Zum Inhalt der Seite gehen


PGP Encryption: How It Works and How You Can Get Started


Don’t let the name “Pretty Good Privacy” mislead you. PGP encryption is the gold standard for encrypted communication and has been used by everyone from nuclear activists to criminals since its invention in 1991. While the execution is complex, the concept is simple: you can encrypt text, making it unreadable to anyone who doesn’t have the key to decode it.

https://www.maketecheasier.com/pgp-encryption-how-it-works/



How to Encrypt a Btrfs Filesystem?


The Btrfs filesystem-level encryption feature is still not available. But you can use a 3rd party encryption tool like dm-crypt to encrypt the entire storage devices of your Btrfs filesystem.

In this article, I am going to show you how to encrypt the storage devices added to a Btrfs filesystem with dm-crypt. So, let’s get started.

https://linuxhint.com/encrypt-a-btrfs-filesystem/



VeraCrypt is a free open source disk encryption software


VeraCrypt main features:

Creates a virtual encrypted disk within a file and mounts it as a real disk.
Encrypts an entire partition or storage device such as USB flash drive or hard drive.
Encrypts a partition or drive where Windows is installed (pre-boot authentication).
Encryption is automatic, real-time(on-the-fly) and transparent.
Parallelization and pipelining allow data to be read and written as fast as if the drive was not encrypted.
Encryption can be hardware-accelerated on modern processors.
Provides plausible deniability, in case an adversary forces you to reveal the password: Hidden volume (steganography) and hidden operating system.
More information about the features of VeraCrypt may be found in the documentation

https://veracrypt.fr/en/Home.html



Verschlüsselte Root-Partition auf dem Raspberry Pi


Der ungewöhnliche Boot-Prozess der Raspberry Pi macht es nicht ganz leicht, die Root-Partition vollständig zu verschlüsseln.

Der Bootprozess des Raspberry Pi unterscheidet sich von demjenigen eines gewöhnlichen x86-basierten Desktop-Rechners oder Laptops ganz erheblich. Dort läuft der reguläre Bootprozess wie folgt ab:

https://mg.guelker.eu/blog/2014/rpiencroot.html