I was recently intrigued to learn that only half of the respondents to a survey said that they used disk encryption. Android, iOS, macOS, and Windows have been increasingly using encryption by default. On the other hand, while most Linux installers I’ve encountered include the option to encrypt, it is not selected by default.

Whether it’s a test bench, beater laptop, NAS, or daily driver, I encrypt for peace of mind. Whatever I end up doing on my machines, I can be pretty confident my data won’t end up in the wrong hands if the drive is stolen or lost and can be erased by simply overwriting the LUKS header. Recovering from an unbootable state or copying files out from an encrypted boot drive only takes a couple more commands compared to an unencrypted setup.

But that’s just me and I’m curious to hear what other reasons to encrypt or not to encrypt are out there.

  • data1701d (He/Him)@startrek.website
    link
    fedilink
    English
    arrow-up
    3
    ·
    1 day ago

    Do your servers have TPM? Clevis might be the way to go; I use it on my Thinkpad and it makes my life easy. If the servers don’t have TPM, Clevis also supports this weird thing called Tang, which from what I can tell basically assures that the servers can only be automatically decrypted on your local network. If Clevis fails, you can have it fall back to letting you enter the LVM password.

    • ocean@lemmy.selfhostcat.com
      link
      fedilink
      English
      arrow-up
      2
      ·
      1 day ago

      I have not tried any of those three things: TPM, Clevis, or Tang. Thanks for recommending.

      I tried to setup a keyfile on /, /boot, and /root.

      I tried a keyfile on a usb

      I also tried to use dropbear to allow ssh unlock.

      Sadly these didn’t work and drove me crazy for two nights.