On Tue, Apr 28, 2020 at 03:51:57PM -0400, Simo Sorce wrote: > If the threat model is just stolen/lost laptop/disk then encrypting the > user data only would be sufficient. Strictly speaking I'd say /etc/shadow, /var/lib/{pgsql,mysql}/, /etc/sysconfig/network-scripts/ and /etc/NetworkManager/ are also quite likely to contain user data - the first as a bruteforce-target, the second as these are quite often installed on dev machines (in my experience), and the others as they often contain passwords in plaintext, which may be even more critical as the actual user data. I'd say there is no way around full disk encryption, maybe lifting the hard restriction on not having double encryption might be an option, but I don't have any performance data on that. All the best, David
Attachment:
signature.asc
Description: PGP signature
_______________________________________________ devel mailing list -- devel@xxxxxxxxxxxxxxxxxxxxxxx To unsubscribe send an email to devel-leave@xxxxxxxxxxxxxxxxxxxxxxx Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/devel@xxxxxxxxxxxxxxxxxxxxxxx