ·
    8 days ago

    I encrypt everything that leaves my house since it could be easily lost or stolen, but it is rather inconvenient.

    If someone breaks into my house, I’ve got bigger problems than someone getting their hands on my media collection. I think it would be more likely for me to mess something up and loose access to my data than for someone to steal it.

  • communism@lemmy.ml
    link
    fedilink
    arrow-up
    26
    ·
    8 days ago

    I encrypt all my drives. Me and the people I know get occasionally raided by the police. Plus I guess also provides protection for nosy civilians who get their hands on my devices. Unlike most security measures, there is hardly any downside to encrypting your drives—a minor performance hit, not noticeable on modern hardware, and having to type in a password upon boot, which you normally have to do anyway.

    • twinnie@feddit.uk
      link
      fedilink
      arrow-up
      4
      ·
      8 days ago

      Where do you live that you’re getting raided by the police? This sounds like one of those situations where they might use the wrench technique.

      • communism@lemmy.ml
        link
        fedilink
        arrow-up
        10
        ·
        8 days ago

        I don’t want to say where I live for anonymity reasons, but I will note that it’s fairly standard for political dissidents to be raided by any government so it doesn’t actually particularly narrow down my location.

        What’s the wrench technique?

          • communism@lemmy.ml
            link
            fedilink
            arrow-up
            6
            ·
            7 days ago

            Ah lol sure. It depends on what level of state repression you’re looking at. Regular cops will just not bother trying to decrypt a drive if they don’t have the password and you don’t freely give it up (you have the right to refuse to provide a password here, it’s under the same kind of principle as having the right to not incriminate yourself), but I’m sure military intelligence etc will go to the wrench technique. Also deniable encryption for anything particularly sensitive is good for the old wrench technique.

              • communism@lemmy.ml
                link
                fedilink
                arrow-up
                2
                ·
                edit-2
                7 days ago

                I don’t do deniable encryption on my root drives, just on external drives, and store the headers on my (non-deniably encrypted) computers. But if you want to deniably encrypt your root drive, Arch Wiki has some info:

                https://wiki.archlinux.org/title/Dm-crypt/Specialties#Encrypted_system_using_a_detached_LUKS_header

                You would still ultimately need an unencrypted header somewhere in order to boot your computer, so if it’s your main daily computer you’d likely carry around the USB stick all day and therefore it wouldn’t work against a state adversary who would obtain the USB stick with your header when they arrest you, if it’s on your person.

                Also, it’s much more plausible that an external drive is genuinely just random data with no encrypted contents than that the drive installed into a computer has no data. I do have some USB sticks etc with genuinely nothing on them because I wiped them with /dev/urandom at some point, and they’re lying around waiting for me to need an unused USB drive. The average person doesn’t have an “unused computer” with nothing on it, just random data on the drive. Especially if you are an activist/organiser, if the state finds your computer with just pure random data on it and no encryption header I think they will assume it is deniably encrypted.