<div dir="ltr"><div dir="ltr"><br></div><br><div class="gmail_quote gmail_quote_container"><div dir="ltr" class="gmail_attr">On Wed, Dec 31, 2025 at 7:11 PM Douglas Lucas <<a href="mailto:dal@riseup.net">dal@riseup.net</a>> wrote:<br></div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">For a nomadic freelance journalist, does it matter whether I deploy LUKS<br>
for drive encryption on an ATA drive or on an SSD drive? In other words,<br>
is ATA better for encryption because it's less complicated than SSD and<br>
therefore there are fewer things to screw up. <br></blockquote><div>..... </div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">
<br>
Also, ChatGPT claimed the below, but I'm not sure what or how much it<br>
means regarding plausible deniability setups or ATA vs SSD security<br>
under LUKS:<br>
===<br>
Encryption + Wear Leveling<br></blockquote><div><br></div>Wear leveling and automatic sparing of "blocks" should not matter today.<br>With LUKS, Linux Unified Key Setup, a standard for full disk encryption on Linux systems, provides strong security for entire drives or partitions using dm-crypt. All data of interest will be encrypted on the media. A block that is remapped by the drive will have old encrypted data without a context making it darn hard to recover a secret.<br><br>Secure drives that support an erase command discard the saved encryption key and generate a new key for all future writes that begin with making a file system. They are almost standard.<br><br>I might recommend one disk/partition key set to support booting the OS<br>and then a different key for /home/your-data.<br><br>Look into your content management editors for insecure backup file work in progress. Automatic Copies in temp directories ;-}<br><br>Make sure you can securely and safely boot the machine to prove it is a functional computer at TSA airport stations.<br>i.e. /home/your-data is not needed to boot. Perhaps multiple user accounts.<br><br>Sleep mode, screen saver, auto shut down, power off, true power off, syslog files.<br><br></div><div class="gmail_quote gmail_quote_container">Important: passwords, identity and key management is hard. Do not mix OS and personal data keys.<br>Data backups are still a necessary thing so backup in a way you know, understand and can verify.<br><br>First pass LUKS works well. Second pass, poor key management can be a problem. <br>How does a Journalist communicate with his/her editor and office (tools and process)? <br><br></div><span class="gmail_signature_prefix">-- </span><br><div dir="ltr" class="gmail_signature"><div dir="ltr"> T o m M i t c h e l l (on NiftyEgg[.]com )</div></div></div>