Is setting up dm-crypt in Ubuntu enough to keep myself safe?
>>56993371
from what?
>>56993392
From government seizure.
No, throw your computers out your window, only that will keep you safe.
>>56993399
When people have physical access to your computer, it is a matter of time and resources to get in.
If you are doing something illegal, get out while you can.
If you are working with something classified, ask your superiors.
When people have physical access to a well-encrypted container with a strong passphrase, they are shit out of luck. Don't listen to the absurd horseshit you're going to get from intelligence community shills.
>>56993399
You have to provide them access to files if given a warrant. So you're only safe from illegal access.
>>56993531
If you use strong encryption with a long passphrase, you're set.
>>56993399
If the gubmint is actually interested in your drives >>56993680
is right....
But if you are storing the data you want to hide then you already have a problem.
Tails is the goto for that kind of shit for a reason. Once the gubmint has your shit, you're done defending it unless you don't mind going to jail.
The only real options for data storage are to hide it before the government seizes it.
If you are getting your doors kicked in, you shouldn't even have the sensitive material in plain sight/access.
Due to the fact that you are asking this question, I'm assuming you're just a techbabby who wants to hide the fact he downloaded the /k/ doc....but doesn't realize the feds don't give a shit about you. If you actually plan to do illegal shit, then you should already know that starting with this little info is retarded and fuck you for asking us to help you learn.
>implying l33t NSA doesn't already have a 0day for AES
>>56993531
Uh no, not with good encryption. That's the point.
>>56993680
5th.
>>56993399
default dm-crypt options aren't good enough, so no
if you're concerned about LEA then you've already lost desu