this post was submitted on 30 Nov 2023
8 points (90.0% liked)

Linux 101 stuff. Questions are encouraged, noobs are welcome!

1060 readers
11 users here now

Linux introductions, tips and tutorials. Questions are encouraged. Any distro, any platform! Explicitly noob-friendly.

founded 1 year ago
MODERATORS
 

I've enabled full hard drive encryption on all of my devices.

The only exception is my homeserver (mainly running Nextcloud), where all of my personal data is stored.

I'm the only user and have chosen a very strong root- and user password.

From what I've researched, the only person who can see my data physically is the super user (aka. me), but if someone else doesn't have the password, they can't read anything critical and my personal data are safe from the eyes of others.

Is that correct? If it is, why does LUKS exist?

you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 5 points 11 months ago

Anyone with physical access to the computer that's unencrypted can see all of the data. If that's all right with your threat model then thats ok.

Having full disc encryption means the data is not available unless somebody has the password, usually guarded by a secure element in the computer itself that limits the number of unlock attempts to something reasonable. So if the device is stolen or copied, the data can't be used..

To take the opposite position for a second, even if your server has full disc encryption, if it's online and attached to a network and unencrypted, it's still unencrypted. Well the machine is on and doing useful work the full disc encryption only applies to data at rest, anything inside of the operating system sees things unencrypted (I'm talking about the general case here, obviously there's other things you could do to ensure data is encrypted while the computers on but that's not what full disc encryption usually means)