This makes a world of difference. I know many people may know of it but may not actually do it. It Protects your files in case your computer is ever stolen and prevents alphabet agencies from just brute forcing into your Laptop or whatever.

I found that Limine (bootloader) has the fastest decryption when paired with LUKS at least for my laptop.

If your computer isn’t encrypted I could make a live USB of a distro, plug it into your computer, boot, and view your files on your hard drive. Completely bypassing your Login manager. If your computer is encrypted I could not. Use a strong password and different from your login

Benefits of Using LUKS with GRUB Enhanced Security

  • Data Protection: LUKS (Linux Unified Key Setup) encrypts disk partitions, ensuring that data remains secure even if the physical device is stolen.
  • Full Disk Encryption: It can encrypt the entire disk, including sensitive files and swap space, preventing unauthorized access to confidential information.

Compatibility with GRUB

  • Unlocking from Bootloader: GRUB can unlock LUKS-encrypted partitions using the cryptomount command, allowing the system to boot securely without exposing sensitive data.
  • Support for LVM: When combined with Logical Volume Management (LVM), LUKS allows for flexible partition management while maintaining encryption.
  • notabot@piefed.social
    link
    fedilink
    English
    arrow-up
    3
    ·
    22 hours ago

    I was actually largely agreeing with you, but responding to the bit where you said:

    It Protects your files in case your computer is ever stolen and prevents alphabet agencies from just brute forcing into your Laptop or whatever.

    It’ll stop alphabet agencies from brute forcing it, sure, but that’s not how they would approach extracting the information.

    I see ~you’ve~ the mod has deleted this comment thread though, so it’s unlikely anyone else will see it.

    As to your question about what technology would stop it, I think you may need to think differently as no technology will stop a determined enough opponent torturing you for a password, but they’re much more likely to attempt a malware style attack against you to skip all that bother. So countermeasures would involve a well locked down system (think about things like SELinux with MLS enabled and using VMs to isolate processes) and good information hygiene practices to reduce the risk of infection and the risk of it spreading if you are infected.

    • Lunatique Princess@lemmy.mlOP
      link
      fedilink
      arrow-up
      1
      arrow-down
      5
      ·
      22 hours ago

      I know this. Was never confused about it. You just came out of no where telling me. I don’t delete comments, look at how many people try to debate me, those comments are still up and still stupid lol. Also luckily the FBI or CIA or whatever demon inspired agency won’t just torture you as an everyday citizen doesn’t matter what they want on your top. If it was that bad the USA would be JUST like North Korea. Here they have some rules still they are just burning them away as the years go by.

      • notabot@piefed.social
        link
        fedilink
        English
        arrow-up
        4
        ·
        20 hours ago

        I edited my comment, it was the mod who deleted your comment.

        I don’t see many people debating you, but I do see a number of comments, including my own, that are pointing out things that need to be considered, or expanding on what you’d said. I don’t see much that could be called ‘stupid’, but you seem to be carrying a lot of pent up frustration and anger. You’ll probably find you have much more productiv£ and pleasant exchanges if you dump that on other people though.

        One need only read or watch the news to know that a disturbingly large number of people are being abducted, predominantly under the umbrealla of ICE, but also for political reasons. It seems likely that if an agency has interest in the data of someone like that, presure of various sorts will be brought to bear on them. Most people will hand over their passwords long before the threat of physical violence is manifested, but the threat is there none-the-less. As you say, this won’t apply to most everyday citizens, for now at least.

        Ultimately, it’s a case of setting up your security posture to match your own threat models. Encryption is an excellent step, but only addresses some threats, online attacks being the most obvious set that it does not help with.