On 02/06/2014 11:48, Dale wrote:
> Neil Bothwick wrote:
>> On Mon, 02 Jun 2014 11:24:35 +0200, Volker Armin Hemmann wrote:
>>
>>>> I'm considering encrypting my home partition one of these days.    
>>> why? if you are hacked, they just read what you are reading. Encryption
>>> does not help you there at all.
>> It helps if your computer is stolen. This is more, but not only, relevant
>> to laptops.
>>
>>
> 
> I admit, I have never used encryption like this before.  I am assuming
> that if I logout of my GUI, then it is encrypted at that point?  Once I
> log back in, it decrypts it again?  Am I at least close? 

All disk encryption works to this general plan:

You log in (or boot up), the system asks for a password/key or whatever,
then unlocks the encryption used. Reads for the disk are decrypted on
the fly, writes are encrypted on the fly. What is on disk is always in
an encrypted state.

Safety depends on how you set it up - if you use full disk encryption
then you must unlock it at boot time. The disk is still readable until
you power off or reboot.

If you encrypt your home directory then you unlock it when you log in so
logging out of your DE safely locks things again.

You most likely want the second option, the odds that you have a valid
need to protect /usr and /opt are not good. As a regular user out there,
the stuff you want to protect is in /home (or you could easily move it
to /home). You'd also want to encrypt /tmp and swap as your running apps
often write secret stuff there (like ssh and gpg sockets) - that is
really just an extension of why you want to encrpyt /home itself


> I do have a desktop system.  No lappy, yet anyway.  Maybe one of these days.
> 
> Dale
> 
> :-)  :-)
> 


-- 
Alan McKinnon
[email protected]


Reply via email to