👽

  • JackGreenEarth
    link
    fedilink
    English
    arrow-up
    5
    ·
    6 months ago

    I don’t want to encrypt my drive in case I forget the encryption key and lose all my data

    • naeap@sopuli.xyz
      link
      fedilink
      arrow-up
      3
      ·
      edit-2
      6 months ago

      Yeah, I’m having a hard time deciding about that.

      On the one hand I’m often in business trips and want to be at least able to recover my data easily if something happens.

      On the other hand getting the laptop stolen with all the data is a nightmare.

      Didn’t look into current solutions for quite some time though. As I’m currently waiting for a new laptop, this could be a good time to check something out.
      Anyone with some suggestions? (Will look into the encrypted FS OP recommended, but having options and opinions never hurts)

      Edit: ok, just realised that APFS is Apple File System. So that’s not gonna roll for me, as I’m on Linux and would like to have something that’s actually designed and developed for it. Don’t know anything about Linux APFS support, but I’m a bit traumatised by NTFS and anyway I don’t want to have anything to do with Apple

      Anyone with experience with encrypted LUKS and data recovery?
      Some buzzwords for options would also greatly help me
      Thanks for anything in advance!

      • GamingChairModel@lemmy.world
        link
        fedilink
        arrow-up
        3
        ·
        6 months ago

        3-2-1 backup is important. I’ve been burned with lost files before, so I now make sure they’re available in multiple places.

        I also encrypt everything. My laptops can’t be unlocked by anyone except myself: Apple Filevault on my Apple laptop, LVM on LUKS on my Linux laptop. If something happens to me, my laptops must be wiped completely to be useable as a used device.

        My NAS keeps my backups of all my documents and media (and as a hobbyist photographer, I have over a terabyte of photos and videos I’ve taken). It’s encrypted, but I’ve written the key down on paper and put it in my physical documents. If something happens to me, someone who goes through my physical documents will have access to my digital files.

        I pay a cloud service (Backblaze) for cloud backups. I trust the encryption and key management to not actually give the service provider any access to my files.

        • naeap@sopuli.xyz
          link
          fedilink
          arrow-up
          1
          ·
          6 months ago

          Thanks!

          Just one question: How do you sync your photos to your NAS on the go?

          • GamingChairModel@lemmy.world
            link
            fedilink
            arrow-up
            2
            ·
            6 months ago

            I sync if I have a good Internet connection, like from my hotel room or whatever, by VPNing into my home network where my NAS is. There are distributed DNS type solutions for a lot of the big NAS brands, where they’ll let you access your data through their service, but I never set that up because I already have a VPN. So my NAS and firewall are configured not to allow outside connections to that device.

            But if I haven’t synced laptop to NAS yet, then copies exist on both my camera SD cards (redundant double SD card) and my laptop.

            • naeap@sopuli.xyz
              link
              fedilink
              arrow-up
              1
              ·
              6 months ago

              Ah, alright
              I currently use wireguard to access my home LAN. just hoped you had done experience with a nice system, so you don’t need to do it by hand - especially syncing my smartphone photos.
              Maybe I’ll give immich another chance

              Thanks for the answers! :-)

    • vzq@lemmy.blahaj.zone
      link
      fedilink
      arrow-up
      2
      ·
      6 months ago

      Fair point. Data integrity and availability concerns often trump confidentiality.

      Still, if your main concern is safe disposal rather than preventing unauthorized access, most major operating systems have ways to ensure continued access.