I was recently intrigued to learn that only half of the respondents to a survey said that they used disk encryption. Android, iOS, macOS, and Windows have been increasingly using encryption by default. On the other hand, while most Linux installers I’ve encountered include the option to encrypt, it is not selected by default.

Whether it’s a test bench, beater laptop, NAS, or daily driver, I encrypt for peace of mind. Whatever I end up doing on my machines, I can be pretty confident my data won’t end up in the wrong hands if the drive is stolen or lost and can be erased by simply overwriting the LUKS header. Recovering from an unbootable state or copying files out from an encrypted boot drive only takes a couple more commands compared to an unencrypted setup.

But that’s just me and I’m curious to hear what other reasons to encrypt or not to encrypt are out there.

  • Eager Eagle@lemmy.world
    link
    fedilink
    English
    arrow-up
    55
    arrow-down
    4
    ·
    edit-2
    6 days ago

    I don’t https://xkcd.com/538/

    I’m convinced the chances of me losing access to the data are higher than encryption protecting it from a bad actor.

    Let’s be real, full disk encryption won’t protect a running system and if someone has physical access and really wants it, encryption won’t protect you from the $5 wrench either.

    I do encrypt my phone data though, as someone running away with my phone is more realistic.

    • patatahooligan@lemmy.world
      link
      fedilink
      arrow-up
      37
      ·
      6 days ago

      Who’s gonna come at me with a $5 wrench because they really want my data, though? The attack I’m most likely to experience is someone stealing my laptop while I’m out traveling. That’s what full filesystem encryption solves best.

    • AnAmericanPotato@programming.dev
      link
      fedilink
      English
      arrow-up
      23
      ·
      6 days ago

      I’m not worried about getting raided by the KGB or anything like that, but break-ins happen and my computer equipment would be a prime target for theft.

      I occasionally cycle my backup drives off-site, so I want those encrypted as well.

      The cost of encryption is very close to zero, so I don’t even entertain the question of whether I should encrypt or not. I just encrypt by default.

    • monovergent 🏁@lemmy.mlOP
      link
      fedilink
      arrow-up
      11
      ·
      6 days ago

      Possibly overestimating the value of the data entrusted to me, but whenever I see that xkcd, I like to think that I at least have the option to remain silent and die with dignity if I really don’t want the contents of my disk out there.

      • plant_based_monero@lemm.ee
        link
        fedilink
        arrow-up
        5
        ·
        6 days ago

        If I remember correctly, some USA agency said torture is ineffective because you will talk, you like it or not. When you are asking someone for a thing they don’t know they will say a lie just to stop the pain. So I guess anyone will give their password with enough time

      • Auli@lemmy.ca
        link
        fedilink
        English
        arrow-up
        1
        ·
        edit-2
        5 days ago

        Nothing I have is worth dying over. I’d give up on the first threat.

        Drives in server are not encrypted but backups to the cloud are. Laptop used to but causes to many issues and it doesn’t really leave the house much.

    • olympicyes@lemmy.world
      link
      fedilink
      English
      arrow-up
      5
      ·
      6 days ago

      It should be encrypted by default because most people don’t take care to dispose of their machines responsibly. I picked up a few machines destined for ewaste and the hard drives were full of tax returns.

  • ebd6a8c9051028dc1607@lemmy.ml
    link
    fedilink
    arrow-up
    2
    ·
    4 days ago

    yes. if you live in a country without democracy. it is the only way to protect yourself and your data from nsa agent kicking your door.

    • d00phy@lemmy.world
      link
      fedilink
      English
      arrow-up
      2
      ·
      6 days ago

      Yeah me too. It goes back to your threat level. How likely is it that someone is going to break into my home to steal my desktop all James Bond-like? The answer is, “not very.” Anything mobile has a significantly higher probability of falling into the wrong hands. These things are encrypted. Even the very old laptop that never leaves my house is encrypted because it could.

  • pixeltree@lemmy.blahaj.zone
    link
    fedilink
    arrow-up
    12
    arrow-down
    2
    ·
    5 days ago

    Honestly… Why bother? If someone gains remote access to my system, an encrypted disk won’t help. It’s just a physical access preventer afaik, and I think the risk of that being necessary is very low. Encrypted my work computer because we had to and that environment also made it make more sense, I technically had sensitive customer info on it, though I worked at Oracle so of course they had to make it as convoluted and shitty as possible.

    • data1701d (He/Him)@startrek.website
      link
      fedilink
      English
      arrow-up
      4
      ·
      5 days ago

      You’re somewhat right in the sense that the point of disk encryption is not to protect from remote attackers. However, physical access is a bigger problem in some cases (mostly laptops). I don’t do it on my desktop because I neither want to reinstall nor do I think someone who randomly breaks in is going to put in the effort to lug it away to their vehicle.

    • kixik@lemmy.ml
      link
      fedilink
      arrow-up
      2
      ·
      5 days ago

      Can you explain why if someone get access to your encrypted disk, they would have access to its contents?

      • pixeltree@lemmy.blahaj.zone
        link
        fedilink
        arrow-up
        6
        ·
        5 days ago

        If someone can execute arbitrary code on my computer, it doesn’t matter that the disk is encrypted, because I’ve already booted the machine up and entered the key. I’m certainly not the most cryptographically knowledge but using LUKS on Oracle Linux, I’d enter the key once while starting up, past that point there was no difference between an encrypted and unencrypted system. It seems logical to me, then, that if something can execute arbitrary code, it’s after that point, so encryption won’t matter to it. Encryption is more of a solution to someone physically obtaining your hard drive and preventing them from having access to the contents simply by plugging it into their system.

        Or at least that’s my understanding, please correct me if I’m mistaken.

        • kixik@lemmy.ml
          link
          fedilink
          arrow-up
          2
          ·
          3 days ago

          Well, I think you already mentioned the key thing about encrypting disks. It’s not about protections when the block device is already decrypted and the filesystem already mount. At that point your disks are decrypted and anyone with or without physical access to your device, if gaining any access to it you’re toast. That’s true, but that’s not what disks encryption help you with, and you already mentioned. If you turn off your device, and someone steals it, or gains access to it, they can’t look at your contents, that’s it. That wouldn’t prevent malicious people, to instead plant something through UEFI for example, and you are right about that case. And if you never turn off your computer, and just do sleep to memory, then you depend on how strong your password is, or any other authentication mechanism you have…

  • mvirts@lemmy.world
    link
    fedilink
    arrow-up
    3
    ·
    4 days ago

    I don’t encrypt because it’s too much effort to learn about it.

    Id rather keep my filesystem unencrypted so that I can easily recover from problems and encrypt important files as needed, but let’s be real I don’t do that either.

  • ipkpjersi@lemmy.ml
    link
    fedilink
    arrow-up
    4
    ·
    edit-2
    4 days ago

    I used to, but not anymore, except for my laptop I plan on taking with me travelling. My work laptop and personal laptop are both encrypted.

    I figure my home is safe enough, and I only really need encryption if I’m going to be travelling.

    One of my friends locked himself out of his PC and all his data because he forgot his master password, and I don’t want to do that myself lol

  • utopiah@lemmy.ml
    link
    fedilink
    arrow-up
    13
    ·
    edit-2
    5 days ago

    No.

    I spend a significant amount of time on other things, e.g. NOT using BigTech, no Facebook, Insta, Google, etc where I would “volunteer” private information for a discount. I do lock the physical door of my house (most of the time, not always) and have a password … but if somebody is eager and skilled enough to break in my home to get my disks, honestly they “deserve” the content.

    It’s a bit like if somebody where to break in and stole my stuff at home, my gadgets or jewelry. Of course I do not welcome it, nor help with it hence the lock on the front door or closed windows, but at some point I also don’t have cameras, alarms, etc. Honestly I don’t think I have enough stuff worth risking breaking in for, both physical and digital. The “stuff” I mostly cherish is relationship with people, skills I learned, arguably stuff I built through those skills … but even that can be built again. So in truth I don’t care much.

    I’d argue security is always a compromise, a trade of between convenience and access. Once you have few things in place, e.g. password, 2nd step auth, physical token e.g. YubiKeyBio, the rest becomes marginally “safer” for significant more hassle.

    • netvor@lemmy.world
      link
      fedilink
      arrow-up
      3
      arrow-down
      1
      ·
      5 days ago

      but if somebody is eager and skilled enough to break in my home to get my disks, honestly they “deserve” the content.

      The problem with “my disks” is there’s always some other’s people on it, in one way or another.

      But of course, it’s your call. We all have gaps in our “walls” and it’s not like I’d be pretending that LUKS is all that matters.

  • communism@lemmy.ml
    link
    fedilink
    arrow-up
    17
    ·
    6 days ago

    I encrypt all my drives. Me and the people I know get occasionally raided by the police. Plus I guess also provides protection for nosy civilians who get their hands on my devices. Unlike most security measures, there is hardly any downside to encrypting your drives—a minor performance hit, not noticeable on modern hardware, and having to type in a password upon boot, which you normally have to do anyway.

  • InFerNo@lemmy.ml
    link
    fedilink
    arrow-up
    5
    ·
    5 days ago

    My drives are not encrypted because it’s a hassle if things start going wrong. My NAS is software raid so the individual disks mean nothing anyway. The only drive that is encrypted is my backup disk and I’m not really sure if it was needed.

  • BrianTheeBiscuiteer@lemmy.world
    link
    fedilink
    arrow-up
    14
    arrow-down
    2
    ·
    edit-2
    6 days ago

    I don’t think I encrypt my drives and the main reason is it’s usually not a one-click process. I’m also not sure of the benefits from a personal perspective. If the government gets my drives I assume they’ll crack it in no time. If a hacker gets into my PC or a virus I’m assuming it will run while the drive is in an unencrypted state anyway. So I’m assuming it really only protects me from an unsophisticated attacker stealing my drive or machine.

    Please educate me if I got this wrong.

    Edit: Thanks for the counter points. I’ll look into activating encryption on my machines if they don’t already have it.

    • JubilantJaguar@lemmy.world
      link
      fedilink
      arrow-up
      18
      ·
      6 days ago

      is it’s usually not a one-click process

      It is, these days. Ubuntu and Fedora, for example. But you still have to select it or it won’t happen. PopOS, being explicitly designed for laptops, has it by default.

      If the government gets my drives I assume they’ll crack it in no time.

      Depends on your passphrase. If you follow best practice and go with, say, a 25-character passphrase made up of obscure dictionary words, then no, even a state will not be cracking it quickly at all.

      If a hacker gets into my PC or a virus I’m assuming it will run while the drive is in an unencrypted state anyway.

      Exactly. This is the weak link of disk encryption. You usually need to turn off the machine, i.e. lose the key from memory, in order to get the full benefits. A couple of consolations: (1) In an emergency, you at least have the option of locking it down; just turn it off - even a hard shutdown will do. (2) As you say, only a sophisticated attacker, like the police, will have the skills to break open your screenlocked machine while avoiding any shutdown or reboot.

      Another, less obvious, reason for encrypting: it means you can sell the drive, or laptop, without having to wipe it. Encrypted data is inaccessible, by definition.

      Encryption of personal data should be the default everywhere. Period.

      • monovergent 🏁@lemmy.mlOP
        link
        fedilink
        arrow-up
        10
        ·
        edit-2
        6 days ago

        Well said. LUKS implements AES-256, which is also entrusted by the U.S. government and various other governments to protect data from state and non-state adversaries.

    • PrefersAwkward@lemmy.world
      link
      fedilink
      English
      arrow-up
      9
      ·
      6 days ago

      A big benefit of encryption is that if your stuff is stolen, it adds a lot of time for you to change passwords and invalidate any signed in accounts, email credentials, login sessions, etc.

      This is true even if a sophisticated person steals the computer. If you leave it wide open then they can go right in and copy your cookies, logins, and passwords way faster. But if it’s encrypted, they need to plug your drive into their system and try to crack your stuff, which takes decent time to set up. And the cracking itself, even if it takes only hours, would be even more time you can use to secure your online accounts.

      On Linux, my installs always had a checkbox plus a password form for the encryption.

      • Terces@lemmy.world
        link
        fedilink
        arrow-up
        3
        ·
        6 days ago

        I think this is true for computers that are in danger of being stolen. Laptops or PCs in dorms or other shared living spaces. But I live in a relatively secure area, burglaries are very rare and my PC never leaves the building. So the benefits of encryption are pretty much negligible.

        • tapdattl@lemmy.world
          link
          fedilink
          arrow-up
          4
          ·
          6 days ago

          What are the downsides to encryption? Though you may have negligible benefits, if there are also negligible downsides then the more secure option should be chosen.

            • tapdattl@lemmy.world
              link
              fedilink
              arrow-up
              4
              ·
              6 days ago
              • harddrives can be corrupted, too. That’s where backups come in
              • True, though one could use a security key or password manager to overcome that, or setup secure boot/TPM to where a password isn’t actually needed. If all else fails, again, backups.
              • InFerNo@lemmy.ml
                link
                fedilink
                arrow-up
                1
                ·
                5 days ago

                So when the laptop dies, the disk cannot be read anywhere because the tpm is lost?

                • tapdattl@lemmy.world
                  link
                  fedilink
                  arrow-up
                  3
                  ·
                  5 days ago

                  Correct, the hard disk in the laptop can not be read. This is where having a good backup strategy is important. Similar to how if your hard disk dies you’re no longer able to access the material on the hard disk. For me, the downsides of encryption do not outweigh the benefits of having my data secure.

                  I enabled full disk encryption during OS installation, set up a secure passphrase, and then set up automated encrypted backups to my home server, which are automatically backed up to a remote server.

                  I gain peace of mind in knowing that if my laptop is stolen I’m only out the cost of the laptop, the data within is still safe and secure.

    • InFerNo@lemmy.ml
      link
      fedilink
      arrow-up
      1
      ·
      5 days ago

      GNOME disks is a nice GUI that lets you setup disks with ease. Encryption can be easily setup with it.

  • hperrin@lemmy.ca
    link
    fedilink
    English
    arrow-up
    2
    ·
    4 days ago

    Yep. Everything except my server, which needs to be able to boot without my help. Because why not? I rarely ever reboot anything, so it doesn’t really hurt, and if anyone steals my shit they won’t get my wife’s noods.

  • Omega_Jimes@lemmy.ca
    link
    fedilink
    arrow-up
    7
    arrow-down
    1
    ·
    5 days ago

    I used to, but it’s proven to be a pain more often than a blessing. I’m also of the opinion that if a bad actor capable of navigating the linux file system and getting my information from it has physical access to my disk, it’s game over anyway.

    • ShortN0te@lemmy.ml
      link
      fedilink
      arrow-up
      3
      ·
      5 days ago

      I’m also of the opinion that if a bad actor capable of navigating the linux file system and getting my information from it has physical access to my disk, it’s game over anyway.

      I am sorry but that is BS. Encryption is not easy to break like in some Movies.

      If you are referring to that a bad actor breaks in and modifies your hardware with for example a keylogger/sniffer or something then that is something disk encryption does not really defend against.

      • Omega_Jimes@lemmy.ca
        link
        fedilink
        arrow-up
        4
        ·
        5 days ago

        That’s more what I mean. They won’t break the encryption, but at that point with physical access to my home/ computer/ servers, I have bigger problems.

        There’s very little stored locally that could be worse than a situation where someone has physical access to my machine.

  • jollyrogue@lemmy.ml
    link
    fedilink
    arrow-up
    2
    ·
    4 days ago

    I do encrypt my drives, and it’s not as transparent in Linux as it is in the others. I’m sure I could get a TPM setup for seamless boots, but I haven’t done that yet.

    For mobile drivers, I still encrypt, but that locks them to one OS since LUKS isn’t cross platform. There is VeraCrypt for cross-platform encryption, but that’s one more thing to manage and install.

  • Anonymouse@lemmy.world
    link
    fedilink
    English
    arrow-up
    2
    ·
    4 days ago

    I do on all my devices that can as a matter of practice, not for any real threat. I’m interested to learn about how to set it up and use it on a daily basis including how to do system recoveries. I guess it’s largely academic.

    Once I switched to linux as my daily driver, I didn’t have a need to do piracy anymore since all the software I need is FOSS.