You are viewing a single thread.
View all comments View context
2 points
*

I’m happy with regular password FDE, i think i’m more likely to encounter hardware failure (and then need to read the drive from another machine) than theft of the drive.

It’s a good point though, I’m sure many people do need this feature. Ubuntu is “working on it” but so far i guess it’s mostly not working except for VMs

permalink
report
parent
reply
2 points

I have a media center that serves over the internet via VPN, I don’t want to leave it unencrypted but I also don’t want to have to go home and type in a pass every time California has a power outage, which is monthly during the dry fire season and >monthly during the “storm” season. I wouldn’t care as much for my personal laptop or anything, but for servers it seems like an absolute must have and…what is Linux for if not servers?

permalink
report
parent
reply
1 point
*

I think the traditional way to do that is via dm-crypt, which you can set up with an ssh server.

You can also use a network-shared file rather than a password for LUKS but it’s not as straightforward to set up as a password. If you are doing something like tailscale then it’d be unlocked as long as you are on the VPN

Typing in a password in-person at a data center would be a huge hassle, agreed

permalink
report
parent
reply
2 points

But…it’s literally what the tpm chip is for. Like there may be other options, but the tpm chip’s purpose in life is to do this thing. And it’s been doing that for a decade. Seems pretty traditional to me. But Linux folks in some venues treat it like a plague that needs to be eradicated.

permalink
report
parent
reply

linuxmemes

!linuxmemes@lemmy.world

Create post

Hint: :q!


Sister communities:

Community rules (click to expand)

1. Follow the site-wide rules
2. Be civil
  • Understand the difference between a joke and an insult.
  • Do not harrass or attack members of the community for any reason.
  • Leave remarks of “peasantry” to the PCMR community. If you dislike an OS/service/application, attack the thing you dislike, not the individuals who use it. Some people may not have a choice.
  • Bigotry will not be tolerated.
  • These rules are somewhat loosened when the subject is a public figure. Still, do not attack their person or incite harrassment.
3. Post Linux-related content
  • Including Unix and BSD.
  • Non-Linux content is acceptable as long as it makes a reference to Linux. For example, the poorly made mockery of sudo in Windows.
  • No porn. Even if you watch it on a Linux machine.
4. No recent reposts
  • Everybody uses Arch btw, can’t quit Vim, and wants to interject for a moment. You can stop now.

 

Please report posts and comments that break these rules!


Important: never execute code or follow advice that you don’t understand or can’t verify, especially here. The word of the day is credibility. This is a meme community – even the most helpful comments might just be shitposts that can damage your system. Be aware, be smart, don’t fork-bomb your computer.

Community stats

  • 6.5K

    Monthly active users

  • 1.1K

    Posts

  • 24K

    Comments