• 0 Posts
  • 12 Comments
Joined 2 years ago
cake
Cake day: June 12th, 2023

help-circle
  • There are many ways to setups full disk encryption on Linux, but the most common all involve LUKS. Providing a password at mount (during boot, for a root partition or perhaps later for a “data” volume) is a but more secure and more frequently done, but you can also use things like smart cards (like a Yubikey) or a keyfile (basically a file as the password rather than typed in) to decrypt.

    So, to actually answer your question, if you dont want to type passwords and are okay with the security implementations of storing the key with/near the system, putting a keyfile on removable storage that normally stays plugged in but can be removed to secure your disks is a common compromise. Here’s an approachable article about it.

    Search terms: “luks”, " keyfile", “evil maid”












  • Technically, no, but you may want to. All of these services are federated and interact with one another. Mastodon users can interact with pixelfed posts and lemmy communities and anything else in the Fediverse. In reality, though, these services, and their clients, are built for specific types of content. If you’re spending much time at all on those other Federated communities, the “round peg, square hole” nature of using a Reddit-like app to use a Twitter-like service (as an example) may start to chafe.