Encrypt your important files using Tomb

Slashdot it! Delicious Share on Facebook Tweet! Digg!

Conclusions

Tomb makes dealing with encrypted containers really easy. The well-conceived syntax is restricted to a few commands and buttons in everyday life. The approach of using standard Linux tools ensures trusted underpinnings – thus avoiding the need for Tomb to reinvent the encryption wheel.

As is so often true with encryption, the devil is in the details. Bad practices all too often thwart good approaches. Avoid keeping keys and containers on the same system – or at least store the key on a USB flash drive. You also need to make sure that the shell history doesn't reveal anything about the use of an encrypted container.

There are also restrictions in terms of portability: Kernel 2.6 or later are now available on almost all Linux systems. However, you will need administrative privileges on the computer for most Tomb actions, even to open a Tomb for example.

This means users who work with Linux but do not manage the system themselves cannot use the tool. Users with Mac OS X or Windows remain completely sidelined. However, on the project page, the developers carefully imply that there are at least plans for a Windows version.

Some users may miss a graphical interface for mounting and managing Tombs. There are currently many useful approaches, such as a small GTK program for the system tray or a GUI written using Python. They were not totally impressive in the test, however. zuluCrypt [9], which – based on the information provided by the developer – at least supports opening and closing Tombs, currently makes the best impression (Figure 3).

Figure 3: zuluCrypt supports use of containers and partitions encrypted with TrueCrypt and VeraCrypt as well as dm-crypt and LUKS.

It supports the use of containers and partitions encrypted with TrueCrypt and VeraCrypt as well as dm-crypt and LUKS. However, it is pretty easy to integrate Tomb into your own scripts and thus make operations more intuitive, without needing graphical programs.

Buy this article as PDF

Express-Checkout as PDF

Pages: 6

Price $0.99
(incl. VAT)

Buy Ubuntu User

SINGLE ISSUES
 
SUBSCRIPTIONS
 
TABLET & SMARTPHONE APPS
Get it on Google Play

US / Canada

Get it on Google Play

UK / Australia

Related content

  • Encrypting flash drives with UsbCryptFormat

    USB sticks and external hard drives can easily be lost or stolen. You should therefore protect these storage media against loss and misuse. UsbCryptFormat lets you do this without much effort.

  • Encrypting email with GnuPG

    US intelligence agencies tap into billions of call data and electronic messages monthly – reason enough to consider encrypting your email traffic.

  • Zeroshell workshop

    A wireless LAN is easier to set up than a cable LAN but is significantly less secure. A RADIUS server can change that.

  • Playing with Parrot Security OS

    The latest release of Parrot Security OS has some extremely colorful plumage, which will appeal to both hackers and lay users interested in their systems' safety.

  • Installing and testing Nextcloud

    Leading ownCloud developers, including the project founder Frank Karlitschek, became dissatisfied with the direction of the project, so they started Nextcloud, a fork of the code and a new company. The goal is to create a better balance among the company, clients, and users. We take a look at how Nextcloud is faring.