I’ve enabled full hard drive encryption on all of my devices.

The only exception is my homeserver (mainly running Nextcloud), where all of my personal data is stored.

I’m the only user and have chosen a very strong root- and user password.

From what I’ve researched, the only person who can see my data physically is the super user (aka. me), but if someone else doesn’t have the password, they can’t read anything critical and my personal data are safe from the eyes of others.

Is that correct? If it is, why does LUKS exist?

  • jet@hackertalks.com
    link
    fedilink
    English
    arrow-up
    1
    ·
    1 year ago

    Anyone with physical access to the computer that’s unencrypted can see all of the data. If that’s all right with your threat model then thats ok.

    Having full disc encryption means the data is not available unless somebody has the password, usually guarded by a secure element in the computer itself that limits the number of unlock attempts to something reasonable. So if the device is stolen or copied, the data can’t be used…

    To take the opposite position for a second, even if your server has full disc encryption, if it’s online and attached to a network and unencrypted, it’s still unencrypted. Well the machine is on and doing useful work the full disc encryption only applies to data at rest, anything inside of the operating system sees things unencrypted (I’m talking about the general case here, obviously there’s other things you could do to ensure data is encrypted while the computers on but that’s not what full disc encryption usually means)