this post was submitted on 12 Oct 2025
318 points (98.2% liked)

Privacy

42578 readers
850 users here now

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

Related communities

much thanks to @gary_host_laptop for the logo design :)

founded 6 years ago
MODERATORS
 

This makes a world of difference. I know many people may know of it but may not actually do it. It Protects your files in case your computer is ever stolen and prevents alphabet agencies from just brute forcing into your Laptop or whatever.

I found that Limine (bootloader) has the fastest decryption when paired with LUKS at least for my laptop.

If your computer isn't encrypted I could make a live USB of a distro, plug it into your computer, boot, and view your files on your hard drive. Completely bypassing your Login manager. If your computer is encrypted I could not. Use a strong password and different from your login

Benefits of Using LUKS with GRUB Enhanced Security

  • Data Protection: LUKS (Linux Unified Key Setup) encrypts disk partitions, ensuring that data remains secure even if the physical device is stolen.
  • Full Disk Encryption: It can encrypt the entire disk, including sensitive files and swap space, preventing unauthorized access to confidential information.

Compatibility with GRUB

  • Unlocking from Bootloader: GRUB can unlock LUKS-encrypted partitions using the cryptomount command, allowing the system to boot securely without exposing sensitive data.
  • Support for LVM: When combined with Logical Volume Management (LVM), LUKS allows for flexible partition management while maintaining encryption.
you are viewing a single comment's thread
view the rest of the comments
[–] notabot@piefed.social 40 points 4 days ago (4 children)

Encrypting your drives is a very sensible step to take, and it's so low effort that it's a no brainer in most cases. It'll stop casual thieves stealing you machine and reading your files, and combining your password with a TPM encrypted one will mean your data isn't readable on any machine except yours, even if the attacker has your password, which adds a little extra protection.

Unfortunately, none of that protects you against an adversary who is willing to kidnap and torture you to get your files. At that point you have to make a choice, which is more important; your files or your life/not being tortured. Fortunately, most people will never be in that situation, so should encrypt their drives and accept they'll reveal their encryption passphrase if taken hostage/arrested.

[–] fruitycoder@sh.itjust.works 10 points 4 days ago (2 children)

A more common case I've heard of is law enforcement using face id without permission. They can also compel people to give up passwords too which is why duress passwords and panic buttons exist to wipe everything

[–] notabot@piefed.social 17 points 4 days ago

You want to think very carefully before giving a duress password, or using a destructive panic button when dealing with law enforcement. If you do, you will be charged with, at least, destruction of evidence. You have to decide if your data is worth that. A duress password that only decrypts part of your data is probably safer if twinned with deniable encryption, although you still risk legal trouble.

[–] Renohren@lemmy.today 10 points 4 days ago* (last edited 4 days ago)

This is in the US, in a lot of countries, even in EU ones, refusing to reveal your password is used as part of the case against you (not as proof but as a suspicious attitude that can, combined with other facts, bring a certainty of culpability).

So be careful and check out your local laws before following US laws concerning this.

[–] dRLY@lemmy.ml 3 points 3 days ago (1 children)

If they are willing to torture you to get the data. Then there is also a very real chance that you would still get the same treatment or just killed even if you give the password.

[–] notabot@piefed.social 3 points 3 days ago

That's absolutely possible, but there's not much you can do about that really. My point was simply in response to OP's assertion about encryption protecting your data from 'alphabet agencies'. It wont because it is very unlikely you consider keeping your data confidential more important than your life.

[–] lunatique@lemmy.ml 5 points 4 days ago (1 children)

Yeah thanks pal. It helps you from someone who doesn't know your password. You all give the most extreme examples. That example applies to biometrics, normal passwords without encryption, bank pins, etc. What was the point of saying it? What technology would help you from that

[–] notabot@piefed.social 5 points 4 days ago* (last edited 4 days ago) (2 children)

I was actually largely agreeing with you, but responding to the bit where you said:

It Protects your files in case your computer is ever stolen and prevents alphabet agencies from just brute forcing into your Laptop or whatever.

It'll stop alphabet agencies from brute forcing it, sure, but that's not how they would approach extracting the information.

I see ~~~you've~~~ the mod has deleted this comment thread though, so it's unlikely anyone else will see it.

As to your question about what technology would stop it, I think you may need to think differently as no technology will stop a determined enough opponent torturing you for a password, but they're much more likely to attempt a malware style attack against you to skip all that bother. So countermeasures would involve a well locked down system (think about things like SELinux with MLS enabled and using VMs to isolate processes) and good information hygiene practices to reduce the risk of infection and the risk of it spreading if you are infected.

[–] ReversalHatchery@beehaw.org 3 points 4 days ago

the thread is visible here, just a single comment was deleted

[–] BrilliantantTurd4361@sh.itjust.works 0 points 2 days ago (1 children)

There is 0 chance tpms arent back doored.

[–] notabot@piefed.social 2 points 2 days ago

Given its nature and functionality, it's hard to see how the TPM subsystem itself could be backdoored in any meaningful fashion without the rest of the CPU also being compromised. Whilst that is certainly possible, and the remote management engines (IME and such) almost certainly are, it seems more likely to me that the encryption algorythms themselves are deliberately weakened in some way. The NSA, famously, have done that sort of thing before, subtly influencing aspects of the design of cryptographic systems to make them easier for them to break. It would not surprise me, for example, to discover that the supposedly random key material is actually linked to something like your CPU's ID.

None-the-less, using functionality help prevent someone who has your password, but isn't a government actor, decrypting your data.