this post was submitted on 30 Nov 2023
8 points (90.0% liked)
Linux 101 stuff. Questions are encouraged, noobs are welcome!
1060 readers
11 users here now
Linux introductions, tips and tutorials. Questions are encouraged. Any distro, any platform! Explicitly noob-friendly.
founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Anyone with physical access to the computer that's unencrypted can see all of the data. If that's all right with your threat model then thats ok.
Having full disc encryption means the data is not available unless somebody has the password, usually guarded by a secure element in the computer itself that limits the number of unlock attempts to something reasonable. So if the device is stolen or copied, the data can't be used..
To take the opposite position for a second, even if your server has full disc encryption, if it's online and attached to a network and unencrypted, it's still unencrypted. Well the machine is on and doing useful work the full disc encryption only applies to data at rest, anything inside of the operating system sees things unencrypted (I'm talking about the general case here, obviously there's other things you could do to ensure data is encrypted while the computers on but that's not what full disc encryption usually means)