I was recently intrigued to learn that only half of the respondents to a survey said that they used disk encryption. Android, iOS, macOS, and Windows have been increasingly using encryption by default. On the other hand, while most Linux installers I’ve encountered include the option to encrypt, it is not selected by default.

Whether it’s a test bench, beater laptop, NAS, or daily driver, I encrypt for peace of mind. Whatever I end up doing on my machines, I can be pretty confident my data won’t end up in the wrong hands if the drive is stolen or lost and can be erased by simply overwriting the LUKS header. Recovering from an unbootable state or copying files out from an encrypted boot drive only takes a couple more commands compared to an unencrypted setup.

But that’s just me and I’m curious to hear what other reasons to encrypt or not to encrypt are out there.

  • Eager Eagle@lemmy.world
    link
    fedilink
    English
    arrow-up
    83
    arrow-down
    3
    ·
    edit-2
    1 day ago

    I don’t https://xkcd.com/538/

    I’m convinced the chances of me losing access to the data are higher than encryption protecting it from a bad actor.

    Let’s be real, full disk encryption won’t protect a running system and if someone has physical access and really wants it, encryption won’t protect you from the $5 wrench either.

    I do encrypt my phone data though, as someone running away with my phone is more realistic.

    • patatahooligan@lemmy.world
      link
      fedilink
      arrow-up
      46
      ·
      1 day ago

      Who’s gonna come at me with a $5 wrench because they really want my data, though? The attack I’m most likely to experience is someone stealing my laptop while I’m out traveling. That’s what full filesystem encryption solves best.

    • AnAmericanPotato@programming.dev
      link
      fedilink
      English
      arrow-up
      24
      ·
      1 day ago

      I’m not worried about getting raided by the KGB or anything like that, but break-ins happen and my computer equipment would be a prime target for theft.

      I occasionally cycle my backup drives off-site, so I want those encrypted as well.

      The cost of encryption is very close to zero, so I don’t even entertain the question of whether I should encrypt or not. I just encrypt by default.

    • monovergent 🏁@lemmy.mlOP
      link
      fedilink
      arrow-up
      12
      ·
      1 day ago

      Possibly overestimating the value of the data entrusted to me, but whenever I see that xkcd, I like to think that I at least have the option to remain silent and die with dignity if I really don’t want the contents of my disk out there.

      • Auli@lemmy.ca
        link
        fedilink
        English
        arrow-up
        1
        ·
        edit-2
        6 hours ago

        Nothing I have is worth dying over. I’d give up on the first threat.

        Drives in server are not encrypted but backups to the cloud are. Laptop used to but causes to many issues and it doesn’t really leave the house much.

      • plant_based_monero@lemm.ee
        link
        fedilink
        arrow-up
        5
        ·
        23 hours ago

        If I remember correctly, some USA agency said torture is ineffective because you will talk, you like it or not. When you are asking someone for a thing they don’t know they will say a lie just to stop the pain. So I guess anyone will give their password with enough time

    • olympicyes@lemmy.world
      link
      fedilink
      English
      arrow-up
      5
      ·
      24 hours ago

      It should be encrypted by default because most people don’t take care to dispose of their machines responsibly. I picked up a few machines destined for ewaste and the hard drives were full of tax returns.

  • BrianTheeBiscuiteer@lemmy.world
    link
    fedilink
    arrow-up
    23
    arrow-down
    2
    ·
    edit-2
    1 day ago

    I don’t think I encrypt my drives and the main reason is it’s usually not a one-click process. I’m also not sure of the benefits from a personal perspective. If the government gets my drives I assume they’ll crack it in no time. If a hacker gets into my PC or a virus I’m assuming it will run while the drive is in an unencrypted state anyway. So I’m assuming it really only protects me from an unsophisticated attacker stealing my drive or machine.

    Please educate me if I got this wrong.

    Edit: Thanks for the counter points. I’ll look into activating encryption on my machines if they don’t already have it.

    • JubilantJaguar@lemmy.world
      link
      fedilink
      arrow-up
      25
      ·
      1 day ago

      is it’s usually not a one-click process

      It is, these days. Ubuntu and Fedora, for example. But you still have to select it or it won’t happen. PopOS, being explicitly designed for laptops, has it by default.

      If the government gets my drives I assume they’ll crack it in no time.

      Depends on your passphrase. If you follow best practice and go with, say, a 25-character passphrase made up of obscure dictionary words, then no, even a state will not be cracking it quickly at all.

      If a hacker gets into my PC or a virus I’m assuming it will run while the drive is in an unencrypted state anyway.

      Exactly. This is the weak link of disk encryption. You usually need to turn off the machine, i.e. lose the key from memory, in order to get the full benefits. A couple of consolations: (1) In an emergency, you at least have the option of locking it down; just turn it off - even a hard shutdown will do. (2) As you say, only a sophisticated attacker, like the police, will have the skills to break open your screenlocked machine while avoiding any shutdown or reboot.

      Another, less obvious, reason for encrypting: it means you can sell the drive, or laptop, without having to wipe it. Encrypted data is inaccessible, by definition.

      Encryption of personal data should be the default everywhere. Period.

      • monovergent 🏁@lemmy.mlOP
        link
        fedilink
        arrow-up
        12
        ·
        edit-2
        1 day ago

        Well said. LUKS implements AES-256, which is also entrusted by the U.S. government and various other governments to protect data from state and non-state adversaries.

    • PrefersAwkward@lemmy.world
      link
      fedilink
      English
      arrow-up
      17
      ·
      1 day ago

      A big benefit of encryption is that if your stuff is stolen, it adds a lot of time for you to change passwords and invalidate any signed in accounts, email credentials, login sessions, etc.

      This is true even if a sophisticated person steals the computer. If you leave it wide open then they can go right in and copy your cookies, logins, and passwords way faster. But if it’s encrypted, they need to plug your drive into their system and try to crack your stuff, which takes decent time to set up. And the cracking itself, even if it takes only hours, would be even more time you can use to secure your online accounts.

      On Linux, my installs always had a checkbox plus a password form for the encryption.

      • Terces@lemmy.world
        link
        fedilink
        arrow-up
        3
        ·
        1 day ago

        I think this is true for computers that are in danger of being stolen. Laptops or PCs in dorms or other shared living spaces. But I live in a relatively secure area, burglaries are very rare and my PC never leaves the building. So the benefits of encryption are pretty much negligible.

        • tapdattl@lemmy.world
          link
          fedilink
          arrow-up
          6
          ·
          1 day ago

          What are the downsides to encryption? Though you may have negligible benefits, if there are also negligible downsides then the more secure option should be chosen.

            • tapdattl@lemmy.world
              link
              fedilink
              arrow-up
              3
              ·
              1 day ago
              • harddrives can be corrupted, too. That’s where backups come in
              • True, though one could use a security key or password manager to overcome that, or setup secure boot/TPM to where a password isn’t actually needed. If all else fails, again, backups.
              • InFerNo@lemmy.ml
                link
                fedilink
                arrow-up
                1
                ·
                4 hours ago

                So when the laptop dies, the disk cannot be read anywhere because the tpm is lost?

                • tapdattl@lemmy.world
                  link
                  fedilink
                  arrow-up
                  1
                  ·
                  60 minutes ago

                  Correct, the hard disk in the laptop can not be read. This is where having a good backup strategy is important. Similar to how if your hard disk dies you’re no longer able to access the material on the hard disk. For me, the downsides of encryption do not outweigh the benefits of having my data secure.

                  I enabled full disk encryption during OS installation, set up a secure passphrase, and then set up automated encrypted backups to my home server, which are automatically backed up to a remote server.

                  I gain peace of mind in knowing that if my laptop is stolen I’m only out the cost of the laptop, the data within is still safe and secure.

    • InFerNo@lemmy.ml
      link
      fedilink
      arrow-up
      1
      ·
      4 hours ago

      GNOME disks is a nice GUI that lets you setup disks with ease. Encryption can be easily setup with it.

  • NauticalNoodle@lemmy.ml
    link
    fedilink
    arrow-up
    5
    arrow-down
    1
    ·
    edit-2
    24 hours ago

    I used to, but then I nuked my install accidentally and I couldn’t recover the encrypted data. I nuke my installs fairly regularly. I just did again this past week while trying to resize my / and my /home partitions. I’ve resigned myself to only encrypting specific files and directories on demand.

    My phone is fully encrypted though.

    • flatbield@beehaw.org
      link
      fedilink
      English
      arrow-up
      1
      ·
      12 hours ago

      Your recovery problem was a backup issue not an encryption issue. Consider addressing the backup issue.

      • NauticalNoodle@lemmy.ml
        link
        fedilink
        arrow-up
        2
        ·
        edit-2
        11 hours ago

        I have and I’ve concluded that I’m not made of money and therefore can’t afford to have multiple terabyte drives just lying around with redundant data just in case.

        If I could afford it, then I wouldn’t have been resizing my ‘/’ partition to free up 80GB of space.

  • naeap@sopuli.xyz
    link
    fedilink
    arrow-up
    4
    ·
    edit-2
    14 hours ago

    Yeah, on my laptop - because I travel with it and confidential data (like from my customers) could land in hands its not supposed to

    No, in case of my desktop, because it’s easier to access it in case of failure

    • hallettj@leminal.space
      link
      fedilink
      English
      arrow-up
      2
      ·
      1 day ago

      My thinking is similar. I’ve seen this news story more than once:

      laptop stolen containing customer data… hard drive was not encrypted

      I don’t generally have customer data, but it can happen every once in a while.

  • 柊 つかさ@lemmy.world
    link
    fedilink
    arrow-up
    2
    ·
    edit-2
    1 day ago

    I don’t, I didn’t do it back then and I ended up using this system for much longer than I thought I would(4+ years). I want to do it next time but I don’t feel like reinstalling just for that.

      • monovergent 🏁@lemmy.mlOP
        link
        fedilink
        arrow-up
        1
        ·
        1 day ago

        I wish I found a guide like that back when I first made the move to FDE. Regardless, I was adamantly against reinstalling and painstakingly replicating my customizations, so I came up with a hacky way of tacking on FDE.

        It went something along the lines of:

        1. Shrinking the root partition as much as possible
        2. From Live CD, dd root partition to external drive
        3. Perform minimal encrypted install of Debian
        4. From Live CD, open LUKS container of the newly-installed Debian and overwrite the root partition within with my old root partition.
        5. Update fstab, crypttab, initramfs, and grub
        6. Cross my fingers and reboot
  • obsolete@lemmy.dbzer0.com
    link
    fedilink
    English
    arrow-up
    2
    arrow-down
    3
    ·
    edit-2
    20 hours ago

    No. I prefer the quickest way to share my data between different computers and operating systems on my home network. I will also mention that my network is not accessible over the internet.

    • EveryMuffinIsNowEncrypted@lemmy.blahaj.zone
      link
      fedilink
      English
      arrow-up
      1
      ·
      16 hours ago

      Speaking as someone who doesn’t encrypt their desktop but is thinking about it:

      you can’t share (readable) data over one’s home network if the sending PC is disk-encrypted?

      For example, are you saying that if I send a video file from my PC, which is disk-encrypted, over LAN to my NAS, then the NAS would not be able to read said file?

      • flatbield@beehaw.org
        link
        fedilink
        English
        arrow-up
        1
        ·
        edit-2
        11 hours ago

        Disk encryption does not impact file sharing over the network.

        Sure if you sharing by a USB portable drive you have to unlock and lock it every time you use it. That is separate thing though.

        The bigger issues of encryption are one should have a good backup and recovery plan both for media and for the keys. One has to consider legacy planning too. How do your personal representatives access.

  • cmnybo@discuss.tchncs.de
    link
    fedilink
    English
    arrow-up
    36
    ·
    21 hours ago

    I encrypt everything that leaves my house since it could be easily lost or stolen, but it is rather inconvenient.

    If someone breaks into my house, I’ve got bigger problems than someone getting their hands on my media collection. I think it would be more likely for me to mess something up and loose access to my data than for someone to steal it.

    • astronaut_sloth@mander.xyz
      link
      fedilink
      English
      arrow-up
      7
      ·
      1 day ago

      Same here. My desktop is in a controlled environment, so I don’t see a need. Plus, if I do have some sort of issue, I will still be able to access those files.

      Since I actually take my laptop places, I have that encrypted for sure.

    • d00phy@lemmy.world
      link
      fedilink
      English
      arrow-up
      2
      ·
      23 hours ago

      Yeah me too. It goes back to your threat level. How likely is it that someone is going to break into my home to steal my desktop all James Bond-like? The answer is, “not very.” Anything mobile has a significantly higher probability of falling into the wrong hands. These things are encrypted. Even the very old laptop that never leaves my house is encrypted because it could.

  • communism@lemmy.ml
    link
    fedilink
    arrow-up
    19
    ·
    23 hours ago

    I encrypt all my drives. Me and the people I know get occasionally raided by the police. Plus I guess also provides protection for nosy civilians who get their hands on my devices. Unlike most security measures, there is hardly any downside to encrypting your drives—a minor performance hit, not noticeable on modern hardware, and having to type in a password upon boot, which you normally have to do anyway.

    • twinnie@feddit.uk
      link
      fedilink
      arrow-up
      2
      ·
      15 hours ago

      Where do you live that you’re getting raided by the police? This sounds like one of those situations where they might use the wrench technique.

      • communism@lemmy.ml
        link
        fedilink
        arrow-up
        2
        ·
        11 hours ago

        I don’t want to say where I live for anonymity reasons, but I will note that it’s fairly standard for political dissidents to be raided by any government so it doesn’t actually particularly narrow down my location.

        What’s the wrench technique?

          • communism@lemmy.ml
            link
            fedilink
            arrow-up
            1
            ·
            2 hours ago

            Ah lol sure. It depends on what level of state repression you’re looking at. Regular cops will just not bother trying to decrypt a drive if they don’t have the password and you don’t freely give it up (you have the right to refuse to provide a password here, it’s under the same kind of principle as having the right to not incriminate yourself), but I’m sure military intelligence etc will go to the wrench technique. Also deniable encryption for anything particularly sensitive is good for the old wrench technique.

  • utopiah@lemmy.ml
    link
    fedilink
    arrow-up
    16
    ·
    edit-2
    12 hours ago

    No.

    I spend a significant amount of time on other things, e.g. NOT using BigTech, no Facebook, Insta, Google, etc where I would “volunteer” private information for a discount. I do lock the physical door of my house (most of the time, not always) and have a password … but if somebody is eager and skilled enough to break in my home to get my disks, honestly they “deserve” the content.

    It’s a bit like if somebody where to break in and stole my stuff at home, my gadgets or jewelry. Of course I do not welcome it, nor help with it hence the lock on the front door or closed windows, but at some point I also don’t have cameras, alarms, etc. Honestly I don’t think I have enough stuff worth risking breaking in for, both physical and digital. The “stuff” I mostly cherish is relationship with people, skills I learned, arguably stuff I built through those skills … but even that can be built again. So in truth I don’t care much.

    I’d argue security is always a compromise, a trade of between convenience and access. Once you have few things in place, e.g. password, 2nd step auth, physical token e.g. YubiKeyBio, the rest becomes marginally “safer” for significant more hassle.

    • netvor@lemmy.world
      link
      fedilink
      arrow-up
      2
      arrow-down
      1
      ·
      5 hours ago

      but if somebody is eager and skilled enough to break in my home to get my disks, honestly they “deserve” the content.

      The problem with “my disks” is there’s always some other’s people on it, in one way or another.

      But of course, it’s your call. We all have gaps in our “walls” and it’s not like I’d be pretending that LUKS is all that matters.

  • twinnie@feddit.uk
    link
    fedilink
    arrow-up
    16
    ·
    15 hours ago

    I don’t really see the point. If someone’s trying to access my data it’s most likely to be from kind of remote exploit so encryption won’t help me. If someone’s breaks into my house and steals my computer I doubt they’ll be clever enough to do anything with it. I guess there’s the chance that they might sell it online and it gets grabbed by someone who might do something, but most of my important stuff is protected with two factor authentication. It’s getting pretty far fetched that someone might be able to crack all my passwords and access things that way.

    It’s far more likely that it’s me trying to recover data and I’ve forgotten my password for the drive.

  • Uiop@lemmy.dbzer0.com
    link
    fedilink
    arrow-up
    11
    ·
    1 day ago

    i’d really like to. but there is ONE big problem:

    Keyboard layouts.

    seriously

    I hate having to deal with that. when I set up my laptop with ubuntu, I tried at least 3 thymes to make it work, but no matter what I tried I was just locked out of my brand-new system. it cant just be y and z being flipped, I tried that, maybe it was the french keyboard layout (which is absolutely fucked) or something else, but it just wouldnt work.

    On my mint PC I have a similar problem with the default layout having weird extra keys and I just sort of work around that, because fuck dealing with terminals again. (when logged in it works, because I can manually change it to the right one.)

    Now I do have about a TerraByte of storage encrypted, just for the… more sensitive stuff…

    While dealing with the problems I stumbled across a story of a user who had to recover their data using muscle-memory, a broken keyboard, the same model of keyboard and probably a lot of patience. good luck to that guy.

    • herrvogel@lemmy.world
      link
      fedilink
      arrow-up
      2
      ·
      15 hours ago

      Have you tried peppermint or maybe coriander?

      Jokes aside, I believe the password entry stage is before any sort of localization happens, meaning what your keyboard looks like doesn’t matter and the input language defaults to English. You have to type as if you’re using an English keyboard. That’s hardly a good solution if you’re unfamiliar with that layout of course.

      • fossphi@lemm.ee
        link
        fedilink
        English
        arrow-up
        1
        ·
        11 hours ago

        Initrd has support to configure the keyboard layout used. Consult your initrd generator’s documentation for this

  • socphoenix@midwest.social
    link
    fedilink
    arrow-up
    10
    ·
    1 day ago

    I started encrypting once I moved to having a decent number of solid state drives as the tech can theoretically leave blocks unerased once they go bad. Before that my primary risk factor was at end of life recycling which I usually did early so I wasn’t overly concerned about tax documents/passwords etc being left as I’d use dd to write over the platters prior to recycling.

    • flatbield@beehaw.org
      link
      fedilink
      English
      arrow-up
      3
      ·
      edit-2
      1 day ago

      This is the primary reason for me as well. Drive disposal. Also since we only get electronic statements, want to encrypt those.

      • socphoenix@midwest.social
        link
        fedilink
        arrow-up
        1
        ·
        3 hours ago

        This was a few drives ago but there was a point in time when most places were giving me digital copies of tax documents which I could upload to tax prep software but things like TurboTax didn’t have an auto import. So you’d need to download them then re-upload them to the correct service. Now they do it automatically so the only thing that would match that now now is receipts for expenses/donations and what not that I need to keep track of for manual entry.