this post was submitted on 11 Nov 2025
1449 points (98.7% liked)

linuxmemes

27979 readers
2583 users here now

Hint: :q!


Sister communities:


Community rules (click to expand)

1. Follow the site-wide rules

2. Be civil
  • Understand the difference between a joke and an insult.
  • Do not harrass or attack users for any reason. This includes using blanket terms, like "every user of thing".
  • Don't get baited into back-and-forth insults. We are not animals.
  • Leave remarks of "peasantry" to the PCMR community. If you dislike an OS/service/application, attack the thing you dislike, not the individuals who use it. Some people may not have a choice.
  • Bigotry will not be tolerated.
  • 3. Post Linux-related content
  • Including Unix and BSD.
  • Non-Linux content is acceptable as long as it makes a reference to Linux. For example, the poorly made mockery of sudo in Windows.
  • No porn, no politics, no trolling or ragebaiting.
  • 4. No recent reposts
  • Everybody uses Arch btw, can't quit Vim, <loves/tolerates/hates> systemd, and wants to interject for a moment. You can stop now.
  • 5. 🇬🇧 Language/язык/Sprache
  • This is primarily an English-speaking community. 🇬🇧🇦🇺🇺🇸
  • Comments written in other languages are allowed.
  • The substance of a post should be comprehensible for people who only speak English.
  • Titles and post bodies written in other languages will be allowed, but only as long as the above rule is observed.
  • 6. (NEW!) Regarding public figuresWe all have our opinions, and certain public figures can be divisive. Keep in mind that this is a community for memes and light-hearted fun, not for airing grievances or leveling accusations.
  • Keep discussions polite and free of disparagement.
  • We are never in possession of all of the facts. Defamatory comments will not be tolerated.
  • Discussions that get too heated will be locked and offending comments removed.
  •  

    Please report posts and comments that break these rules!


    Important: never execute code or follow advice that you don't understand or can't verify, especially here. The word of the day is credibility. This is a meme community -- even the most helpful comments might just be shitposts that can damage your system. Be aware, be smart, don't remove France.

    founded 2 years ago
    MODERATORS
     
    you are viewing a single comment's thread
    view the rest of the comments
    [–] tuckerm@feddit.online 195 points 2 days ago (6 children)

    Linux nerds literally only want one thing and it's fucking the idea that your full disk encryption will pay off one day.

    [–] django@discuss.tchncs.de 91 points 2 days ago (1 children)

    It's when your disk breaks and you can just throw it away without worries.

    [–] Sxan@piefed.zip -5 points 1 day ago

    What's þe fun in þat? I bought þe giant electromagnet electric media wiper for a reason.

    [–] bdonvr@thelemmy.club 27 points 2 days ago (2 children)

    It can, but most likely it only would if you're doing illegal shit and get caught. They'd search your place for evidence and FDE could keep them from discovering some things.

    But uh, if they got that far into investigating you then you're probably already screwed.

    [–] communism@lemmy.ml 48 points 2 days ago (1 children)

    Not true at all. Governments regularly raid political dissidents. It's a disciplinary tactic in and of itself. I've been raided for plenty of shit and never been convicted of any crime.

    [–] bdonvr@thelemmy.club 22 points 2 days ago* (last edited 2 days ago) (2 children)

    I mean the average dork not cool people like you (if you're being truthful)

    Persons of interest to governments should always be diligent.

    [–] communism@lemmy.ml 23 points 2 days ago (1 children)

    My point is that raids are for the purpose of gathering evidence. The way it usually works is that the state decides they want to criminalise you for something so they search your place for anything they can use to incriminate you—not vice versa, ie they dont already have enough evidence to incriminate you when they plan the raid.

    I don't know about a majority of people, but with the rise of the far-right across many countries I think it is a significant number of people who are at risk of this, and I think it's rather short-sighted to assume only a small number of "cool people" are affected (thank you though). Like I am a nobody, I'm not famous, and there are lots of political organisers and militants like me you've never heard of being targeted for their political activities. You don't need to be a Snowden to have some degree of state interest in you, and most state repression (raids, incarceration, arrests, etc) is relatively cheap to dish out willy-nilly.

    [–] mlg@lemmy.world 4 points 1 day ago

    I think he's over blowing the 5 dollar wrench method.

    Unless you live in a place where human rights are disregarded like every possible moment, they'd probably only resort to torturing you to gain access if they believe you are somehow connected or have ancillary evidence that points to you. IE that darkweb dude they tortured in Turkey to gain access to his encrypted laptop containing incriminating evidence.

    Otherwise they'll just do a preemptive raid hoping that it leads to new information.

    Like right now border patrol has been forcing foreigners to show data on their mobile devices to see if you have any roasted vance memes so they can turn you away. But in many cases, it has been done because they already had you flagged as posting or sharing roasted vance memes online.

    Of course you could also always be in a craphole country where they'll torture you anyway, regardless if they have any reason to believe you are connected to something, but simply due to the fact that you opted to use FDE or any practical security scheme.

    [–] MummysLittleBloodSlut@lemmy.blahaj.zone 14 points 2 days ago (1 children)

    I know a nice middle aged mum whose house was raided by whatever the Australian SWAT team calls themselves at 2am. She's basically considered a public enemy by the government. And the worst she's ever been accused of is blocking traffic and using water-soluble spray chalk on buildings.

    [–] quinkin@lemmy.world 2 points 1 day ago

    TOU/TORS I think they call them now days.

    [–] kalapala@sopuli.xyz 17 points 2 days ago

    Doesn't need to be a government but just common thiefs getting your computer and selling it to someone who knows what to look for.

    [–] devfuuu@lemmy.world 9 points 1 day ago (1 children)

    It pays off the moment someone steals my bag with the laptop when I leave the office or coffe shop.

    [–] ivanafterall@lemmy.world 3 points 1 day ago

    One of these days! 🤞

    [–] UnderpantsWeevil@lemmy.world 8 points 1 day ago

    your full disk encryption will pay off one day

    They day you fuck up your password one too many times and lock yourself out of your own computer.

    [–] SorryQuick@lemmy.ca 4 points 1 day ago (2 children)

    Is there any reason to do full disk encryption, vs encrypting a single partiton or a folder with eCryptfs? It’s not like your /usr/bin, etc… needs to be encrypted, but encrypting it reduces performance.

    [–] CrackedLinuxISO@lemmy.dbzer0.com 5 points 1 day ago* (last edited 1 day ago) (1 children)

    Suppose you're in some hypothetical country where torrenting is illegal. The presence of /usr/bin/qbittorrent on your disk could be enough to face charges. Unencrypted /var/log? Maybe they can see you've been running a cryptocurrency miner. There could be plenty of data outside of $HOME on your computer which a cop might try to use against you.

    In the most paranoid hypothetical scenario, someone could mount your unencrypted /usr/bin and replace openssl with a compromised version.

    [–] SorryQuick@lemmy.ca 1 points 1 day ago (1 children)

    /var/log and the likes aren’t really issues, I just have mine as a link to the real one in an eCryptfs folder. Though I guess you’d be right about qbittorrent, this is something pretty rare.

    In the most paranoid hypothetical scenario, someone could mount your unencrypted /usr/bin and replace openssl with a compromised version.

    I suppose if you’re in this situation, you have way more important things to deal with. That would imply someone has physical access to your computer, at that point if they really want to know what you’re doing they might as well setup a camera.

    [–] CrackedLinuxISO@lemmy.dbzer0.com 2 points 1 day ago* (last edited 1 day ago) (1 children)

    What I'm getting at is that for people using FDE, any performance hit is worth it compared to worrying that you've covered every angle.

    [–] SorryQuick@lemmy.ca 1 points 1 day ago (1 children)

    By default, most FDE have horrible performance hits and require significant tweaking, configuring and benchmarking to get it right depending on hardware, use cases, conditions… I’m sure there are quite a bunch of people out there who don’t want to do any tweaking while still having the performance they paid for.

    [–] ganryuu@lemmy.ca 2 points 1 day ago

    Unless what you are doing is heavily I/O dependant (mostly heavy database workloads), that's not really true anymore, especially with a modern CPU and say, LUKS encryption. Phoronix has a recent review of FDE using LUKS, and apart from synthetic I/O tests, the difference isn't really observable.

    Try cryptsetup benchmark on your pc and look at the results for aes-xts for example.

    [–] darklamer@lemmy.dbzer0.com 2 points 1 day ago

    Is there any reason to do full disk encryption, vs encrypting a single partiton or a folder with eCryptfs?

    One obvious reason is that it just is very simple to encrypt the entire disk and be done with it.

    [–] chloroken@lemmy.ml 6 points 2 days ago (1 children)

    That's the best part, it can never really "pay off." It can only mitigate. Hardly seems worth it to me. Alas.

    [–] RaivoKulli@sopuli.xyz 11 points 2 days ago (2 children)

    Aren't you worried about your laptop getting stolen?

    [–] chloroken@lemmy.ml 13 points 2 days ago (1 children)

    I personally am only worried about data loss, not data theft. But I do take privacy relatively seriously nonetheless.

    [–] RaivoKulli@sopuli.xyz 3 points 2 days ago

    I use different methods for both. Encryption so all of my logins and personal stuff isn't lost if my laptop is stolen and backups to safeguars the important data.

    [–] MonkderVierte@lemmy.zip 2 points 2 days ago* (last edited 2 days ago) (1 children)

    The important files are encrypted. The browser runs in RAM.

    [–] RaivoKulli@sopuli.xyz 2 points 1 day ago

    I just find it annoying to have to log in every time to sites so I have cookies on the disk