Fellow selfhoster, do you encrypt your drives where you put data to avoid privacy problems in case of theft? If yes, how? How much does that impact performances? I selfhost (amongst other services) NextCloud where I keep my pictures, medical staff, …in short, private stuff and I know that it’s pretty difficult that a thief would steal my server, buuut, you never know! 🤷🏻‍♂️

  • @AtariDump@lemmy.world
    link
    fedilink
    English
    131 year ago

    I used to until I realized that I’ve got bigger threats to worry about.

    And like someone else mentioned, if I have to do data recovery for some unknown reason I want to make sure the data’s not encrypted.

    • @peregus@lemmy.worldOP
      link
      fedilink
      English
      01 year ago

      Why? If you store the key in your password manager shouldn’t be a problem to mount the drive on another PC, decrypt it and save data. Or am I missing something?

          • @onlinepersona@programming.dev
            link
            fedilink
            English
            41 year ago

            Why? What would be the problem?

            On linux, you’re probably using LUKS. That has a header with the keys at the beginning of each encrypted volume. If those keys (or key if you only have one) is corrupted and you don’t have a backup of that, you’re fucked.

            The next problem is that data recovery tools mostly don’t support decryption. They scan regions or the entire drive for recognizable things like partition headers, partition tables, file types, etc. if those are encrypted, well…

            If you are able to decrypt a partition, then it might work as it will show up like any other device in /dev/mapper/ and you could do recovery /dev/mapper/HDD. However, I have no idea what data corruption does to encryption algorithms. If one part of what is being decrypted is faulty, what does that do to the entire thing?
            This mostly comes from a lack of knowledge on my part. IIRC encryption depends on hashsums -> if you change what’s being decrypted/encrypted, the entire hashsum is incorrect and thus all the data shouldn’t be able to be decrypted. But I might be wrong - I’ll gladly be wrong on this.

            Anti Commercial-AI license

            • @peregus@lemmy.worldOP
              link
              fedilink
              English
              21 year ago

              On linux, you’re probably using LUKS. That has a header with the keys at the beginning of each encrypted volume. If those keys (or key if you only have one) is corrupted and you don’t have a backup of that, you’re fucked.

              I got it, thanks! I will rely on SnapRaid form redundancy and on backups on multiple devices/locations.

          • @WolfLink@lemmy.ml
            link
            fedilink
            English
            31 year ago

            The way you recover data from a totally dead drive is use a program that scans every byte and looks for structures in the data that look like files e.g. a jpeg will have a header followed by some blocks of content. In an encrypted drive everything looks like random data.

            Even if you have the key, you can’t begin searching through the data until it’s decrypted, and the kind of error that makes it so your drive won’t mount normally is likely to get in the way of decrypting normally as well.

  • A Mouse
    link
    fedilink
    English
    121 year ago

    It’s a relatively low performance hit and it benefits me when having to replace a failing/old disk. I can just toss the drive without having to erase the data first, that is as long as the key is a secure length.

  • @ShortN0te@lemmy.ml
    link
    fedilink
    English
    121 year ago

    I use full disk encryption for every server (and other computers).

    Encrypting your data drives is a must for everyone imho. Encrypting the OS is a must for me🤷‍♂️

    • @n3m37h@lemmy.dbzer0.com
      link
      fedilink
      English
      31 year ago

      My PC weighs 80+ lbs, live 8km from town, surrounded by farm land and there are only 3,400 in town and I live 30 min from a city of 40,000 and 40 min from another city of 70,000 and my internet is 20/10 mbps

        • JustEnoughDucks
          link
          fedilink
          English
          71 year ago

          I think he is saying that his physical attack surface is very small since he is remote, so maybe he doesn’t bother?

          Either way, encrypting drives is simply always good if you ever resell the computer or upgrade drives.

        • @n3m37h@lemmy.dbzer0.com
          link
          fedilink
          English
          31 year ago

          FreeAin’t no one stealing my shit, even via internet to upload 40tb would take 1 year 5 days at max speed in actuality it would be 1 year 8 months… Fuck I miss my 1.5G fibre connection…

  • @d3Xt3r@lemmy.nz
    link
    fedilink
    English
    361 year ago

    This shouldn’t even be a question lol. Even if you aren’t worried about theft, encryption has a nice bonus: you don’t have to worry about secure erasing your drives when you want to get rid of them. I mean, sure it’s not that big of a deal to wipe a drive, but sometimes you’re unable to do so - for instance, the drive could fail and you may not be able to do the wipe. So you end up getting rid of the drive as-is, but an opportunist could get a hold of that drive and attempt to repair it and recover your data. Or maybe the drive fails, but it’s still under warranty and you want to RMA it - with encryption on, you don’t have to worry about some random accessing your data.

  • 🇰 🌀 🇱 🇦 🇳 🇦 🇰 🇮 🏆
    link
    fedilink
    English
    2
    edit-2
    1 year ago

    I don’t do anything that warrants it, but if I did have sensitive data that I was worried about being stolen, those drives would be in a system completely cut off from the Internet to prevent remote theft, and encrypted in the event of a physical theft. If I was especially paranoid, I’d booby trap the drives to wipe themselves if they are tampered with.

  • @hperrin@lemmy.world
    link
    fedilink
    English
    3
    edit-2
    1 year ago

    I have two WebDAV shares, one unencrypted and one encrypted. The unencrypted one is for things that need to be read by other services, like legally obtained movies and tv shows. The encrypted one is for porn, mostly (also stuff like tax documents, legal contracts, etc).

    This is the server I use

    https://hub.docker.com/r/sciactive/nephele

    It’s really easy to set it up for encryption. Also, I wrote it. :)

      • @h3ndrik@feddit.de
        link
        fedilink
        English
        21 year ago

        Good question. I don’t have a clue either. It doesn’t contain any personal information. (Unless it’s self-made.) Usually isn’t unique. And nobody cares as there’s an abundance of porn available everywhere on the internet.

  • @JoeKrogan@lemmy.world
    link
    fedilink
    English
    81 year ago

    On laptops yes, on my server no. Most of the data is photo backups and linux ISOs form over the years.

  • @BastingChemina@slrpnk.net
    link
    fedilink
    English
    171 year ago

    No,

    There is all the backup of all my family pictures in the drives.

    If something happens to me I want to make due that they will have access to it.

  • @Decronym@lemmy.decronym.xyzB
    link
    fedilink
    English
    0
    edit-2
    1 year ago

    Acronyms, initialisms, abbreviations, contractions, and other phrases which expand to something larger, that I’ve seen in this thread:

    Fewer Letters More Letters
    DNS Domain Name Service/System
    LVM (Linux) Logical Volume Manager for filesystem mapping
    MQTT Message Queue Telemetry Transport point-to-point networking
    NAS Network-Attached Storage
    NFS Network File System, a Unix-based file-sharing protocol known for performance and efficiency
    Plex Brand of media server package
    SATA Serial AT Attachment interface for mass storage
    SSD Solid State Drive mass storage
    SSH Secure Shell for remote terminal access
    VPS Virtual Private Server (opposed to shared hosting)
    ZFS Solaris/Linux filesystem focusing on data integrity
    Zigbee Wireless mesh network for low-power devices

    12 acronyms in this thread; the most compressed thread commented on today has 7 acronyms.

    [Thread #686 for this sub, first seen 17th Apr 2024, 08:25] [FAQ] [Full list] [Contact] [Source code]

  • tired_n_bored
    link
    fedilink
    English
    61 year ago

    No. I run my servers on low quality shit and I expect them to break any time. Never had to perform a data recovery but if I need, I’ll thank myself I didn’t encrypt my pics

  • @Gooey0210@sh.itjust.works
    link
    fedilink
    English
    61 year ago

    Yes, all, no matter what data is, it’s not hard and doesn’t have any consequences, but protects from many inconvenient accidents