fosstodon.org is one of the many independent Mastodon servers you can use to participate in the fediverse.
Fosstodon is an invite only Mastodon instance that is open to those who are interested in technology; particularly free & open source software. If you wish to join, contact us for an invite.

Administered by:

Server stats:

8.8K
active users

#gocryptfs

0 posts0 participants0 posts today
Bhavani Shankar 💭Why I don't use full disk encryption:<br><br><a href="https://bshankar.pages.dev/full-disk-encryption/" rel="nofollow noopener" target="_blank">https://bshankar.pages.dev/full-disk-encryption/</a><br><br><a class="hashtag" href="https://fe.disroot.org/tag/linux" rel="nofollow noopener" target="_blank">#linux</a> <a class="hashtag" href="https://fe.disroot.org/tag/security" rel="nofollow noopener" target="_blank">#security</a> <a class="hashtag" href="https://fe.disroot.org/tag/performance" rel="nofollow noopener" target="_blank">#performance</a> <a class="hashtag" href="https://fe.disroot.org/tag/diskencryption" rel="nofollow noopener" target="_blank">#diskencryption</a> <a class="hashtag" href="https://fe.disroot.org/tag/veracrypt" rel="nofollow noopener" target="_blank">#veracrypt</a> <a class="hashtag" href="https://fe.disroot.org/tag/gocryptfs" rel="nofollow noopener" target="_blank">#gocryptfs</a> <a class="hashtag" href="https://fe.disroot.org/tag/ssd" rel="nofollow noopener" target="_blank">#ssd</a> <a class="hashtag" href="https://fe.disroot.org/tag/nixos" rel="nofollow noopener" target="_blank">#nixos</a> <a class="hashtag" href="https://fe.disroot.org/tag/tailsos" rel="nofollow noopener" target="_blank">#tailsos</a>
gyorb<p>Just published a blog post about how I use gocryptfs to encrypt some sensitive files. <a href="https://gyorban.net/blog/how-to-encrypt-your-sensitive-files-with-gocryptfs/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">gyorban.net/blog/how-to-encryp</span><span class="invisible">t-your-sensitive-files-with-gocryptfs/</span></a></p><p><a href="https://infosec.exchange/tags/gocryptfs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>gocryptfs</span></a> <a href="https://infosec.exchange/tags/encription" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>encription</span></a> <a href="https://infosec.exchange/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://infosec.exchange/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a></p>
daltux🔒📲 Adicionei <b>DroidFS</b> à lista de aplicativos da F-Droid que tenho utilizado na tornozeleira eletrônica de bolso: <a href="https://blog.ayom.media/daltux/aplicativos-do-f-droid-que-uso-atualmente" rel="nofollow noopener" target="_blank">https://blog.ayom.media/daltux/aplicativos-do-f-droid-que-uso-atualmente</a><br><br><a href="https://snac.daltux.net?t=softwarelivre" class="mention hashtag" rel="nofollow noopener" target="_blank">#SoftwareLivre</a> <a href="https://snac.daltux.net?t=fdroid" class="mention hashtag" rel="nofollow noopener" target="_blank">#FDroid</a> <a href="https://snac.daltux.net?t=criptografia" class="mention hashtag" rel="nofollow noopener" target="_blank">#criptografia</a> <a href="https://snac.daltux.net?t=apps" class="mention hashtag" rel="nofollow noopener" target="_blank">#Apps</a> <a href="https://snac.daltux.net?t=android" class="mention hashtag" rel="nofollow noopener" target="_blank">#Android</a> <a href="https://snac.daltux.net?t=infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#InfoSec</a> <a href="https://snac.daltux.net?t=gocryptfs" class="mention hashtag" rel="nofollow noopener" target="_blank">#gocryptfs</a> <a href="https://snac.daltux.net?t=cryfs" class="mention hashtag" rel="nofollow noopener" target="_blank">#CryFS</a> <a href="https://snac.daltux.net?t=dicas" class="mention hashtag" rel="nofollow noopener" target="_blank">#dicas</a><br>
scops<p><a href="https://social.tchncs.de/tags/linuxhint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linuxhint</span></a> - automatic opening of kde vaults on login<br>first step is to make your vault with <a href="https://social.tchncs.de/tags/gocryptfs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>gocryptfs</span></a> for example for ~/Documents. then create an entry in <a href="https://social.tchncs.de/tags/kwallet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>kwallet</span></a> by creating a password in your "Passwords"-group (create it too if not present) named "vaultpass" and enter the password you used for ~/Documents. then create a bash script and let it autostart:<br>gocryptfs --extpass="kwallet-query -f Passwords -r vaultpass kdewallet" [.enc folder] ~/Documents</p><p>have fun :)</p><p><a href="https://github.com/rfjakob/gocryptfs/wiki/Mounting-on-login-with-KDE-Wallet" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/rfjakob/gocryptfs/w</span><span class="invisible">iki/Mounting-on-login-with-KDE-Wallet</span></a></p>
tuxwise 🇺🇦<p>(24/N) There are some best practices that will make it easier to answer threat modeling question #3, "What are you going to do about it?". These will help you protect a wide range of assets by taking care of your devices, so let's look at them first:</p><ol><li>Encrypt data at rest</li><li>Bootstrap your workplace</li><li>Actively maintain your devices</li><li>Secure your devices</li><li>Prepare for repair</li></ol><p><strong>1. Encrypt data at rest</strong></p><p>What can you achieve with intermediate knowledge, without fully descending into the rat hole?</p><p>⚠️ Caveat: this is best done when setting up <a href="https://mastodon.de/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> on a new device. Modifying an existing installation on your own IMHO isn't advisable if you're not a seasoned user. If you still decide to venture into it, make SURE you have backed up all your assets, before following "howtos on the internet". You have been warned.</p><p>Likening your device to a medieval city:</p><p>1) Full-Disk Encryption (FDE) is like locking the "city gate". Most popular Linux distributions offer FDE during the installation process. FDE is also your last line of defense when your device gets stolen, or your disk fails and cannot be safely wiped before disposing of it. Use FDE. (Yes, technically, "Full" is not absolutely accurate. We'll leave it at that.)</p><p>2) Within your "city", there will likely be at least two "houses": the home of the admin account, and your personal home. Using FDE alone, the "doors" of these homes won't have any locks of their own. Possibly not a big deal with respect to the administrative account, but admins being able to access any of your non-public assets, even when you're not logged in, is probably not what you want.</p><p>While the specific steps depend on your preferred Linux distro, a "portable" solution is to create a separate, encrypted disk partition, and have it mounted as your user home directory, when you log in. That solution is based on cryptsetup and the pam_mount module, a nice tutorial example is:</p><ul><li>Linux Mint: <a href="https://cobertos.com/blog/post/linux-mint-luks-encrypted-user-home-directory" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cobertos.com/blog/post/linux-m</span><span class="invisible">int-luks-encrypted-user-home-directory</span></a></li></ul><p>3) Within your "house", you may wish to have a locked "chest", e.g. for your <a href="https://mastodon.de/tags/FYEO" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FYEO</span></a> assets. There's essentially two options: a) a single, encrypted container file that acts as a "<a href="https://mastodon.de/tags/vault" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vault</span></a>" for your asset files; or b) an encrypted overlay file system that maintains an openly visible directory hosting your encrypted assets, including directory structures, in the background; and allows you to mount a decrypted counterpart, for working on your assets.</p><p>a) A "vault", being a single file, is easy to copy and carry around, on arbitrary storage media, e.g. USB sticks. It doesn't reveal too much about its contents, but resizing it takes a little effort. Also, you can't "incrementally backup" content changes, just copy the whole, changed vault.</p><p>A nice tutorial for creating and using a vault using plain, standard cryptsetup is <a href="https://opensource.com/article/21/4/linux-encryption" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">opensource.com/article/21/4/li</span><span class="invisible">nux-encryption</span></a> by <span class="h-card" translate="no"><a href="https://anticapitalist.party/@seth" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>seth</span></a></span> . If you <em>must</em> have a GUI for creating and mounting vaults, look at <a href="https://mastodon.de/tags/zuluCrypt" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>zuluCrypt</span></a> <a href="https://mhogomchungu.github.io/zuluCrypt/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">mhogomchungu.github.io/zuluCry</span><span class="invisible">pt/</span></a> – IMHO the app is still in need of a little polish, though.</p><p>b) An encrypted overlay file system allows for incrementally backing up changed assets, but exposes considerable metadata (rough file sizes, directory structures, modification dates).</p><p>The most widely used package for this is probably <a href="https://mastodon.de/tags/gocryptfs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>gocryptfs</span></a>. Its "HowTo" is literally a one-pager: <a href="https://nuetzlich.net/gocryptfs/quickstart/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">nuetzlich.net/gocryptfs/quicks</span><span class="invisible">tart/</span></a></p><p>Start of this thread:<br><a href="https://mastodon.de/@tuxwise/113503228291818865" translate="no" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">mastodon.de/@tuxwise/113503228</span><span class="invisible">291818865</span></a></p><p><a href="https://mastodon.de/tags/ThreatModeling" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatModeling</span></a> <a href="https://mastodon.de/tags/4D" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>4D</span></a></p>
scops<p>Do someone know how to open a Vault in <a href="https://social.tchncs.de/tags/kde" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>kde</span></a> <a href="https://social.tchncs.de/tags/plasma" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>plasma</span></a> on login using the users login password?</p><p><a href="https://social.tchncs.de/tags/encrypt" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>encrypt</span></a> <a href="https://social.tchncs.de/tags/gocryptfs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>gocryptfs</span></a></p>
Back In Time<p>🔄 Back In Time seeking help to test its new <a href="https://fosstodon.org/tags/gocryptfs" class="mention hashtag" rel="tag">#<span>gocryptfs</span></a> feature</p><p>🔗 <a href="https://github.com/bit-team/backintime/pull/1897" target="_blank" rel="nofollow noopener" translate="no"><span class="invisible">https://</span><span class="ellipsis">github.com/bit-team/backintime</span><span class="invisible">/pull/1897</span></a></p><p><a href="https://fosstodon.org/tags/floss" class="mention hashtag" rel="tag">#<span>floss</span></a> <a href="https://fosstodon.org/tags/foss" class="mention hashtag" rel="tag">#<span>foss</span></a> <a href="https://fosstodon.org/tags/OpenSource" class="mention hashtag" rel="tag">#<span>OpenSource</span></a></p>
Habr<p>Шифрование для облака: разные подходы</p><p>Облачные сервисы по-разному подходят к шифрованию данных на своём хостинге. В некоторых случаях это шифрование не удовлетворяет требованиям безопасности, поэтому приходится брать задачу в свои руки и шифровать файлы самостоятельно.</p><p><a href="https://habr.com/ru/companies/ruvds/articles/846478/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">habr.com/ru/companies/ruvds/ar</span><span class="invisible">ticles/846478/</span></a></p><p><a href="https://zhub.link/tags/%D0%B1%D1%8D%D0%BA%D0%B0%D0%BF%D1%8B" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>бэкапы</span></a> <a href="https://zhub.link/tags/%D1%88%D0%B8%D1%84%D1%80%D0%BE%D0%B2%D0%B0%D0%BD%D0%B8%D0%B5" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>шифрование</span></a> <a href="https://zhub.link/tags/Encryption_SDK" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Encryption_SDK</span></a> <a href="https://zhub.link/tags/Database_Encryption_SDK" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Database_Encryption_SDK</span></a> <a href="https://zhub.link/tags/Secrets_Manager" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Secrets_Manager</span></a> <a href="https://zhub.link/tags/Clean_Rooms" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Clean_Rooms</span></a> <a href="https://zhub.link/tags/C3R" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>C3R</span></a> <a href="https://zhub.link/tags/CloudHSM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CloudHSM</span></a> <a href="https://zhub.link/tags/KMS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>KMS</span></a> <a href="https://zhub.link/tags/HSM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HSM</span></a> <a href="https://zhub.link/tags/DEK" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DEK</span></a> <a href="https://zhub.link/tags/KEK" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>KEK</span></a> <a href="https://zhub.link/tags/multikeyring" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>multikeyring</span></a> <a href="https://zhub.link/tags/restic" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>restic</span></a> <a href="https://zhub.link/tags/rsync" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rsync</span></a> <a href="https://zhub.link/tags/gocryptfs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>gocryptfs</span></a> <a href="https://zhub.link/tags/cppcryptfs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cppcryptfs</span></a> <a href="https://zhub.link/tags/DroidFS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DroidFS</span></a> <a href="https://zhub.link/tags/gocryptfsinspect" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>gocryptfsinspect</span></a> <a href="https://zhub.link/tags/Cryptomator" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cryptomator</span></a> <a href="https://zhub.link/tags/ruvds_%D1%81%D1%82%D0%B0%D1%82%D1%8C%D0%B8" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ruvds_статьи</span></a></p>
Pele<p><span class="h-card" translate="no"><a href="https://digitalcourage.social/@echo_pbreyer" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>echo_pbreyer</span></a></span> <a href="https://social.anoxinon.de/tags/xfce" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>xfce</span></a> <a href="https://social.anoxinon.de/tags/jamulus" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>jamulus</span></a> <a href="https://social.anoxinon.de/tags/borgbackup" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>borgbackup</span></a> <a href="https://social.anoxinon.de/tags/wireguard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>wireguard</span></a> <a href="https://social.anoxinon.de/tags/pihole" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pihole</span></a> <a href="https://social.anoxinon.de/tags/gocryptfs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>gocryptfs</span></a> <a href="https://social.anoxinon.de/tags/evolution" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>evolution</span></a></p>
❌ Ditto<p><span class="h-card" translate="no"><a href="https://mastodon.social/@VerseAndVermin" class="u-url mention">@<span>VerseAndVermin</span></a></span> Thanks for the follow-up. I never used their cloud service (I generally prefer <a href="https://fosstodon.org/tags/gocryptfs" class="mention hashtag" rel="tag">#<span>gocryptfs</span></a> or <a href="https://fosstodon.org/tags/cryfs" class="mention hashtag" rel="tag">#<span>cryfs</span></a> encrypted volumes on providers like dropbox.</p><p>However, that does sound concerning - I&#39;ll avoid using them too - I liked that they were a very old player that was in the market since the <a href="https://fosstodon.org/tags/wordperfect" class="mention hashtag" rel="tag">#<span>wordperfect</span></a> days, but the times have changed.</p><p>Hopefully <a href="https://fosstodon.org/tags/freeoffice" class="mention hashtag" rel="tag">#<span>freeoffice</span></a> works better for you, though I&#39;ve found myself liking <a href="https://fosstodon.org/tags/onlyoffice" class="mention hashtag" rel="tag">#<span>onlyoffice</span></a> over freeoffice.</p>
Greg Walker :manjaro:<p>Compiling a list of my favourite niche FOSS applications, after all it&#39;s <a href="https://fosstodon.org/tags/FossFriday" class="mention hashtag" rel="tag">#<span>FossFriday</span></a> </p><p><a href="https://fosstodon.org/tags/Diylc" class="mention hashtag" rel="tag">#<span>Diylc</span></a> <br /><a href="https://fosstodon.org/tags/Kicad" class="mention hashtag" rel="tag">#<span>Kicad</span></a> <br /><a href="https://fosstodon.org/tags/Arduino" class="mention hashtag" rel="tag">#<span>Arduino</span></a> <br /><a href="https://fosstodon.org/tags/Stellarium" class="mention hashtag" rel="tag">#<span>Stellarium</span></a> <br /><a href="https://fosstodon.org/tags/Kstars" class="mention hashtag" rel="tag">#<span>Kstars</span></a> <br /><a href="https://fosstodon.org/tags/KeepassXC" class="mention hashtag" rel="tag">#<span>KeepassXC</span></a> <br /><a href="https://fosstodon.org/tags/Gocryptfs" class="mention hashtag" rel="tag">#<span>Gocryptfs</span></a> <br /><a href="https://fosstodon.org/tags/Cryptomator" class="mention hashtag" rel="tag">#<span>Cryptomator</span></a> <br /><a href="https://fosstodon.org/tags/libreoffice" class="mention hashtag" rel="tag">#<span>libreoffice</span></a> </p><p><a href="https://fosstodon.org/tags/Python" class="mention hashtag" rel="tag">#<span>Python</span></a> <br /><a href="https://fosstodon.org/tags/Firefox" class="mention hashtag" rel="tag">#<span>Firefox</span></a> <br /><a href="https://fosstodon.org/tags/Thunderbird" class="mention hashtag" rel="tag">#<span>Thunderbird</span></a> </p><p>Python is there as I use it as a scientific calculator and to test designs.</p><p>What are your goto <a href="https://fosstodon.org/tags/FOSS" class="mention hashtag" rel="tag">#<span>FOSS</span></a> favourites?</p>
rallo<p><span class="h-card"><a href="https://todon.nl/@UmWerker" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>UmWerker</span></a></span> <br>Hallo, ist zwar nicht pgp aber verschlüsselt auch sicher mit <a href="https://troet.cafe/tags/gocryptfs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>gocryptfs</span></a> , die APP bei f-droid --&gt; <a href="https://troet.cafe/tags/droidfs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>droidfs</span></a>, unter Linux mit <a href="https://troet.cafe/tags/SiriKali" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SiriKali</span></a>, als Alternative, Grüße Rallo</p>
❌ Ditto<p>Playing around with <a href="https://fosstodon.org/tags/salt" class="mention hashtag" rel="tag">#<span>salt</span></a> on <a href="https://fosstodon.org/tags/plantuml" class="mention hashtag" rel="tag">#<span>plantuml</span></a> to write <a href="https://fosstodon.org/tags/wireframes" class="mention hashtag" rel="tag">#<span>wireframes</span></a> out of boredom. Had been aware, but not really tried my hand at this stuff - it is pretty convenient.</p><p>I do have a shell script wrapper at the moment that I&#39;ve been using locally to automount/unmount my <a href="https://fosstodon.org/tags/gocryptfs" class="mention hashtag" rel="tag">#<span>gocryptfs</span></a> and <a href="https://fosstodon.org/tags/cryfs" class="mention hashtag" rel="tag">#<span>cryfs</span></a> folders while storing the passwords in <a href="https://fosstodon.org/tags/kdewallet" class="mention hashtag" rel="tag">#<span>kdewallet</span></a>. I&#39;d like to convert that to a <a href="https://fosstodon.org/tags/python" class="mention hashtag" rel="tag">#<span>python</span></a> UI (I&#39;m not proficient in python or GUI design). Been reading up in my spare time on <a href="https://fosstodon.org/tags/qtquick" class="mention hashtag" rel="tag">#<span>qtquick</span></a> <a href="https://fosstodon.org/tags/qml" class="mention hashtag" rel="tag">#<span>qml</span></a> etc.</p>
❌ Ditto<p><span class="h-card" translate="no"><a href="https://infosec.exchange/@cybersoldier" class="u-url mention">@<span>cybersoldier</span></a></span> <span class="h-card" translate="no"><a href="https://fosstodon.org/@tuxi" class="u-url mention">@<span>tuxi</span></a></span> in the background, I generally have <a href="https://fosstodon.org/tags/signal" class="mention hashtag" rel="tag">#<span>signal</span></a> desktop, <a href="https://fosstodon.org/tags/bitwarden" class="mention hashtag" rel="tag">#<span>bitwarden</span></a> , <a href="https://fosstodon.org/tags/cryfs" class="mention hashtag" rel="tag">#<span>cryfs</span></a> <a href="https://fosstodon.org/tags/gocryptfs" class="mention hashtag" rel="tag">#<span>gocryptfs</span></a> and other messaging/music apps. While these are generally not CPU intensive, they eat up a reasonable amount of RAM</p>
JayVii<p>Some new development here: I actually took the advice of above article and use <a href="https://social.jayvii.de/tags/gocryptfs" class="hashtag" rel="nofollow noopener" target="_blank">#gocryptfs</a> for this now with the "plaintextnames" parameter, such that file names stay un-obfuscated and <a href="https://social.jayvii.de/tags/rsync" class="hashtag" rel="nofollow noopener" target="_blank">#rsync</a>'s exclude option works as intended.</p><p>Looks like gocryptfs is a lot faster too. Seems like the ideal option for my <a href="https://social.jayvii.de/tags/backup" class="hashtag" rel="nofollow noopener" target="_blank">#backup</a> needs</p>
Hardcore Sushi<p><a href="https://mastodon.cipherbliss.com/tags/shufflecake" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>shufflecake</span></a> est définitivement un des meilleurs logiciels du monde.</p><p>J'adorerais que <a href="https://mastodon.cipherbliss.com/tags/droidfs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>droidfs</span></a> puisse le supporter pour le rendre disponible sur Android. Mais ça semble un peu compliqué à faire sans accès root étant donné qu'il fonctionne au niveau block-device et non au niveau file-system comme <a href="https://mastodon.cipherbliss.com/tags/gocryptfs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>gocryptfs</span></a> ou <a href="https://mastodon.cipherbliss.com/tags/cryfs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryfs</span></a>.</p>
CatSalad🐈🥗 (D.Burch)<p>DroidFS</p><p><a href="https://infosec.press/catsalad/droidfs" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="">infosec.press/catsalad/droidfs</span><span class="invisible"></span></a></p>
LisPi<p>Hmmm, the <a href="https://mastodon.top/tags/Golang" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Golang</span></a> <a href="https://mastodon.top/tags/telemetry" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>telemetry</span></a> <a href="https://mastodon.top/tags/spyware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>spyware</span></a> program is inconvenient.</p><p>I actually do rely on and use some <a href="https://mastodon.top/tags/Golang" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Golang</span></a> software like <a href="https://mastodon.top/tags/gocryptfs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>gocryptfs</span></a> and I don't feel like improvising myself as a cryptosystem programmer. I'm no such thing.</p><p><a href="https://mastodon.top/tags/Prometheus" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Prometheus</span></a> is also an affected part of my stack. Bother.</p><p><a href="https://mastodon.top/tags/Cryptography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cryptography</span></a> <a href="https://mastodon.top/tags/Crypto" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Crypto</span></a> <a href="https://mastodon.top/tags/Encryption" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Encryption</span></a> <a href="https://mastodon.top/tags/Monitoring" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Monitoring</span></a> <a href="https://mastodon.top/tags/Alerting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Alerting</span></a></p>
DecaTec<p>Neuer Artikel: Heute möchte ich euch mal das Verschlüsselungs-Tool <a href="https://mastodon.social/tags/gocryptfs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>gocryptfs</span></a> vorstellen. Damit können Verzeichnisse, welche z.B. per <a href="https://mastodon.social/tags/Samba" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Samba</span></a> gemountet wurden, transparent verschlüsselt werden.<br>Ein praktisches Beispiel ist die Erweiterung einer <a href="https://mastodon.social/tags/Nextcloud" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Nextcloud</span></a> mit einem externen Speicher, der über gocryptfs verschlüsselt wird. Der Artikel beschreibt das Vorgehen in Verbindung mit einer <a href="https://mastodon.social/tags/Hetzner" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hetzner</span></a> <a href="https://mastodon.social/tags/StorageBox" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>StorageBox</span></a>: <a href="https://decatec.de/home-server/gocryptfs-verschluesselung-von-dateien-auf-einem-samba-cifs-share-am-beispiel-nextcloud-externer-speicher/" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">decatec.de/home-server/gocrypt</span><span class="invisible">fs-verschluesselung-von-dateien-auf-einem-samba-cifs-share-am-beispiel-nextcloud-externer-speicher/</span></a></p>
GNU/Linux.ch<p>Verzeichnis verschlüsseln mit GoCryptFS</p><p>Ein einzelnes Verzeichnis mit GoCryptFS verschlüsseln, um private Daten zu verstecken. </p><p><a href="https://social.anoxinon.de/tags/Verzeichnis" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Verzeichnis</span></a> <a href="https://social.anoxinon.de/tags/verschl%C3%BCssen" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>verschlüssen</span></a> <a href="https://social.anoxinon.de/tags/Sicherheit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sicherheit</span></a> <a href="https://social.anoxinon.de/tags/gocryptfs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>gocryptfs</span></a></p><p><a href="https://gnulinux.ch/verzeichnis-verschluesseln-mit-gocryptfs" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">gnulinux.ch/verzeichnis-versch</span><span class="invisible">luesseln-mit-gocryptfs</span></a></p>