Chances are you have some type of information on your desktop or laptop computer that someone else wants--for the wrong reasons. For the most part, your information is relatively safe in your home.
In the Linux Journal article “Implementing Encrypted Home Directories” (August 2003), I described how to encrypt home directories transparently. This article describes how to implement another ...
It looks like some block chaining modes are intended (?) to resist modification of the ciphertext, and these block chaining modes are supported by dm-crypt. But I only half-understand this stuff. Does ...