![]() Tomb aims to facilitate all this and to be interoperable across popular GNU/Linux operating systems. If you can’t own a laptop then it’s possible to go around with a USB stick and borrow computers, still leaving no trace and keeping your data safe during transports. ![]() Our target community are desktop users with no time to click around, sometimes using old or borrowed computers, operating in places endangered by conflict where a leak of personal data can be a threat. “ Democracy requires Privacy as much as Freedom of Expression.” Anonymous Plus there is no cloud service connected and no network connection needed: Tomb works entirely off-line, of course. Documentation for code literatesĪll dependencies used in Tomb are common GNU/Linux components, well peer reviewed and found in most distributions. We do our best to keep it short and easy to read. We believe that complexity hides insecurity, therefore Tomb is open source and basically just a script you can read and check for what it does. ![]() Good question, which ultimately we shouldn’t answer: it is up to anyone using such a delicate tool to assess its reliability, based on common understanding of code and opinions of trusted peers. v print version, license and list of available ciphersįor more informations on Tomb read the manual: man tomb Why should one trust this script? kdf generate passwords armored against dictionary attacks o mount options used to open (default: rw,noatime,nodev) n do not process the hooks found in tomb k path to the key to be used ('-k -' to read from stdin) s size of the tomb file when creating/resizing one (in MB) Setkey change the KEY locking a TOMB (needs old one) Resize resize a TOMB to a new size -s (can only grow) D print debugging information at runtimeįor more informations on Tomb read the manual: man tomb q run quietly without printing informations h print this help -v print version, license and list of available ciphers even if swap is active ) -kdf generate passwords armored against dictionary attacks o mount options used to open (default: rw,noatime,nodev ) -f force operation (i.e. s size of the tomb file when creating /resizing one ( in MB ) -k path to the key to be used ( '-k -' to read from stdin ) -n do not process the hooks found in tomb Setkey change the KEY locking a TOMB (needs old one )Įngrave makes a QR code of a KEY to be saved on paper Resize resize a TOMB to a new size -s (can only grow ) // Operations on keys: ![]() Slam slam a TOMB killing all programs using it List list of open TOMBs and information on them Search looks for filenames matching text patterns Lock installs a lock on a TOMB to use it with KEY Syntax: tomb command ĭig create a new empty TOMB file of size -s in MBįorge create a new KEY file and set its password To create a 100MB tomb called “secret” do: Please note that user permission problems are due to the fact they are not using sudo. Here is a nice review made by the Linux Action Show guys on August 2014, they recommend it as a replacement of TrueCrypt on GNU/Linux. Tombs are operated from a terminal commandline and require root access to the machine (or just sudo access to the script). Tomb is a simple shell script, you can just download the sourceĭistribution and copy it in your path, it will check for requirements installed. How does our file encryption on Linux works If you are already familiar, download the tar.gz and jump to the Installation instructions Tomb is a simple tool to manage encrypted storage on GNU/Linux, from the hashes of the dyne:bolic nesting mechanism. Tomb generates encrypted storage folders to be opened and closed using their associated keyfiles, which are also protected with a password chosen by the user.Ī tomb is like a locked folder that can be safely transported and hidden in a filesystem its keys can be kept separate, for instance keeping the tomb file on your computer harddisk and the key files on a USB stick. Tomb is written in code that is easy to review and links commonly shared components. Tomb is an 100% free and open source system for file encryption on GNU/Linux, facilitating the backup of secret files. Take care of the skeletons in your closet!
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |