Is deploying a web application to a customer’s encrypted drive a secure solution against code theft?

I have developed a web service for customer. The web service is written in Python and running in Docker containers. It is managed by docker compose.
The customer wants my web service to run on their own Ubuntu servers, but I have control o… Continue reading Is deploying a web application to a customer’s encrypted drive a secure solution against code theft?

PCR to prevent TPM2 key unsealing in case of rogue DMA devices connected?

Security threat: physical theft of a laptop and a server that use TPM2 auto unlock FDE with LUKS. In both cases the TPM checks against some PCRs before unsealing the key. The laptop prompts for a TPM PIN, the server doesn’t. The attacker i… Continue reading PCR to prevent TPM2 key unsealing in case of rogue DMA devices connected?

Is specifying resume_offset for hybernation to LUKS-encrypted drive safe?

I need to enable hybernation to the LUKS-encrypted drive. My /boot partition is unencrypted hence it stores all kernel images as well as kernel parameters in unencrypted form. For hybernation to work I should specify where the swap file st… Continue reading Is specifying resume_offset for hybernation to LUKS-encrypted drive safe?

Which one is safer for persistent online data? Gpg per file encryption vs gpg encrypted image vs LUKS2 image

3 people need to share some data through cloud. The total amount of data is small (<5gb in total). The update rate is very low, 1 per month. The cloud has very limited security measures so we consider all the files stored in it are publ… Continue reading Which one is safer for persistent online data? Gpg per file encryption vs gpg encrypted image vs LUKS2 image

Is it safe to store the header and password from LUKS in an encrypted GPG script (symmetrically)?

I want to mount a LUKS partition and decided to do it with a separate script which will contain the password to the LUKS partition, it will also decrypt the header file and mount the partition.
What vulnerabilities does this approach add c… Continue reading Is it safe to store the header and password from LUKS in an encrypted GPG script (symmetrically)?