crypto_homes: Automate Encrypting sdcard ...

crypto_homes: Automate Encrypting sdcards + USBstick Key Creation (Use Any USBstick)

Aug 15, 2021

I'm sending this first notification to my Followers/Supporters. My first writeups will always be featured on my BMAC page. If you would like to stay informed on important updates be sure to follow me. Thank you.

In addition donations are completely optional but very much appreciated and help me bring out new content more often/upgrade hardware/sdcards/costs (+ give access to private posts).

Screenshot Starting Up crypto_homes:

First crypto_homes takes in the working device names (sdcard, usbstick and your cipher of choice- choose any cipher your kernel has compiled- here we see aes-xts-plain64, a strong, efficient cipher).

After this the choice is up to you. Once you have an sdcard + usbstick in your Linux device (should work on any Linux device as it is built on Linux trusted luks, using built in Linux commands- automating the process for you).

At this time there are 2 options (more to be added):

  • wipe disk

  • make_vol

Today I completed the first video demo for the first revision/release of crypto_homes: automates the process of creating as many encrypted $HOME sdcards as you like while also creating a 'key' for your sdcard on any blank USB stick.

crypto_homes tutorial/demonstration video:

https://tube.tchncs.de/w/cssAP6Syz9vUduCv99ExLN

Benefits Of Compartmentalization:

When regarding vulnerabilities of any sort, compartmentalization can become an important mitigation technique.

Analogy: When a puzzle has all of its pieces, it is possible to put it together. However, if pieces to this puzzle are available to store in differing locations, potential vulnerabilities can 'go missing,' even 'non-existent' depending on the vulnerability and its dependence on having all pieces/keys.

The idea behind crypto_homes is to bring in multiple benefits of compartmentalization: encryption detachable (sdcard) from your Linux device (My video example uses a Pinephone, but any Linux will work here).

This allows the sdcards to be stored (if convenient) when not in use (or left in/not booted) and are only decrypted when the correct key is available to the device.

The next form of compartmentalization being exhibited here is the key itself being separate from internal storage (unlike some full disk encryption setups which store the key on the first unlock).

In the form of a USB key
(a usbstick/drive of any type: crypto_homes automates this entire setup/creation process for you)

Added Benefits:

  • crypto_homes does not remove or disturb your original on device /home directory.

This means you can switch back and forth between encrypted sdcards and the internal /home directory at boot. If you need help with this leave a comment.

  • By giving you an easy way to create multiple encrypted sdcard $HOME disks, you have the opportunity to create differing environments, private identities (such as work, development, financial, and other personals you may wish to exclude from other $HOME disks.

Using crypto_homes:

First Step:

Download crypto_homes:

Other Download Options:

If you rather use git to download, you can either use:

torify git clone http://gg6zxtreajiijztyy5g6bt5o6l3qu32nrg7eulyemlhxwwl6enk6ghad.onion/RightToPrivacy/crypto_homes.git

Or

As alternative option if connected to a Torified Onion router (supporters have access to a early custom image for rpi) you can then run git without torify like so:

git clone http://gg6zxtreajiijztyy5g6bt5o6l3qu32nrg7eulyemlhxwwl6enk6ghad.onion/RightToPrivacy/crypto_homes.git

After downloading (using one of the above options), follow along below:

Next Step:

1.) Place any sdcard + usb stick in your Linux machine.

2.) Run cryptohome.sh

3.) Set the sdcard/usbstick location and select the encryption cipher of your choice

4.) The menu will print out and you can then select wipedisk or make_vol to create a new encrypted sdcard that starts with a copy of your current home directory.

Screenshot After Entering USBstick/sdcard/cipher:

I wrote crypto_homes shell to accept native bash/shell commands in addition to crypto_homes menu commands.

This can help you find your usbstick/sdcard or check on other parts of your Linux system.

I look forward to adding new features.

Questions/Comments welcome/open at the bottom.


Thank you for reading/watching/comments. :)
Thanks for reading and following/watching.


Thoughts, comments and any questions welcome below.

πŸ˜€ Thank you for Sharing this (Telegram/Social media + everywhere).

Don't forget to follow at the links below.

----------------------------------------------------------------------
πŸ§…πŸ” ANONYMOUS GITEA (.onion): Books, Code/Scripts, Wiki, more (make a repository)
πŸ§…πŸ” PASTEBIN (.onion): options- password protect, zk-256bit, "Burn After Reading" + more
----------------------------------------------------------------------
πŸ€— SUPPORT OPTIONS (If you like to)
πŸ’²CASHAPP: $HumanRightsTech
βœπŸ—’πŸŽž Politictech (BMAC Memberships (monthly supporter option)
🎁 EXTRAS: Unique extra Services (get something back for your support)
πŸ’³ Politictech Main Page: (info + current Crypto)
----------------------------------------------------------------------
FOLLOW:
βœπŸ—’MASTODON
🐦 TWITTER
🎞 PEERTUBE
🎞 BITCHUTE
🎞 ODYSEE
---------------------------------------------------------------------
βœ‰ CONTACT
-------------------------------------------------------------------------
THANK YOU for Sharing this, Liking, and Subscribing.
-------------------------------------------------------------------------
If you aren't registered for Odysee I'd love to see you over there.
Use my invite link: https://odysee.com/$invite/@RTP
--------------------------------------------------------------------------

ΒΏTe gusta esta publicaciΓ³n?

Comprar πŸ₯· (RTP) Privacy Tech Tips πŸ“‘ un cafΓ©

More from πŸ₯· (RTP) Privacy Tech Tips πŸ“‘