SlideShare a Scribd company logo
Encrypt all the things
Andrew Denner
February 2018 Central Iowa Linux User’s Group
Welcome to CIA LUG
Website: (http://cialug.org)
Email List: (see website)
IRC/Slack: (see website)
Video: Will be posted when it gets uploaded
Slides will be emailed after and at https://denner.co
Little about me
Andrew Denner
Email: denner@gmail.com
Website: http://denner.co
Twitter: @adenner
Slides will be posted to https://denner.co
Even paranoid
people have
enemies
If you lose your
private key (or
password) you will
loose data
Encrypt your home directory (ubuntu)
Why Encrypt? Why not encrypt?
● You have a laptop
● You deal with information that is sensitive
(PII)
● Healthy Paranoia
● You don’t care about your data
● Performance Hit
● Hard drive failure challenge
● Forget username and password you lose
your data
Easiest way to handle--From the start
Encrypt by hand…
Ubuntu uses eCryptfs (http://ecryptfs.org/about.html) think of it as PGP as a
filesystem
Screenshots are from
https://www.howtogeek.com/116032/how-to-encrypt-your-home-folder-after-installin
g-ubuntu/
You cannot encrypt your account while you are logged in… you need to create a
seperate account in the wheel group
sudo ecryptfs-migrate-home -u user
sudo ecryptfs-setup-swap
Note that an encrypted swap won’t work properly with Ubuntu’s hibernate feature
cleanup
sudo rm -rf /home/user.random
GNUPG
Swiss army knife of encryption… can do email, files, etc.
Dates back to Phil Zimmermann’s PGP (Prety Good Privacy)
We need to generate a lot of random bytes. It is a good idea to perform
some other action (type on the keyboard, move the mouse, utilize the
disks) during the prime generation; this gives the random number
generator a better chance to gain enough entropy.
++++++++++..+++++.+++++++++++++++.++++++++++...+++++++++++++++...++++++
+++++++++++++++++++++++++++++.+++++..+++++.+++++.+++++++++++++++++++++++++>.
++++++++++>+++++...........................................................+++++
Not enough random bytes available. Please do some other work to give
the OS a chance to collect more entropy! (Need 284 more bytes)
Let’s make some random to fix the problem! (in a
separate window) ls -l -R / would work as well
gpg -a --export-secret-key john.doe@example.com > secret_key
Generate revocation cert
gpg -a --gen-revoke john.doe@example.com >
revocation_cert.gpg
sec 4096R/144A027B 2013-11-04 John Doe
<john.doe@example.com>
Create a revocation certificate for this key? (y/N) y
Please select the reason for the revocation:
0 = No reason specified
1 = Key has been compromised
2 = Key is superseded
3 = Key is no longer used
Q = Cancel
(Probably you want to select 1 here)
Your decision? 1
Enter an optional description; end it with an empty line:
>
Reason for revocation: Key has been compromised
(No description given)
Is this okay? (y/N) y
You need a passphrase to unlock the secret key for
user: "John Doe <john.doe@example.com>"
4096-bit RSA key, ID 144A027B, created 2013-11-04
Revocation certificate created.
Please move it to a medium which you can hide away; if
Mallory gets
access to this certificate he can use it to make your key
unusable.
It is smart to print this certificate and store it away, just in
case
your media become unreadable. But have some caution:
The print system of
your machine might store the data and make it available to
others!
gpg -a --export john.doe@example.com > public_key.gpg
Web-based pgp
https://keybase.io/denner
Let’s encrypt
Resources
Lets encrypt https://letsencrypt.org/getting-started/
https://certbot.eff.org/
Gnupg https://www.gnupg.org/documentation/manuals/gnupg/
https://wiki.debian.org/Subkeys
https://encryptallthethings.net/

More Related Content

Similar to CIALUG: Encrypt all the things

Iso burning for morons
Iso burning for moronsIso burning for morons
Iso burning for morons
RossMob1
 
It's Assembler, Jim, but not as we know it: (ab)using binaries from embedded ...
It's Assembler, Jim, but not as we know it: (ab)using binaries from embedded ...It's Assembler, Jim, but not as we know it: (ab)using binaries from embedded ...
It's Assembler, Jim, but not as we know it: (ab)using binaries from embedded ...
Priyanka Aash
 
What the Heck Just Happened?
What the Heck Just Happened?What the Heck Just Happened?
What the Heck Just Happened?
Ken Evans
 
Infrastructure as code might be literally impossible part 2
Infrastructure as code might be literally impossible part 2Infrastructure as code might be literally impossible part 2
Infrastructure as code might be literally impossible part 2
ice799
 
Web 3, Week 1: Amazon Web Services for Beginners
Web 3, Week 1: Amazon Web Services for BeginnersWeb 3, Week 1: Amazon Web Services for Beginners
Web 3, Week 1: Amazon Web Services for Beginners
jkosoy
 
Old Linux Security Talk
Old Linux Security TalkOld Linux Security Talk
Old Linux Security Talk
Tanner Lovelace
 
Steelcon 2015 - 0wning the internet of trash
Steelcon 2015 - 0wning the internet of trashSteelcon 2015 - 0wning the internet of trash
Steelcon 2015 - 0wning the internet of trash
infodox
 
Tips from Support: Always Carry a Towel and Don’t Panic!
Tips from Support: Always Carry a Towel and Don’t Panic!Tips from Support: Always Carry a Towel and Don’t Panic!
Tips from Support: Always Carry a Towel and Don’t Panic!
Perforce
 
Windows logging workshop - BSides Austin 2014
Windows logging workshop - BSides Austin 2014Windows logging workshop - BSides Austin 2014
Windows logging workshop - BSides Austin 2014
Michael Gough
 
Dmitry Lebedev: Agile Testing Using Agile Tools
Dmitry Lebedev: Agile Testing Using Agile ToolsDmitry Lebedev: Agile Testing Using Agile Tools
Dmitry Lebedev: Agile Testing Using Agile Tools
Agile Lietuva
 
Why linux sucks
Why linux sucksWhy linux sucks
Why linux sucks
Nadeen Noaman
 
Hadoop 101 v2
Hadoop 101 v2Hadoop 101 v2
Hadoop 101 v2
John Berns
 
[ElasticStack]What happens when you visualize servers exposed to the world?
[ElasticStack]What happens when you visualize servers exposed to the world? [ElasticStack]What happens when you visualize servers exposed to the world?
[ElasticStack]What happens when you visualize servers exposed to the world?
Masamitsu Maehara
 
Yet Another Dan Kaminsky Talk (Black Ops 2014)
Yet Another Dan Kaminsky Talk (Black Ops 2014)Yet Another Dan Kaminsky Talk (Black Ops 2014)
Yet Another Dan Kaminsky Talk (Black Ops 2014)
Dan Kaminsky
 
Exploring the Internet of Things Using Ruby
Exploring the Internet of Things Using RubyExploring the Internet of Things Using Ruby
Exploring the Internet of Things Using Ruby
Mike Hagedorn
 
Presentation1
Presentation1Presentation1
Presentation1
Akane Uchita
 
Cloud Device Insecurity
Cloud Device InsecurityCloud Device Insecurity
Cloud Device Insecurity
Jeremy Brown
 
Windows 8 Forensics & Anti Forensics
Windows 8 Forensics & Anti ForensicsWindows 8 Forensics & Anti Forensics
Windows 8 Forensics & Anti Forensics
Mike Spaulding
 
Packaging is the Worst Way to Distribute Software, Except for Everything Else
Packaging is the Worst Way to Distribute Software, Except for Everything ElsePackaging is the Worst Way to Distribute Software, Except for Everything Else
Packaging is the Worst Way to Distribute Software, Except for Everything Else
mckern
 
Jordan Hubbard Talk @ LISA
Jordan Hubbard Talk @ LISAJordan Hubbard Talk @ LISA
Jordan Hubbard Talk @ LISA
guest4c923d
 

Similar to CIALUG: Encrypt all the things (20)

Iso burning for morons
Iso burning for moronsIso burning for morons
Iso burning for morons
 
It's Assembler, Jim, but not as we know it: (ab)using binaries from embedded ...
It's Assembler, Jim, but not as we know it: (ab)using binaries from embedded ...It's Assembler, Jim, but not as we know it: (ab)using binaries from embedded ...
It's Assembler, Jim, but not as we know it: (ab)using binaries from embedded ...
 
What the Heck Just Happened?
What the Heck Just Happened?What the Heck Just Happened?
What the Heck Just Happened?
 
Infrastructure as code might be literally impossible part 2
Infrastructure as code might be literally impossible part 2Infrastructure as code might be literally impossible part 2
Infrastructure as code might be literally impossible part 2
 
Web 3, Week 1: Amazon Web Services for Beginners
Web 3, Week 1: Amazon Web Services for BeginnersWeb 3, Week 1: Amazon Web Services for Beginners
Web 3, Week 1: Amazon Web Services for Beginners
 
Old Linux Security Talk
Old Linux Security TalkOld Linux Security Talk
Old Linux Security Talk
 
Steelcon 2015 - 0wning the internet of trash
Steelcon 2015 - 0wning the internet of trashSteelcon 2015 - 0wning the internet of trash
Steelcon 2015 - 0wning the internet of trash
 
Tips from Support: Always Carry a Towel and Don’t Panic!
Tips from Support: Always Carry a Towel and Don’t Panic!Tips from Support: Always Carry a Towel and Don’t Panic!
Tips from Support: Always Carry a Towel and Don’t Panic!
 
Windows logging workshop - BSides Austin 2014
Windows logging workshop - BSides Austin 2014Windows logging workshop - BSides Austin 2014
Windows logging workshop - BSides Austin 2014
 
Dmitry Lebedev: Agile Testing Using Agile Tools
Dmitry Lebedev: Agile Testing Using Agile ToolsDmitry Lebedev: Agile Testing Using Agile Tools
Dmitry Lebedev: Agile Testing Using Agile Tools
 
Why linux sucks
Why linux sucksWhy linux sucks
Why linux sucks
 
Hadoop 101 v2
Hadoop 101 v2Hadoop 101 v2
Hadoop 101 v2
 
[ElasticStack]What happens when you visualize servers exposed to the world?
[ElasticStack]What happens when you visualize servers exposed to the world? [ElasticStack]What happens when you visualize servers exposed to the world?
[ElasticStack]What happens when you visualize servers exposed to the world?
 
Yet Another Dan Kaminsky Talk (Black Ops 2014)
Yet Another Dan Kaminsky Talk (Black Ops 2014)Yet Another Dan Kaminsky Talk (Black Ops 2014)
Yet Another Dan Kaminsky Talk (Black Ops 2014)
 
Exploring the Internet of Things Using Ruby
Exploring the Internet of Things Using RubyExploring the Internet of Things Using Ruby
Exploring the Internet of Things Using Ruby
 
Presentation1
Presentation1Presentation1
Presentation1
 
Cloud Device Insecurity
Cloud Device InsecurityCloud Device Insecurity
Cloud Device Insecurity
 
Windows 8 Forensics & Anti Forensics
Windows 8 Forensics & Anti ForensicsWindows 8 Forensics & Anti Forensics
Windows 8 Forensics & Anti Forensics
 
Packaging is the Worst Way to Distribute Software, Except for Everything Else
Packaging is the Worst Way to Distribute Software, Except for Everything ElsePackaging is the Worst Way to Distribute Software, Except for Everything Else
Packaging is the Worst Way to Distribute Software, Except for Everything Else
 
Jordan Hubbard Talk @ LISA
Jordan Hubbard Talk @ LISAJordan Hubbard Talk @ LISA
Jordan Hubbard Talk @ LISA
 

More from Andrew Denner

All about Time, or how to stop from going back to the future
All about Time, or how to stop from going back to the futureAll about Time, or how to stop from going back to the future
All about Time, or how to stop from going back to the future
Andrew Denner
 
CIALUG October 2022 linux news
CIALUG October 2022 linux newsCIALUG October 2022 linux news
CIALUG October 2022 linux news
Andrew Denner
 
January 2022: Central Iowa Linux Users Group: Git
January 2022: Central Iowa Linux Users Group: GitJanuary 2022: Central Iowa Linux Users Group: Git
January 2022: Central Iowa Linux Users Group: Git
Andrew Denner
 
Cialug August 2021
Cialug August 2021Cialug August 2021
Cialug August 2021
Andrew Denner
 
Local Kubernetes for Dummies: STLLUG March 2021
Local Kubernetes for Dummies: STLLUG March 2021Local Kubernetes for Dummies: STLLUG March 2021
Local Kubernetes for Dummies: STLLUG March 2021
Andrew Denner
 
December 2020 CIALUG: Local Kubernetes for Dummies-So you want to move on fro...
December 2020 CIALUG: Local Kubernetes for Dummies-So you want to move on fro...December 2020 CIALUG: Local Kubernetes for Dummies-So you want to move on fro...
December 2020 CIALUG: Local Kubernetes for Dummies-So you want to move on fro...
Andrew Denner
 
St Louis Linux Users Group Wireguard (for Fun and Networking)
St Louis Linux Users Group Wireguard (for Fun and Networking)St Louis Linux Users Group Wireguard (for Fun and Networking)
St Louis Linux Users Group Wireguard (for Fun and Networking)
Andrew Denner
 
Central Iowa Linux Users Group: August 2020 Jupyter Lab
Central Iowa Linux Users Group: August 2020 Jupyter LabCentral Iowa Linux Users Group: August 2020 Jupyter Lab
Central Iowa Linux Users Group: August 2020 Jupyter Lab
Andrew Denner
 
Central Iowa Linux Users Group June 2020 Meeting Apache Guacamole
Central Iowa Linux Users Group June 2020 Meeting  Apache GuacamoleCentral Iowa Linux Users Group June 2020 Meeting  Apache Guacamole
Central Iowa Linux Users Group June 2020 Meeting Apache Guacamole
Andrew Denner
 
A brief intro to Ansible-CIALUG March 2020
A brief intro to Ansible-CIALUG March 2020A brief intro to Ansible-CIALUG March 2020
A brief intro to Ansible-CIALUG March 2020
Andrew Denner
 
Central Iowa Linux Users Group May 2020 Meeting: WireGuard
Central Iowa Linux Users Group May 2020 Meeting: WireGuardCentral Iowa Linux Users Group May 2020 Meeting: WireGuard
Central Iowa Linux Users Group May 2020 Meeting: WireGuard
Andrew Denner
 
Central Iowa Linux Users Group-December 2019: Windows Managers
Central Iowa Linux Users Group-December 2019: Windows ManagersCentral Iowa Linux Users Group-December 2019: Windows Managers
Central Iowa Linux Users Group-December 2019: Windows Managers
Andrew Denner
 
Central Iowa Linux Users Group: November Meeting -- Container showdown
Central Iowa Linux Users Group: November Meeting -- Container showdownCentral Iowa Linux Users Group: November Meeting -- Container showdown
Central Iowa Linux Users Group: November Meeting -- Container showdown
Andrew Denner
 
Central Iowa Linux Users Group October Meeting: Centos 8
Central Iowa Linux Users Group October Meeting: Centos 8Central Iowa Linux Users Group October Meeting: Centos 8
Central Iowa Linux Users Group October Meeting: Centos 8
Andrew Denner
 
Intro to networking
Intro to networkingIntro to networking
Intro to networking
Andrew Denner
 
A Brief overview of Linux, or How I learned to stop worrying and love the pen...
A Brief overview of Linux, or How I learned to stop worrying and love the pen...A Brief overview of Linux, or How I learned to stop worrying and love the pen...
A Brief overview of Linux, or How I learned to stop worrying and love the pen...
Andrew Denner
 
August CIALUG meeting: Debian buster
August CIALUG meeting: Debian busterAugust CIALUG meeting: Debian buster
August CIALUG meeting: Debian buster
Andrew Denner
 
Central Iowa Linux Users group July 2019--Jupyter Notebook on a Raspberry Pi
Central Iowa Linux Users group July 2019--Jupyter Notebook on a Raspberry PiCentral Iowa Linux Users group July 2019--Jupyter Notebook on a Raspberry Pi
Central Iowa Linux Users group July 2019--Jupyter Notebook on a Raspberry Pi
Andrew Denner
 
CIALUG June 2019: Raspberry Pi Facial Recognition
CIALUG June 2019: Raspberry Pi Facial RecognitionCIALUG June 2019: Raspberry Pi Facial Recognition
CIALUG June 2019: Raspberry Pi Facial Recognition
Andrew Denner
 
CIALUG May 2019 Meeting: An intro to docker and using rootless docker
CIALUG May 2019 Meeting: An intro to docker and using rootless dockerCIALUG May 2019 Meeting: An intro to docker and using rootless docker
CIALUG May 2019 Meeting: An intro to docker and using rootless docker
Andrew Denner
 

More from Andrew Denner (20)

All about Time, or how to stop from going back to the future
All about Time, or how to stop from going back to the futureAll about Time, or how to stop from going back to the future
All about Time, or how to stop from going back to the future
 
CIALUG October 2022 linux news
CIALUG October 2022 linux newsCIALUG October 2022 linux news
CIALUG October 2022 linux news
 
January 2022: Central Iowa Linux Users Group: Git
January 2022: Central Iowa Linux Users Group: GitJanuary 2022: Central Iowa Linux Users Group: Git
January 2022: Central Iowa Linux Users Group: Git
 
Cialug August 2021
Cialug August 2021Cialug August 2021
Cialug August 2021
 
Local Kubernetes for Dummies: STLLUG March 2021
Local Kubernetes for Dummies: STLLUG March 2021Local Kubernetes for Dummies: STLLUG March 2021
Local Kubernetes for Dummies: STLLUG March 2021
 
December 2020 CIALUG: Local Kubernetes for Dummies-So you want to move on fro...
December 2020 CIALUG: Local Kubernetes for Dummies-So you want to move on fro...December 2020 CIALUG: Local Kubernetes for Dummies-So you want to move on fro...
December 2020 CIALUG: Local Kubernetes for Dummies-So you want to move on fro...
 
St Louis Linux Users Group Wireguard (for Fun and Networking)
St Louis Linux Users Group Wireguard (for Fun and Networking)St Louis Linux Users Group Wireguard (for Fun and Networking)
St Louis Linux Users Group Wireguard (for Fun and Networking)
 
Central Iowa Linux Users Group: August 2020 Jupyter Lab
Central Iowa Linux Users Group: August 2020 Jupyter LabCentral Iowa Linux Users Group: August 2020 Jupyter Lab
Central Iowa Linux Users Group: August 2020 Jupyter Lab
 
Central Iowa Linux Users Group June 2020 Meeting Apache Guacamole
Central Iowa Linux Users Group June 2020 Meeting  Apache GuacamoleCentral Iowa Linux Users Group June 2020 Meeting  Apache Guacamole
Central Iowa Linux Users Group June 2020 Meeting Apache Guacamole
 
A brief intro to Ansible-CIALUG March 2020
A brief intro to Ansible-CIALUG March 2020A brief intro to Ansible-CIALUG March 2020
A brief intro to Ansible-CIALUG March 2020
 
Central Iowa Linux Users Group May 2020 Meeting: WireGuard
Central Iowa Linux Users Group May 2020 Meeting: WireGuardCentral Iowa Linux Users Group May 2020 Meeting: WireGuard
Central Iowa Linux Users Group May 2020 Meeting: WireGuard
 
Central Iowa Linux Users Group-December 2019: Windows Managers
Central Iowa Linux Users Group-December 2019: Windows ManagersCentral Iowa Linux Users Group-December 2019: Windows Managers
Central Iowa Linux Users Group-December 2019: Windows Managers
 
Central Iowa Linux Users Group: November Meeting -- Container showdown
Central Iowa Linux Users Group: November Meeting -- Container showdownCentral Iowa Linux Users Group: November Meeting -- Container showdown
Central Iowa Linux Users Group: November Meeting -- Container showdown
 
Central Iowa Linux Users Group October Meeting: Centos 8
Central Iowa Linux Users Group October Meeting: Centos 8Central Iowa Linux Users Group October Meeting: Centos 8
Central Iowa Linux Users Group October Meeting: Centos 8
 
Intro to networking
Intro to networkingIntro to networking
Intro to networking
 
A Brief overview of Linux, or How I learned to stop worrying and love the pen...
A Brief overview of Linux, or How I learned to stop worrying and love the pen...A Brief overview of Linux, or How I learned to stop worrying and love the pen...
A Brief overview of Linux, or How I learned to stop worrying and love the pen...
 
August CIALUG meeting: Debian buster
August CIALUG meeting: Debian busterAugust CIALUG meeting: Debian buster
August CIALUG meeting: Debian buster
 
Central Iowa Linux Users group July 2019--Jupyter Notebook on a Raspberry Pi
Central Iowa Linux Users group July 2019--Jupyter Notebook on a Raspberry PiCentral Iowa Linux Users group July 2019--Jupyter Notebook on a Raspberry Pi
Central Iowa Linux Users group July 2019--Jupyter Notebook on a Raspberry Pi
 
CIALUG June 2019: Raspberry Pi Facial Recognition
CIALUG June 2019: Raspberry Pi Facial RecognitionCIALUG June 2019: Raspberry Pi Facial Recognition
CIALUG June 2019: Raspberry Pi Facial Recognition
 
CIALUG May 2019 Meeting: An intro to docker and using rootless docker
CIALUG May 2019 Meeting: An intro to docker and using rootless dockerCIALUG May 2019 Meeting: An intro to docker and using rootless docker
CIALUG May 2019 Meeting: An intro to docker and using rootless docker
 

Recently uploaded

Transform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR SolutionsTransform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR Solutions
TheSMSPoint
 
Artificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension FunctionsArtificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension Functions
Octavian Nadolu
 
Oracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptxOracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptx
Remote DBA Services
 
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
XfilesPro
 
Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)
Julian Hyde
 
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
Bert Jan Schrijver
 
SMS API Integration in Saudi Arabia| Best SMS API Service
SMS API Integration in Saudi Arabia| Best SMS API ServiceSMS API Integration in Saudi Arabia| Best SMS API Service
SMS API Integration in Saudi Arabia| Best SMS API Service
Yara Milbes
 
Requirement Traceability in Xen Functional Safety
Requirement Traceability in Xen Functional SafetyRequirement Traceability in Xen Functional Safety
Requirement Traceability in Xen Functional Safety
Ayan Halder
 
How to write a program in any programming language
How to write a program in any programming languageHow to write a program in any programming language
How to write a program in any programming language
Rakesh Kumar R
 
Energy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina JonuziEnergy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina Jonuzi
Green Software Development
 
GreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-JurisicGreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-Jurisic
Green Software Development
 
Modelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - AmsterdamModelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - Amsterdam
Alberto Brandolini
 
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, FactsALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
Green Software Development
 
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Łukasz Chruściel
 
Hand Rolled Applicative User Validation Code Kata
Hand Rolled Applicative User ValidationCode KataHand Rolled Applicative User ValidationCode Kata
Hand Rolled Applicative User Validation Code Kata
Philip Schwarz
 
All you need to know about Spring Boot and GraalVM
All you need to know about Spring Boot and GraalVMAll you need to know about Spring Boot and GraalVM
All you need to know about Spring Boot and GraalVM
Alina Yurenko
 
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s EcosystemUI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
Peter Muessig
 
SQL Accounting Software Brochure Malaysia
SQL Accounting Software Brochure MalaysiaSQL Accounting Software Brochure Malaysia
SQL Accounting Software Brochure Malaysia
GohKiangHock
 
Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdf
Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdfTop Benefits of Using Salesforce Healthcare CRM for Patient Management.pdf
Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdf
VALiNTRY360
 
What next after learning python programming basics
What next after learning python programming basicsWhat next after learning python programming basics
What next after learning python programming basics
Rakesh Kumar R
 

Recently uploaded (20)

Transform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR SolutionsTransform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR Solutions
 
Artificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension FunctionsArtificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension Functions
 
Oracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptxOracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptx
 
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
 
Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)
 
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
 
SMS API Integration in Saudi Arabia| Best SMS API Service
SMS API Integration in Saudi Arabia| Best SMS API ServiceSMS API Integration in Saudi Arabia| Best SMS API Service
SMS API Integration in Saudi Arabia| Best SMS API Service
 
Requirement Traceability in Xen Functional Safety
Requirement Traceability in Xen Functional SafetyRequirement Traceability in Xen Functional Safety
Requirement Traceability in Xen Functional Safety
 
How to write a program in any programming language
How to write a program in any programming languageHow to write a program in any programming language
How to write a program in any programming language
 
Energy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina JonuziEnergy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina Jonuzi
 
GreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-JurisicGreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-Jurisic
 
Modelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - AmsterdamModelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - Amsterdam
 
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, FactsALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
 
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
 
Hand Rolled Applicative User Validation Code Kata
Hand Rolled Applicative User ValidationCode KataHand Rolled Applicative User ValidationCode Kata
Hand Rolled Applicative User Validation Code Kata
 
All you need to know about Spring Boot and GraalVM
All you need to know about Spring Boot and GraalVMAll you need to know about Spring Boot and GraalVM
All you need to know about Spring Boot and GraalVM
 
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s EcosystemUI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
 
SQL Accounting Software Brochure Malaysia
SQL Accounting Software Brochure MalaysiaSQL Accounting Software Brochure Malaysia
SQL Accounting Software Brochure Malaysia
 
Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdf
Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdfTop Benefits of Using Salesforce Healthcare CRM for Patient Management.pdf
Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdf
 
What next after learning python programming basics
What next after learning python programming basicsWhat next after learning python programming basics
What next after learning python programming basics
 

CIALUG: Encrypt all the things

  • 1. Encrypt all the things Andrew Denner February 2018 Central Iowa Linux User’s Group
  • 2.
  • 3. Welcome to CIA LUG Website: (http://cialug.org) Email List: (see website) IRC/Slack: (see website) Video: Will be posted when it gets uploaded Slides will be emailed after and at https://denner.co
  • 4. Little about me Andrew Denner Email: denner@gmail.com Website: http://denner.co Twitter: @adenner Slides will be posted to https://denner.co
  • 6. If you lose your private key (or password) you will loose data
  • 7. Encrypt your home directory (ubuntu)
  • 8. Why Encrypt? Why not encrypt? ● You have a laptop ● You deal with information that is sensitive (PII) ● Healthy Paranoia ● You don’t care about your data ● Performance Hit ● Hard drive failure challenge ● Forget username and password you lose your data
  • 9. Easiest way to handle--From the start
  • 10. Encrypt by hand… Ubuntu uses eCryptfs (http://ecryptfs.org/about.html) think of it as PGP as a filesystem Screenshots are from https://www.howtogeek.com/116032/how-to-encrypt-your-home-folder-after-installin g-ubuntu/
  • 11. You cannot encrypt your account while you are logged in… you need to create a seperate account in the wheel group
  • 13.
  • 14.
  • 16. Note that an encrypted swap won’t work properly with Ubuntu’s hibernate feature
  • 17. cleanup sudo rm -rf /home/user.random
  • 18. GNUPG Swiss army knife of encryption… can do email, files, etc. Dates back to Phil Zimmermann’s PGP (Prety Good Privacy)
  • 19.
  • 20. We need to generate a lot of random bytes. It is a good idea to perform some other action (type on the keyboard, move the mouse, utilize the disks) during the prime generation; this gives the random number generator a better chance to gain enough entropy. ++++++++++..+++++.+++++++++++++++.++++++++++...+++++++++++++++...++++++ +++++++++++++++++++++++++++++.+++++..+++++.+++++.+++++++++++++++++++++++++>. ++++++++++>+++++...........................................................+++++ Not enough random bytes available. Please do some other work to give the OS a chance to collect more entropy! (Need 284 more bytes)
  • 21. Let’s make some random to fix the problem! (in a separate window) ls -l -R / would work as well
  • 22.
  • 23.
  • 24.
  • 25. gpg -a --export-secret-key john.doe@example.com > secret_key
  • 26. Generate revocation cert gpg -a --gen-revoke john.doe@example.com > revocation_cert.gpg sec 4096R/144A027B 2013-11-04 John Doe <john.doe@example.com> Create a revocation certificate for this key? (y/N) y Please select the reason for the revocation: 0 = No reason specified 1 = Key has been compromised 2 = Key is superseded 3 = Key is no longer used Q = Cancel (Probably you want to select 1 here) Your decision? 1 Enter an optional description; end it with an empty line: > Reason for revocation: Key has been compromised (No description given) Is this okay? (y/N) y You need a passphrase to unlock the secret key for user: "John Doe <john.doe@example.com>" 4096-bit RSA key, ID 144A027B, created 2013-11-04 Revocation certificate created. Please move it to a medium which you can hide away; if Mallory gets access to this certificate he can use it to make your key unusable. It is smart to print this certificate and store it away, just in case your media become unreadable. But have some caution: The print system of your machine might store the data and make it available to others!
  • 27. gpg -a --export john.doe@example.com > public_key.gpg
  • 30.
  • 31. Resources Lets encrypt https://letsencrypt.org/getting-started/ https://certbot.eff.org/ Gnupg https://www.gnupg.org/documentation/manuals/gnupg/ https://wiki.debian.org/Subkeys https://encryptallthethings.net/