this post was submitted on 24 Dec 2025
849 points (98.6% liked)

linuxmemes

28596 readers
994 users here now

Hint: :q!


Sister communities:


Community rules (click to expand)

1. Follow the site-wide rules

2. Be civil
  • Understand the difference between a joke and an insult.
  • Do not harrass or attack users for any reason. This includes using blanket terms, like "every user of thing".
  • Don't get baited into back-and-forth insults. We are not animals.
  • Leave remarks of "peasantry" to the PCMR community. If you dislike an OS/service/application, attack the thing you dislike, not the individuals who use it. Some people may not have a choice.
  • Bigotry will not be tolerated.
  • 3. Post Linux-related content
  • Including Unix and BSD.
  • Non-Linux content is acceptable as long as it makes a reference to Linux. For example, the poorly made mockery of sudo in Windows.
  • No porn, no politics, no trolling or ragebaiting.
  • Don't come looking for advice, this is not the right community.
  • 4. No recent reposts
  • Everybody uses Arch btw, can't quit Vim, <loves/tolerates/hates> systemd, and wants to interject for a moment. You can stop now.
  • 5. πŸ‡¬πŸ‡§ Language/язык/Sprache
  • This is primarily an English-speaking community. πŸ‡¬πŸ‡§πŸ‡¦πŸ‡ΊπŸ‡ΊπŸ‡Έ
  • Comments written in other languages are allowed.
  • The substance of a post should be comprehensible for people who only speak English.
  • Titles and post bodies written in other languages will be allowed, but only as long as the above rule is observed.
  • 6. (NEW!) Regarding public figuresWe all have our opinions, and certain public figures can be divisive. Keep in mind that this is a community for memes and light-hearted fun, not for airing grievances or leveling accusations.
  • Keep discussions polite and free of disparagement.
  • We are never in possession of all of the facts. Defamatory comments will not be tolerated.
  • Discussions that get too heated will be locked and offending comments removed.
  • Β 

    Please report posts and comments that break these rules!


    Important: never execute code or follow advice that you don't understand or can't verify, especially here. The word of the day is credibility. This is a meme community -- even the most helpful comments might just be shitposts that can damage your system. Be aware, be smart, don't remove France.

    founded 2 years ago
    MODERATORS
     
    top 50 comments
    sorted by: hot top controversial new old
    [–] Taleya@aussie.zone 26 points 1 day ago

    "I know you're on holiday but can't log into the vpn and a third party tech i hired needs your password for the pfsense"

    Actual words said to me last week. Hollyyy shit.

    [–] shadowtofu@discuss.tchncs.de 28 points 1 day ago (3 children)

    One has to find the right balance between security and comfort, and this entirely depends on the threat model one has. Nowadays, I will always enable full-disk encryption on all of my devices, even if I then decide to store the keys in TPM and unlock the disk at boot.

    I have at least 5 half-broken HDDs sitting around, completely unencrypted, I have no idea if they still work, but they are surely full of private data that I would like to have purged. I fear mechanical destruction might be the only solution for some of them, but just wiping them manually is more effort than doing nothing, so I guess they will still be around for some time. And with SSDs, there is no reliableway delete all data.

    With encryption? Just delete the key and you are done.

    The threat model changes in the future? Easy, the data is already encrypted.

    [–] BCsven@lemmy.ca 6 points 1 day ago

    I thought there was a table method of "destruction". Like you delete or destroy the table of allocation. Even though the data is on the SSD, its not contiguous like HDD and so its spread into bits everywhere. However failing that, leave them unplugged (unpowered) and in 70Β°C plus heat, the bits will lose their electrons rapidly.

    [–] foggy@lemmy.world 12 points 1 day ago

    With encryption? Just delete the key and you are done.

    This is true. For now...

    [–] Logical@lemmy.world 6 points 1 day ago (1 children)

    I have been trying to understand what it is that makes it impossible to reliably wipe an SSD, compared to an HDD. Why wouldn't filling the drive with 0s work?

    [–] JP1@musicworld.social 10 points 1 day ago (1 children)

    @Logical @shadowtofu
    The SSD controller does not overwrite the old physical location (unlike HDD).

    It writes the new data to a different physical block.

    The old block becomes β€œstale” but still contains your original data until the SSD decides to erase it later.

    [–] Logical@lemmy.world 8 points 1 day ago (1 children)

    But if I fill a drive with nonsense data, whether SSD or HDD, shouldn't it be forced to write such data to all possible locations, thus overwriting the original data? Is am I misunderstanding something more fundamental about how this type of storage works?

    [–] JP1@musicworld.social 11 points 1 day ago (1 children)

    @Logical Filling an SSD with zeros only affects the logical address space visible to your OSβ€”it doesn't force the controller to erase every physical block. The old data remains in unmapped or retired areas until (or unless) the controller decides to erase it later, potentially allowing recovery with specialized tools. Some SSDs might even optimize by not physically writing zeros if they detect a full block of them, simply marking the space as erased without touching the hardware.

    [–] Logical@lemmy.world 5 points 1 day ago (1 children)

    See what I'm still not getting though, is how there can still be unmapped or retired areas, if the drive has been filled with (meaningless) data? Let's say it isn't all zeros, but random data instead. Are there more physical blocks than is represented logically by the adress space exposed to the OS?

    [–] lucullus@discuss.tchncs.de 12 points 1 day ago (1 children)

    On big flash memory you typically have more memory on the chips, than ia presented to the OS. Flash has significantly less write cycles, before the block breaks, so the controller monitors the health and won't use it anymore when it will soon fail. Instead it uses a block from its unused extra space. (Details might be different, I'm not sure about that). This way the lifetime of the SSD is significantly improved. SD cards do the same, I think.

    So the data in the retired blocks will remain and cannot be overwritten by the OS. If they are encrypted and the keys deleted, that won't matter

    [–] Logical@lemmy.world 1 points 1 day ago

    Okay, that makes a lot more sense then. Thanks!

    [–] Allero@lemmy.today 23 points 1 day ago (2 children)

    My favorite is KDE asking for user password upon waking from sleep even if you have autologin enabled.

    So, all you have to do to circumvent the login window is to reboot.

    [–] Feathercrown@lemmy.world 6 points 1 day ago (1 children)

    Well, I suppose it protects your session

    [–] Allero@lemmy.today 3 points 1 day ago

    Fair enough

    [–] otto@feddit.org 9 points 1 day ago

    yeah I also have this enabled. With disc encryption that you have to enter on reboot, it makes sense

    [–] Luminous5481@anarchist.nexus 147 points 2 days ago (4 children)

    Encrypt whole hard drive?
    Yes.

    Log in automatically?
    Yes.

    [–] illusionist@lemmy.zip 37 points 2 days ago (2 children)

    TPM or put a keyfile on the boot partition or into the initrd.

    [–] Luminous5481@anarchist.nexus 30 points 2 days ago

    That would be the easiest solution, since it's offered during install with many distros.

    [–] Tundra@sh.itjust.works 23 points 2 days ago (1 children)

    this is the way

    (blank kwallet password + autologin)

    load more comments (1 replies)
    [–] saltesc@lemmy.world 16 points 2 days ago

    This is what I do. As far as I'm concerned, there's my password and then there's the one that's a last "are you sure?" step before I sudo fuck shit up.

    load more comments (1 replies)
    [–] nek0d3r@lemmy.dbzer0.com 8 points 1 day ago

    I don't really bother encrypting my personal PC, there's just not much on there at all that I even store. My server is definitely LUKS encrypted, but it's a lot of effort for a very specific attack vector that I don't anticipate. There's things I'd be much more concerned about a burglar stealing than a storage device.

    [–] Tanoh@lemmy.world 102 points 2 days ago (3 children)

    I know this is a meme, but security is not binary. It is not you either have 100% or 0%, it is always a sliding scale, and usually on the opposite side is convenience.

    Encrypting your drive protects against someone stealing your computer or breaning into youe house while the computer is off/locked.

    People like to trash people that write down their passwords on a post-it note and keep next to their computer. It is not ideal, but having a somewhat complex password written down protects a lot more against attacks over the internet than having "password". However, if others have physical access to the note then it is obviously very bad. Like for example in an office.

    [–] DupaCycki@lemmy.world 10 points 1 day ago (1 children)

    I don't like how writing down passwords on notes has been heavily criminalized. Obviously it's a security risk, but so is having a simple password that isn't written down anywhere. In fact, the latter is often more dangerous, depending on the specific environment. Just make sure the note isn't easily accessible and you're good.

    [–] Tanoh@lemmy.world 4 points 1 day ago

    Yes. Writting down a complex password helps against most attacks, except one where the bad guy has physical access to your note. Based on the normal users use case that is probably a very good trade off. Most hacks are done over the internet without access to your note.

    Ideally everyone should use a password manager, but that is highly unlikely any time soon.

    [–] ricecake@sh.itjust.works 40 points 2 days ago

    Yup. The risk of someone breaking into your house and stealing your post-it note is vastly different from someone guessing your password, and the risk changes again when it's a post-it note on your work computer monitor.

    One of the best things you can do with your critical passwords is put them on a piece of paper with no other identifying information and then put that piece of paper in your wallet. Adults in modern society are usually quite good at keeping track of and securing little sheets of paper.

    I'm paranoid, so I put mine on an encrypted NFC card that I printed to look like an expired gift card to a store that went out of business. It's got what I need to bootstrap the recovery process if I loose all my MFA tokens (I keep another copy in a small waterproof box with things like my car title. It's labeled "important documents: do not lose" and kept unlocked so any would be thief feels inclined to open it and see it's worthless to them rather than taking the box to figure that out somewhere else. The home copy is important because there's vaguely plausible scenarios where I lose both my phone and wallet at the same time. )

    Stealing my laptop and getting my stuff is a significantly larger risk than me leaving my computer on and unattended without locking the screen.

    Passkeys are a good trend because they're just about the only security enhancement in recent memory that increases security and usability at the same time.

    [–] blinfabian@feddit.nl 6 points 1 day ago (1 children)

    i work in IT at an office and i kid you not. some people really stick a post it with their full login to their screen. (not even their screen as they sit at different places every day)

    [–] MonkeMischief@lemmy.today 2 points 1 day ago

    It's like leaving cookies and milk out for Adam Jensen or J.C Denton ❀️ lol

    [–] michaelmrose@lemmy.world 47 points 2 days ago (2 children)

    On a single user system which either hibernates or shuts fully down you might as well long in automatically after you type in your 16 character encryption pass phrase. A login screen does not in any way provide additional security. Note this doesn't actually prevent you from locking the screen and unlocking still requires your password.

    [–] ftbd@feddit.org 8 points 2 days ago (1 children)

    But I think 'encrypt home directory' only encrypts your home partition, not your root partition. Not sure why many distros offer only this option in the graphical installer

    [–] michaelmrose@lemmy.world 4 points 1 day ago

    encrypt your home directory stated as such doesn't mean encrypt ANY partition. Distros that offer this normally use ecryptfs. encrypting your partition uses LUKS. They use ecryptfs because its easy and doesn't effect the boot up process. Full disk (or partition) uses LUKS

    [–] Diurnambule@jlai.lu 7 points 2 days ago

    I join that my setup. Hibernate after 15min and disk encryption and autologin on boot, but password is asked when going out of sleep for the 15 first minutes.

    [–] nialv7@lemmy.world 8 points 1 day ago (1 children)

    Depends on your threat model. If you are defending against people stealing your hard drive and reading your data, then this is perfectly fine.

    [–] nibbler@discuss.tchncs.de 6 points 1 day ago (1 children)

    if it's logging in automatically it needs the required encryption key available on the disk in clear. so the stolen hard drive will boot and unlock in any computer, no?

    [–] nialv7@lemmy.world 9 points 1 day ago (1 children)

    not necessarily if the key is on TPM for example.

    [–] nibbler@discuss.tchncs.de 2 points 1 day ago

    this is correct, but a very strict condition in relation to the general statement i reacted to :-)

    [–] Mikina@programming.dev 54 points 2 days ago (11 children)

    Is there any OS that allows this config?

    At least with Linux, if I encrypt my hard drive, I have to enter my encryption password on every login, for some even during boot.

    Not sure about Windows. I wpuldn't be surprised if you can have bitdefender on with auto login.

    [–] Aurenkin@sh.itjust.works 35 points 2 days ago (1 children)

    From memory yes but the contents of your home directory are inaccessible until you enter your password via a popup. For whole drive encryption probably not.

    [–] ArsonButCute@lemmy.dbzer0.com 12 points 2 days ago* (last edited 2 days ago)

    I had configured this manually (incorrectly) in Arch a while back to have my home dir be on a separate encrypted drive.

    Turns out the main drive didn't get the memo and still had a home folder which worked fine, I thought it was working so I promptly forgot about it. Meanwhile the encrypted drive (which had only ever been unlocked that day and never again) had maybe 10 files on it that I didn't even know it had until I swapped the drive into a different PC.

    [–] waigl@lemmy.world 13 points 2 days ago* (last edited 2 days ago) (1 children)

    The password for the hard drive encryption and the system login are two separate things, so, yes, this combination is easily possible. You'll have to input a password for system bootup, but not for logging in.

    How advisable that combination is is another question entirely.

    load more comments (1 replies)
    [–] aeharding@vger.social 6 points 2 days ago

    At least with Linux, if I encrypt my hard drive, I have to enter my encryption password on every login, for some even during boot.

    Look up TPM.

    You can have FDE binded to the TMP and then inside that encrypted volume an encrypted home.

    By doing that you only need to input your login password and get better security than the meme setup and other suggestions.

    You would need, iirc (I am typing this from memory):

    • A TPM.
    • systemd-cryptenroll
    • Some PAM config for fscrypt or similar.

    I know the steps but for NixOS only lmao.

    [–] PumpkinEscobar@lemmy.world 10 points 2 days ago

    Can do full disk encryption of root and auto-unlock with tpm, the auto-login is a separate thing and not necessarily the same password

    [–] SorryQuick@lemmy.ca 4 points 2 days ago

    Mine autodecrypts with a hardcoded password in a text file. I don’t really care about encryption right now, but the minute I do, it’s one file delete away.

    [–] deadcade@lemmy.deadca.de 4 points 2 days ago (1 children)

    There is a way, but no point in doing so. As such no OSes offer such an option out of the box. For file encryption to be of any use, you need there to be some kind of authentication before being able to access those files (like a password).

    The easiest method would be to encrypt the entire drive, as modern Linux and Windows both support using the TPM for automatic unlocking. With that, set up standard user autologin and you've made the drive encryption useless.

    load more comments (1 replies)
    load more comments (4 replies)

    I have auto login too, but also full disk encryption + using my user password to unlock it the once the puter is locked (after a time, on sleep, manual lock, etc).

    There is an element to security that has to work with your human side too. So entering two passwords in a row is something my brainhole can do without + the scenarios where that could be exploited are slim.

    [–] 4am@lemmy.zip 13 points 2 days ago (2 children)

    I wish I could set it to auto-login to a Lock Screen so all my preferred stuff starts up and is ready when I get there, but my computer is still locked against anyone trying to steal it and get easy access to it

    [–] michaelmrose@lemmy.world 5 points 2 days ago

    You can literally do this. Just have a unit that locks the screen.

    load more comments (1 replies)
    [–] hemko@lemmy.dbzer0.com 17 points 2 days ago

    I mean login automatically on boot but with encrypted drive is ok if you're the only user. If someone got your encryption password, they can get your data. The user password doesn't protect a shit

    Now of course you want to still have auth when locking the pc

    [–] Bishma@discuss.tchncs.de 10 points 2 days ago

    I don't log in automatically, but I do let my session login hold my password manager vault open.

    load more comments
    view more: next β€Ί