1 |
Dale wrote: |
2 |
> |
3 |
> |
4 |
> My take. Bad password, easy to guess, easy to crack because it is |
5 |
> simple or common; not very secure even if the password is changed |
6 |
> since one could use the old password in certain situations and get at |
7 |
> the data. Good strong password, changed or not; hard to crack even if |
8 |
> the whole drive is taken. |
9 |
> |
10 |
> Moral of the story. Have a good strong password and keep your mouth |
11 |
> shut about what the password is, unless you want that person to spill |
12 |
> the beans. Or you plan to knock them off later. ROFLMBO |
13 |
> |
14 |
> I'm not storing the secrets to some new weapon that will destroy the |
15 |
> world and everything on it, including the roaches. Well, that last |
16 |
> one might be OK. lol I just want it so that when I fall into the |
17 |
> cremation chamber or a cemetery plot, it won't be easy for a person to |
18 |
> access the drive. I'm good at the keeping password to myself bit. |
19 |
> Still thinking on killing all the roaches tho . I'd keep that secure |
20 |
> but I wouldn't mind being rid of those. :/ |
21 |
> |
22 |
> I think I need to watch a youtube video on this tho. I want to watch |
23 |
> a person not only install it but actually use it. For example, what |
24 |
> triggers it asking for a password and what does it look like? Is it |
25 |
> pretty fast, take a few seconds or what? I got a lot of questions but |
26 |
> they are things that can't be answered easily in text. Yea, gotta go |
27 |
> visit youtube. Test drive youtube-dl again. |
28 |
> |
29 |
> Dale |
30 |
> |
31 |
> :-) :-) |
32 |
|
33 |
|
34 |
OK. Found some videos and jeez, there is a ton of ways to use this. |
35 |
You can have a password, a key file, both or likely other options as |
36 |
well. On one video, the guy generated a key file with urandom that was |
37 |
1024 characters. As he put it, try typing that in. Anyway, he put the |
38 |
file in / and used the file to mount the thing automatically after some |
39 |
setup. If however he goes to another puter, either you have to have that |
40 |
key file on it to or type in the password. He also set it up to mount |
41 |
automatically. |
42 |
|
43 |
Then I found out about crypttab. I don't have that on my system, yet. |
44 |
I was wondering how the system would know when a drive or partition was |
45 |
encrypted or not. Well, there you go. Once crypttab and fstab are set |
46 |
up, it can mount automatically. Well neato. ;-) |
47 |
|
48 |
When watching a video or two, I had to google some things. I run up on |
49 |
zulucrypt. It's a GUI that can handle several different encryption |
50 |
tools. Yes, one should at least be familiar with command line just in |
51 |
case the GUI doesn't work but having a GUI does make it easier. |
52 |
|
53 |
I still don't think I'm ready to try and do this on a hard drive. I'm |
54 |
certainly not going to do this with /home yet. Between this thread and |
55 |
a few videos, pictures says a lot, it's starting to make sense. I also |
56 |
noticed, it is really fast. One may need a stopwatch to even notice it |
57 |
is encrypted at all. |
58 |
|
59 |
I notice that one can use different encryption tools. I have Blowfish, |
60 |
Twofish, AES and sha*** as well as many others. I know some have been |
61 |
compromised. Which ones are known to be secure? I seem to recall that |
62 |
after Snowden some had to be redone and some new ones popped up to make |
63 |
sure they were secure. Thoughts?? |
64 |
|
65 |
Dale |
66 |
|
67 |
:-) :-) |