I was recently intrigued to learn that only half of the respondents to a survey said that they used disk encryption. Android, iOS, macOS, and Windows have been increasingly using encryption by default. On the other hand, while most Linux installers I’ve encountered include the option to encrypt, it is not selected by default.

Whether it’s a test bench, beater laptop, NAS, or daily driver, I encrypt for peace of mind. Whatever I end up doing on my machines, I can be pretty confident my data won’t end up in the wrong hands if the drive is stolen or lost and can be erased by simply overwriting the LUKS header. Recovering from an unbootable state or copying files out from an encrypted boot drive only takes a couple more commands compared to an unencrypted setup.

But that’s just me and I’m curious to hear what other reasons to encrypt or not to encrypt are out there.

  • BrianTheeBiscuiteer@lemmy.world
    link
    fedilink
    arrow-up
    1
    ·
    edit-2
    5 months ago

    I don’t think I encrypt my drives and the main reason is it’s usually not a one-click process. I’m also not sure of the benefits from a personal perspective. If the government gets my drives I assume they’ll crack it in no time. If a hacker gets into my PC or a virus I’m assuming it will run while the drive is in an unencrypted state anyway. So I’m assuming it really only protects me from an unsophisticated attacker stealing my drive or machine.

    Please educate me if I got this wrong.

    Edit: Thanks for the counter points. I’ll look into activating encryption on my machines if they don’t already have it.

    • JubilantJaguar@lemmy.world
      link
      fedilink
      arrow-up
      0
      ·
      5 months ago

      is it’s usually not a one-click process

      It is, these days. Ubuntu and Fedora, for example. But you still have to select it or it won’t happen. PopOS, being explicitly designed for laptops, has it by default.

      If the government gets my drives I assume they’ll crack it in no time.

      Depends on your passphrase. If you follow best practice and go with, say, a 25-character passphrase made up of obscure dictionary words, then no, even a state will not be cracking it quickly at all.

      If a hacker gets into my PC or a virus I’m assuming it will run while the drive is in an unencrypted state anyway.

      Exactly. This is the weak link of disk encryption. You usually need to turn off the machine, i.e. lose the key from memory, in order to get the full benefits. A couple of consolations: (1) In an emergency, you at least have the option of locking it down; just turn it off - even a hard shutdown will do. (2) As you say, only a sophisticated attacker, like the police, will have the skills to break open your screenlocked machine while avoiding any shutdown or reboot.

      Another, less obvious, reason for encrypting: it means you can sell the drive, or laptop, without having to wipe it. Encrypted data is inaccessible, by definition.

      Encryption of personal data should be the default everywhere. Period.

  • twinnie@feddit.uk
    link
    fedilink
    arrow-up
    1
    ·
    5 months ago

    I don’t really see the point. If someone’s trying to access my data it’s most likely to be from kind of remote exploit so encryption won’t help me. If someone’s breaks into my house and steals my computer I doubt they’ll be clever enough to do anything with it. I guess there’s the chance that they might sell it online and it gets grabbed by someone who might do something, but most of my important stuff is protected with two factor authentication. It’s getting pretty far fetched that someone might be able to crack all my passwords and access things that way.

    It’s far more likely that it’s me trying to recover data and I’ve forgotten my password for the drive.

  • utopiah@lemmy.ml
    link
    fedilink
    arrow-up
    1
    ·
    edit-2
    5 months ago

    No.

    I spend a significant amount of time on other things, e.g. NOT using BigTech, no Facebook, Insta, Google, etc where I would “volunteer” private information for a discount. I do lock the physical door of my house (most of the time, not always) and have a password … but if somebody is eager and skilled enough to break in my home to get my disks, honestly they “deserve” the content.

    It’s a bit like if somebody where to break in and stole my stuff at home, my gadgets or jewelry. Of course I do not welcome it, nor help with it hence the lock on the front door or closed windows, but at some point I also don’t have cameras, alarms, etc. Honestly I don’t think I have enough stuff worth risking breaking in for, both physical and digital. The “stuff” I mostly cherish is relationship with people, skills I learned, arguably stuff I built through those skills … but even that can be built again. So in truth I don’t care much.

    I’d argue security is always a compromise, a trade of between convenience and access. Once you have few things in place, e.g. password, 2nd step auth, physical token e.g. YubiKeyBio, the rest becomes marginally “safer” for significant more hassle.

  • cmnybo@discuss.tchncs.de
    link
    fedilink
    English
    arrow-up
    1
    ·
    5 months ago

    I encrypt everything that leaves my house since it could be easily lost or stolen, but it is rather inconvenient.

    If someone breaks into my house, I’ve got bigger problems than someone getting their hands on my media collection. I think it would be more likely for me to mess something up and loose access to my data than for someone to steal it.

  • JubilantJaguar@lemmy.world
    link
    fedilink
    arrow-up
    0
    ·
    5 months ago

    Absolutely. LUKS full disk encryption. Comes as an opt-in checkbox on Ubuntu, for example.

    And I too cannot understand why this is not opt-out rather than opt-in. Apparently we’ve decided that only normies on corporate spyware OSs need security, and we don’t.

    • catloaf@lemm.ee
      link
      fedilink
      English
      arrow-up
      0
      ·
      5 months ago

      Because when shit breaks nobody wants to hear that their data is gone forever

    • SavvyWolf@pawb.social
      link
      fedilink
      English
      arrow-up
      0
      ·
      5 months ago

      There is a major downside to encryption: If you forget your password or your tpm fails and you’ve not backed things up, then that data is gone forever. If someone doesn’t have anything incriminating or useful to theives on their device, the easier reparability might justify not enabling it.

  • BioMyth@lemmy.ml
    link
    fedilink
    English
    arrow-up
    0
    ·
    5 months ago

    I don’t for a pretty simple reason. I have a wife, if something ever happened to me then she could end up a creek without a paddle. So by not having it encrypted then, anyone kinda technical can just pull data off the drive.

    • JubilantJaguar@lemmy.world
      link
      fedilink
      arrow-up
      0
      ·
      5 months ago

      If that’s the only reason, it’s not a great one. You could solve it by storing the password with your important documents.

  • Eager Eagle@lemmy.world
    link
    fedilink
    English
    arrow-up
    1
    arrow-down
    1
    ·
    edit-2
    5 months ago

    I don’t https://xkcd.com/538/

    I’m convinced the chances of me losing access to the data are higher than encryption protecting it from a bad actor.

    Let’s be real, full disk encryption won’t protect a running system and if someone has physical access and really wants it, encryption won’t protect you from the $5 wrench either.

    I do encrypt my phone data though, as someone running away with my phone is more realistic.

    • patatahooligan@lemmy.world
      link
      fedilink
      arrow-up
      1
      ·
      5 months ago

      Who’s gonna come at me with a $5 wrench because they really want my data, though? The attack I’m most likely to experience is someone stealing my laptop while I’m out traveling. That’s what full filesystem encryption solves best.