Ubuntu encrypted hard drive - possible to crack?











up vote
2
down vote

favorite












I'm using Ubuntu 18.04 on my laptop. If someone would steal my laptop, would it be possible for them to access my data stored on the laptop? Could any of them access my data, not just random people but people who really know what they are doing?




  • I'm using a pretty strong password using a special character, capitalized/normal characters and a digit.


  • I encrypted the hard drive when i installed Ubuntu











share|improve this question









New contributor




wimdewild is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.




















  • I think yes until your data/disk is encrypted
    – Kulfy
    7 hours ago






  • 1




    Sorry i forgot to mention, i did choose the option when first time installing Ubuntu to use the encryption, is this what you mean?
    – wimdewild
    7 hours ago










  • Nothing is "Hackproof" but yes Ubuntu is more "Hack-Resistant" than Windows if that is your comparison. Part of the reason is technology but mostly Hackers prefer to target the Window's User Base because pickings are more juicy and easier prey.
    – WinEunuuchs2Unix
    6 hours ago










  • @WinEunuuchs2Unix Not to start a flamewar... but what do you base that on? Windows has improved a lot over the previous five years.
    – vidarlo
    6 hours ago






  • 2




    obligatory xkcd: xkcd.com/538
    – njzk2
    5 hours ago















up vote
2
down vote

favorite












I'm using Ubuntu 18.04 on my laptop. If someone would steal my laptop, would it be possible for them to access my data stored on the laptop? Could any of them access my data, not just random people but people who really know what they are doing?




  • I'm using a pretty strong password using a special character, capitalized/normal characters and a digit.


  • I encrypted the hard drive when i installed Ubuntu











share|improve this question









New contributor




wimdewild is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.




















  • I think yes until your data/disk is encrypted
    – Kulfy
    7 hours ago






  • 1




    Sorry i forgot to mention, i did choose the option when first time installing Ubuntu to use the encryption, is this what you mean?
    – wimdewild
    7 hours ago










  • Nothing is "Hackproof" but yes Ubuntu is more "Hack-Resistant" than Windows if that is your comparison. Part of the reason is technology but mostly Hackers prefer to target the Window's User Base because pickings are more juicy and easier prey.
    – WinEunuuchs2Unix
    6 hours ago










  • @WinEunuuchs2Unix Not to start a flamewar... but what do you base that on? Windows has improved a lot over the previous five years.
    – vidarlo
    6 hours ago






  • 2




    obligatory xkcd: xkcd.com/538
    – njzk2
    5 hours ago













up vote
2
down vote

favorite









up vote
2
down vote

favorite











I'm using Ubuntu 18.04 on my laptop. If someone would steal my laptop, would it be possible for them to access my data stored on the laptop? Could any of them access my data, not just random people but people who really know what they are doing?




  • I'm using a pretty strong password using a special character, capitalized/normal characters and a digit.


  • I encrypted the hard drive when i installed Ubuntu











share|improve this question









New contributor




wimdewild is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.











I'm using Ubuntu 18.04 on my laptop. If someone would steal my laptop, would it be possible for them to access my data stored on the laptop? Could any of them access my data, not just random people but people who really know what they are doing?




  • I'm using a pretty strong password using a special character, capitalized/normal characters and a digit.


  • I encrypted the hard drive when i installed Ubuntu








password security encryption shutdown hacking






share|improve this question









New contributor




wimdewild is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.











share|improve this question









New contributor




wimdewild is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.









share|improve this question




share|improve this question








edited 15 mins ago





















New contributor




wimdewild is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.









asked 7 hours ago









wimdewild

172




172




New contributor




wimdewild is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.





New contributor





wimdewild is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.






wimdewild is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.












  • I think yes until your data/disk is encrypted
    – Kulfy
    7 hours ago






  • 1




    Sorry i forgot to mention, i did choose the option when first time installing Ubuntu to use the encryption, is this what you mean?
    – wimdewild
    7 hours ago










  • Nothing is "Hackproof" but yes Ubuntu is more "Hack-Resistant" than Windows if that is your comparison. Part of the reason is technology but mostly Hackers prefer to target the Window's User Base because pickings are more juicy and easier prey.
    – WinEunuuchs2Unix
    6 hours ago










  • @WinEunuuchs2Unix Not to start a flamewar... but what do you base that on? Windows has improved a lot over the previous five years.
    – vidarlo
    6 hours ago






  • 2




    obligatory xkcd: xkcd.com/538
    – njzk2
    5 hours ago


















  • I think yes until your data/disk is encrypted
    – Kulfy
    7 hours ago






  • 1




    Sorry i forgot to mention, i did choose the option when first time installing Ubuntu to use the encryption, is this what you mean?
    – wimdewild
    7 hours ago










  • Nothing is "Hackproof" but yes Ubuntu is more "Hack-Resistant" than Windows if that is your comparison. Part of the reason is technology but mostly Hackers prefer to target the Window's User Base because pickings are more juicy and easier prey.
    – WinEunuuchs2Unix
    6 hours ago










  • @WinEunuuchs2Unix Not to start a flamewar... but what do you base that on? Windows has improved a lot over the previous five years.
    – vidarlo
    6 hours ago






  • 2




    obligatory xkcd: xkcd.com/538
    – njzk2
    5 hours ago
















I think yes until your data/disk is encrypted
– Kulfy
7 hours ago




I think yes until your data/disk is encrypted
– Kulfy
7 hours ago




1




1




Sorry i forgot to mention, i did choose the option when first time installing Ubuntu to use the encryption, is this what you mean?
– wimdewild
7 hours ago




Sorry i forgot to mention, i did choose the option when first time installing Ubuntu to use the encryption, is this what you mean?
– wimdewild
7 hours ago












Nothing is "Hackproof" but yes Ubuntu is more "Hack-Resistant" than Windows if that is your comparison. Part of the reason is technology but mostly Hackers prefer to target the Window's User Base because pickings are more juicy and easier prey.
– WinEunuuchs2Unix
6 hours ago




Nothing is "Hackproof" but yes Ubuntu is more "Hack-Resistant" than Windows if that is your comparison. Part of the reason is technology but mostly Hackers prefer to target the Window's User Base because pickings are more juicy and easier prey.
– WinEunuuchs2Unix
6 hours ago












@WinEunuuchs2Unix Not to start a flamewar... but what do you base that on? Windows has improved a lot over the previous five years.
– vidarlo
6 hours ago




@WinEunuuchs2Unix Not to start a flamewar... but what do you base that on? Windows has improved a lot over the previous five years.
– vidarlo
6 hours ago




2




2




obligatory xkcd: xkcd.com/538
– njzk2
5 hours ago




obligatory xkcd: xkcd.com/538
– njzk2
5 hours ago










1 Answer
1






active

oldest

votes

















up vote
6
down vote













First of all, nothing is totally secure. Computers are extremely complex, and software is extremely complex. The chance of no unknown security holes are basically nil.



Second, a password only protects the running operating system. Unless the disk is encrypted, it's trivial (<3 minutes) to remove the disk from the machine, and read whatever files you want.



Third, configuration has a lot of impact. Do you have an encrypted disk, but unencrypted swap? In that case the passphrase for encryption is probably stored somewhere in swap - especially if you have suspended the system to disk once.



Or do you have Firewire exposed on the computer? Firewire by default allows memory access, which means that an attacker may simply sift trough memory for your encryption keys...



Linux is no more secure than Windows to an attacker that has physical access to the machine - one could even argue that as Windows has TPM support enabled by default if you use Bitlocker, but Linux requires manual configuration of this - that a default Windows installation is safer against a local attacker.



When it comes to remote access (e.g. over a network), Linux distributions tend to fare rather well - simply because they don't run a lot of network services by default.



Define your threats, and try to mitigate them. If you worry about random thiefs getting access to your data, drive encryption and always powering laptop off before moving it or leaving it unattended will probably be enough. Against targeted espionage, that is probably not enough, as an attacker may for instance add logging devices while the laptop is unattended.



So in short - no, don't assume you're safe. Clearly define your threats, and the expected resources of the threat. A random thief will probably spend five minutes trying passwords, and move on and sell the hardware. CIA will be more sophisticated.






share|improve this answer























  • To be honest i'm not really a wizkid, so i have no idea about firewall and such, all i know is i have a laptop with linux ubuntu + the encryption that you can choose when installing ubuntu. Police raided my house but before they could enter i managed to power off the laptop so i assumed it's encrypted and could only be accessed with the strong password i made. So basically you're saying they could take out the harddrive and still access it or somehow?
    – wimdewild
    7 hours ago












  • @wimdewild Why would they bother when they know you can squeal?
    – chx101
    6 hours ago










  • If it's encrypted they cannot access it without knowing the pass phrase.
    – vidarlo
    6 hours ago






  • 3




    @wimdewild that question would be better asked to a lawyer, but in some countries you are legally obliged to give you password
    – njzk2
    5 hours ago






  • 1




    @wimdewild you would chose jail rather than give your password? That makes you sound very guilty
    – Tim
    4 hours ago











Your Answer








StackExchange.ready(function() {
var channelOptions = {
tags: "".split(" "),
id: "89"
};
initTagRenderer("".split(" "), "".split(" "), channelOptions);

StackExchange.using("externalEditor", function() {
// Have to fire editor after snippets, if snippets enabled
if (StackExchange.settings.snippets.snippetsEnabled) {
StackExchange.using("snippets", function() {
createEditor();
});
}
else {
createEditor();
}
});

function createEditor() {
StackExchange.prepareEditor({
heartbeatType: 'answer',
convertImagesToLinks: true,
noModals: true,
showLowRepImageUploadWarning: true,
reputationToPostImages: 10,
bindNavPrevention: true,
postfix: "",
imageUploader: {
brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
allowUrls: true
},
onDemand: true,
discardSelector: ".discard-answer"
,immediatelyShowMarkdownHelp:true
});


}
});






wimdewild is a new contributor. Be nice, and check out our Code of Conduct.










draft saved

draft discarded


















StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2faskubuntu.com%2fquestions%2f1102162%2fubuntu-encrypted-hard-drive-possible-to-crack%23new-answer', 'question_page');
}
);

Post as a guest















Required, but never shown

























1 Answer
1






active

oldest

votes








1 Answer
1






active

oldest

votes









active

oldest

votes






active

oldest

votes








up vote
6
down vote













First of all, nothing is totally secure. Computers are extremely complex, and software is extremely complex. The chance of no unknown security holes are basically nil.



Second, a password only protects the running operating system. Unless the disk is encrypted, it's trivial (<3 minutes) to remove the disk from the machine, and read whatever files you want.



Third, configuration has a lot of impact. Do you have an encrypted disk, but unencrypted swap? In that case the passphrase for encryption is probably stored somewhere in swap - especially if you have suspended the system to disk once.



Or do you have Firewire exposed on the computer? Firewire by default allows memory access, which means that an attacker may simply sift trough memory for your encryption keys...



Linux is no more secure than Windows to an attacker that has physical access to the machine - one could even argue that as Windows has TPM support enabled by default if you use Bitlocker, but Linux requires manual configuration of this - that a default Windows installation is safer against a local attacker.



When it comes to remote access (e.g. over a network), Linux distributions tend to fare rather well - simply because they don't run a lot of network services by default.



Define your threats, and try to mitigate them. If you worry about random thiefs getting access to your data, drive encryption and always powering laptop off before moving it or leaving it unattended will probably be enough. Against targeted espionage, that is probably not enough, as an attacker may for instance add logging devices while the laptop is unattended.



So in short - no, don't assume you're safe. Clearly define your threats, and the expected resources of the threat. A random thief will probably spend five minutes trying passwords, and move on and sell the hardware. CIA will be more sophisticated.






share|improve this answer























  • To be honest i'm not really a wizkid, so i have no idea about firewall and such, all i know is i have a laptop with linux ubuntu + the encryption that you can choose when installing ubuntu. Police raided my house but before they could enter i managed to power off the laptop so i assumed it's encrypted and could only be accessed with the strong password i made. So basically you're saying they could take out the harddrive and still access it or somehow?
    – wimdewild
    7 hours ago












  • @wimdewild Why would they bother when they know you can squeal?
    – chx101
    6 hours ago










  • If it's encrypted they cannot access it without knowing the pass phrase.
    – vidarlo
    6 hours ago






  • 3




    @wimdewild that question would be better asked to a lawyer, but in some countries you are legally obliged to give you password
    – njzk2
    5 hours ago






  • 1




    @wimdewild you would chose jail rather than give your password? That makes you sound very guilty
    – Tim
    4 hours ago















up vote
6
down vote













First of all, nothing is totally secure. Computers are extremely complex, and software is extremely complex. The chance of no unknown security holes are basically nil.



Second, a password only protects the running operating system. Unless the disk is encrypted, it's trivial (<3 minutes) to remove the disk from the machine, and read whatever files you want.



Third, configuration has a lot of impact. Do you have an encrypted disk, but unencrypted swap? In that case the passphrase for encryption is probably stored somewhere in swap - especially if you have suspended the system to disk once.



Or do you have Firewire exposed on the computer? Firewire by default allows memory access, which means that an attacker may simply sift trough memory for your encryption keys...



Linux is no more secure than Windows to an attacker that has physical access to the machine - one could even argue that as Windows has TPM support enabled by default if you use Bitlocker, but Linux requires manual configuration of this - that a default Windows installation is safer against a local attacker.



When it comes to remote access (e.g. over a network), Linux distributions tend to fare rather well - simply because they don't run a lot of network services by default.



Define your threats, and try to mitigate them. If you worry about random thiefs getting access to your data, drive encryption and always powering laptop off before moving it or leaving it unattended will probably be enough. Against targeted espionage, that is probably not enough, as an attacker may for instance add logging devices while the laptop is unattended.



So in short - no, don't assume you're safe. Clearly define your threats, and the expected resources of the threat. A random thief will probably spend five minutes trying passwords, and move on and sell the hardware. CIA will be more sophisticated.






share|improve this answer























  • To be honest i'm not really a wizkid, so i have no idea about firewall and such, all i know is i have a laptop with linux ubuntu + the encryption that you can choose when installing ubuntu. Police raided my house but before they could enter i managed to power off the laptop so i assumed it's encrypted and could only be accessed with the strong password i made. So basically you're saying they could take out the harddrive and still access it or somehow?
    – wimdewild
    7 hours ago












  • @wimdewild Why would they bother when they know you can squeal?
    – chx101
    6 hours ago










  • If it's encrypted they cannot access it without knowing the pass phrase.
    – vidarlo
    6 hours ago






  • 3




    @wimdewild that question would be better asked to a lawyer, but in some countries you are legally obliged to give you password
    – njzk2
    5 hours ago






  • 1




    @wimdewild you would chose jail rather than give your password? That makes you sound very guilty
    – Tim
    4 hours ago













up vote
6
down vote










up vote
6
down vote









First of all, nothing is totally secure. Computers are extremely complex, and software is extremely complex. The chance of no unknown security holes are basically nil.



Second, a password only protects the running operating system. Unless the disk is encrypted, it's trivial (<3 minutes) to remove the disk from the machine, and read whatever files you want.



Third, configuration has a lot of impact. Do you have an encrypted disk, but unencrypted swap? In that case the passphrase for encryption is probably stored somewhere in swap - especially if you have suspended the system to disk once.



Or do you have Firewire exposed on the computer? Firewire by default allows memory access, which means that an attacker may simply sift trough memory for your encryption keys...



Linux is no more secure than Windows to an attacker that has physical access to the machine - one could even argue that as Windows has TPM support enabled by default if you use Bitlocker, but Linux requires manual configuration of this - that a default Windows installation is safer against a local attacker.



When it comes to remote access (e.g. over a network), Linux distributions tend to fare rather well - simply because they don't run a lot of network services by default.



Define your threats, and try to mitigate them. If you worry about random thiefs getting access to your data, drive encryption and always powering laptop off before moving it or leaving it unattended will probably be enough. Against targeted espionage, that is probably not enough, as an attacker may for instance add logging devices while the laptop is unattended.



So in short - no, don't assume you're safe. Clearly define your threats, and the expected resources of the threat. A random thief will probably spend five minutes trying passwords, and move on and sell the hardware. CIA will be more sophisticated.






share|improve this answer














First of all, nothing is totally secure. Computers are extremely complex, and software is extremely complex. The chance of no unknown security holes are basically nil.



Second, a password only protects the running operating system. Unless the disk is encrypted, it's trivial (<3 minutes) to remove the disk from the machine, and read whatever files you want.



Third, configuration has a lot of impact. Do you have an encrypted disk, but unencrypted swap? In that case the passphrase for encryption is probably stored somewhere in swap - especially if you have suspended the system to disk once.



Or do you have Firewire exposed on the computer? Firewire by default allows memory access, which means that an attacker may simply sift trough memory for your encryption keys...



Linux is no more secure than Windows to an attacker that has physical access to the machine - one could even argue that as Windows has TPM support enabled by default if you use Bitlocker, but Linux requires manual configuration of this - that a default Windows installation is safer against a local attacker.



When it comes to remote access (e.g. over a network), Linux distributions tend to fare rather well - simply because they don't run a lot of network services by default.



Define your threats, and try to mitigate them. If you worry about random thiefs getting access to your data, drive encryption and always powering laptop off before moving it or leaving it unattended will probably be enough. Against targeted espionage, that is probably not enough, as an attacker may for instance add logging devices while the laptop is unattended.



So in short - no, don't assume you're safe. Clearly define your threats, and the expected resources of the threat. A random thief will probably spend five minutes trying passwords, and move on and sell the hardware. CIA will be more sophisticated.







share|improve this answer














share|improve this answer



share|improve this answer








edited 5 hours ago

























answered 7 hours ago









vidarlo

8,71742341




8,71742341












  • To be honest i'm not really a wizkid, so i have no idea about firewall and such, all i know is i have a laptop with linux ubuntu + the encryption that you can choose when installing ubuntu. Police raided my house but before they could enter i managed to power off the laptop so i assumed it's encrypted and could only be accessed with the strong password i made. So basically you're saying they could take out the harddrive and still access it or somehow?
    – wimdewild
    7 hours ago












  • @wimdewild Why would they bother when they know you can squeal?
    – chx101
    6 hours ago










  • If it's encrypted they cannot access it without knowing the pass phrase.
    – vidarlo
    6 hours ago






  • 3




    @wimdewild that question would be better asked to a lawyer, but in some countries you are legally obliged to give you password
    – njzk2
    5 hours ago






  • 1




    @wimdewild you would chose jail rather than give your password? That makes you sound very guilty
    – Tim
    4 hours ago


















  • To be honest i'm not really a wizkid, so i have no idea about firewall and such, all i know is i have a laptop with linux ubuntu + the encryption that you can choose when installing ubuntu. Police raided my house but before they could enter i managed to power off the laptop so i assumed it's encrypted and could only be accessed with the strong password i made. So basically you're saying they could take out the harddrive and still access it or somehow?
    – wimdewild
    7 hours ago












  • @wimdewild Why would they bother when they know you can squeal?
    – chx101
    6 hours ago










  • If it's encrypted they cannot access it without knowing the pass phrase.
    – vidarlo
    6 hours ago






  • 3




    @wimdewild that question would be better asked to a lawyer, but in some countries you are legally obliged to give you password
    – njzk2
    5 hours ago






  • 1




    @wimdewild you would chose jail rather than give your password? That makes you sound very guilty
    – Tim
    4 hours ago
















To be honest i'm not really a wizkid, so i have no idea about firewall and such, all i know is i have a laptop with linux ubuntu + the encryption that you can choose when installing ubuntu. Police raided my house but before they could enter i managed to power off the laptop so i assumed it's encrypted and could only be accessed with the strong password i made. So basically you're saying they could take out the harddrive and still access it or somehow?
– wimdewild
7 hours ago






To be honest i'm not really a wizkid, so i have no idea about firewall and such, all i know is i have a laptop with linux ubuntu + the encryption that you can choose when installing ubuntu. Police raided my house but before they could enter i managed to power off the laptop so i assumed it's encrypted and could only be accessed with the strong password i made. So basically you're saying they could take out the harddrive and still access it or somehow?
– wimdewild
7 hours ago














@wimdewild Why would they bother when they know you can squeal?
– chx101
6 hours ago




@wimdewild Why would they bother when they know you can squeal?
– chx101
6 hours ago












If it's encrypted they cannot access it without knowing the pass phrase.
– vidarlo
6 hours ago




If it's encrypted they cannot access it without knowing the pass phrase.
– vidarlo
6 hours ago




3




3




@wimdewild that question would be better asked to a lawyer, but in some countries you are legally obliged to give you password
– njzk2
5 hours ago




@wimdewild that question would be better asked to a lawyer, but in some countries you are legally obliged to give you password
– njzk2
5 hours ago




1




1




@wimdewild you would chose jail rather than give your password? That makes you sound very guilty
– Tim
4 hours ago




@wimdewild you would chose jail rather than give your password? That makes you sound very guilty
– Tim
4 hours ago










wimdewild is a new contributor. Be nice, and check out our Code of Conduct.










draft saved

draft discarded


















wimdewild is a new contributor. Be nice, and check out our Code of Conduct.













wimdewild is a new contributor. Be nice, and check out our Code of Conduct.












wimdewild is a new contributor. Be nice, and check out our Code of Conduct.
















Thanks for contributing an answer to Ask Ubuntu!


  • Please be sure to answer the question. Provide details and share your research!

But avoid



  • Asking for help, clarification, or responding to other answers.

  • Making statements based on opinion; back them up with references or personal experience.


To learn more, see our tips on writing great answers.





Some of your past answers have not been well-received, and you're in danger of being blocked from answering.


Please pay close attention to the following guidance:


  • Please be sure to answer the question. Provide details and share your research!

But avoid



  • Asking for help, clarification, or responding to other answers.

  • Making statements based on opinion; back them up with references or personal experience.


To learn more, see our tips on writing great answers.




draft saved


draft discarded














StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2faskubuntu.com%2fquestions%2f1102162%2fubuntu-encrypted-hard-drive-possible-to-crack%23new-answer', 'question_page');
}
);

Post as a guest















Required, but never shown





















































Required, but never shown














Required, but never shown












Required, but never shown







Required, but never shown

































Required, but never shown














Required, but never shown












Required, but never shown







Required, but never shown







Popular posts from this blog

404 Error Contact Form 7 ajax form submitting

How to know if a Active Directory user can login interactively

Refactoring coordinates for Minecraft Pi buildings written in Python