On Sun, 21 Apr 2013 at 13:54, Mike Reinstein wrote: > Maybe I'm just misunderstanding the problem. Is it being suggested that the > unencrypted copy of the data should be backed up over sshfs to an untrusted > machine? No, I think the untrusted machine would hold the encrypted data, which is mounted to a trusted machine, where it's then decrypted via ecryptfs. In my example: >> sid0# sshfs root@localhost:/mnt/disk/enc /mnt/disk/sshfs >> root@localhost's password: Here, localhost (untrusted) will hold the encrypted content in /mnt/disk/enc, which is now mounted on a trusted machine, still encryted: sid0# ls -go /mnt/disk/sshfs/ total 32 drwx------ 1 12288 Apr 21 13:16 ECRYPTFS_FNEK_ENCRYPTED.FWYIx22XUxYW1kS.8RBEqYi.2ckHIID6ncewGoCHUK9KZiv5Ci99Q9LW3E-- >> sid0# mount -t ecryptfs /mnt/disk/sshfs /mnt/disk/dec The decryption is done on the trusted machine. Maybe my example is kinda confusing because I'm using "localhost" as the "untrusted remote machine". But if you replace "localhost" with "evilhost", it should be clearer. C. -- BOFH excuse #353: Second-system effect. -- To unsubscribe from this list: send the line "unsubscribe ecryptfs" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html