Comment on How does SecureErase work?
vzq@lemmy.blahaj.zone 6 months ago
Hot take: It’s what old farts used to use back in the day.
These days you should just use encrypting file systems with per-file keying (like eg APFS) and stop worrying about deletion leaving file data around.
JackGreenEarth@lemm.ee 6 months ago
I don’t want to encrypt my drive in case I forget the encryption key and lose all my data
naeap@sopuli.xyz 6 months ago
Yeah, I’m having a hard time deciding about that.
On the one hand I’m often in business trips and want to be at least able to recover my data easily if something happens.
On the other hand getting the laptop stolen with all the data is a nightmare.
Didn’t look into current solutions for quite some time though. As I’m currently waiting for a new laptop, this could be a good time to check something out.
Anyone with some suggestions? (Will look into the encrypted FS OP recommended, but having options and opinions never hurts)
GamingChairModel@lemmy.world 6 months ago
3-2-1 backup is important. I’ve been burned with lost files before, so I now make sure they’re available in multiple places.
I also encrypt everything. My laptops can’t be unlocked by anyone except myself: Apple Filevault on my Apple laptop, LVM on LUKS on my Linux laptop. If something happens to me, my laptops must be wiped completely to be useable as a used device.
My NAS keeps my backups of all my documents and media (and as a hobbyist photographer, I have over a terabyte of photos and videos I’ve taken). It’s encrypted, but I’ve written the key down on paper and put it in my physical documents. If something happens to me, someone who goes through my physical documents will have access to my digital files.
I pay a cloud service (Backblaze) for cloud backups. I trust the encryption and key management to not actually give the service provider any access to my files.
naeap@sopuli.xyz 6 months ago
Thanks!
Just one question: How do you sync your photos to your NAS on the go?
vzq@lemmy.blahaj.zone 6 months ago
Fair point. Data integrity and availability concerns often trump confidentiality.
Still, if your main concern is safe disposal rather than preventing unauthorized access, most major operating systems have ways to ensure continued access.