• yesman@lemmy.world
    link
    fedilink
    English
    arrow-up
    104
    arrow-down
    2
    ·
    1 day ago

    I’ve never trusted full disk encryption because I understand the person most likely to get locked out of my data is me.

    I can see the use case for laptops, but my security policy is “if you have physical access, you win”.

    • Appoxo@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      1
      ·
      9 hours ago

      At best a virtual rncrypted disk on the unencrypted drive.
      If you (not you OP) are doing that secretive work, maybe you shouldnt do that on this OS and instead on Tails or other temporary distros

      • Hanrahan@slrpnk.net
        link
        fedilink
        English
        arrow-up
        11
        ·
        20 hours ago

        yes, and then i forget the encryption password as i don’t use the laptops that much these days and now have it written on the lid

        kidding :) or am I :(

    • peacefulpixel@lemmy.world
      link
      fedilink
      English
      arrow-up
      21
      ·
      1 day ago

      well i suppose it depends on how deep your personal security goes. are your passwords stored on your device? are they stored securely? do you have a password manager? do you have a standalone app for your password manager and not a browser extension? is the master password for your password manager stored on any of your devices? do you have any settings that automatically locks your PC upon inactivity? is the pin for your PC related to you personally in any way? i get what you’re saying because at the end of the day physical access IS pretty hard to mitigate. but you’d be surprised how far simple steps can take you.