

How comes? XTS mode for block chiphers was specifically designed for this very purpose, why do you claim it doesn't work?No, I think FDE is a big nonsense, because it doesnt prevent you from offline tampering.
Is the overhead of setting up selective encryption and the risk of mistakes worth saving a few CPU cycles?I wonder, is full disk encryption worth the overhead versus selective file encryption?




None of the data I care about is stored on that machine, it's on bigger iron that's physically secure enough I'd have much bigger problems to deal with if it were stolen or misplaced.eccerr0r wrote:It's not that the machine is valuable, it's whether the data on it is valuable

If you use the logon process to decrypt the directories (e.g. using the login password), at a first level, the user needs to be logged on for other users such as cron to read their files.eccerr0r wrote:...BTW with fscrypt, how does it deal with user cron jobs? Does it maintain keys in ram to allow this or will users need to relog on reboot to allow their cron jobs to run?...

Crontabs are stored under /var/spool/cron/crontabs/, so not in home. I suppose they could be excluded from encryption. It is an attack vector, though probably no worse than unencrypted root.BTW with fscrypt, how does it deal with user cron jobs?
Code: Select all
init=/sbin/openrc-init
-systemd -logind -elogind seatdI am NaN! I am a man!
