— FEATURED —
Guatemala: Nation's highest court throws out Ríos Montt genocide trial verdict and prison sentence
Eurovision 2013: An American in London
The Twelve-Fingered Boy - mesmerizing YA horror novel
Black Code: how spies, cops and crims are making cyberspace unfit for human habitation
ADVERTISE AT BOING BOING!
— COMICS —
Real Stuff: Bad Trip
Tom the Dancing Bug
TOM THE DANCING BUG: Super-Fun-Pak Comix, featuring Caveman Robot, and MORE!
Brain Rot: The Statue
— GUATEMALA SPECIAL SERIES —
Guatemala awaits Constitutional Court rulings, defense continues legal challenges to genocide trial
Victoria Sanford: "It’s Too Soon to Declare Victory in Guatemalan Genocide"
— RECENTLY —
We Can Fix it! - a graphic novel time travel memoir
The technology that links taxonomy and Star Trek
Odd Duck: great picture book about eccentricity and ducks
Scatter, Adapt, and Remember: How Humans Will Survive a Mass Extinction
Illustrator William Stout's Legends of the Blues - exclusive excerpt
Hackers prepare for first "national holiday" in their honor
Review: Disunion, the VR guillotine simulator
Mousetronaut: kids' picture book about mouse in space, written by a Shuttle pilot
Review: Pebble e-paper watch
Nothing Can Possibly Go Wrong: YA graphic novel about robots, romance and school elections
— FOLLOW US —
Boing Boing is on Twitter and Facebook. Subscribe to our RSS feed or daily email.
— POLICIES —
Except where indicated, Boing Boing is licensed under a Creative Commons License permitting non-commercial sharing with attribution
— FONTS —
Rob Beschizza at 6:55 am Mon, Jan 2, 2012
Is this worth it?
Running real-time encryption on your system drive has a performance impact, whether you’re using Microsoft’s BitLocker or TrueCrypt 6.3a. However, the performance penalty is quite acceptable, and the hit is roughly the same whether you’re looking at a dual-core Core i5-600-series CPU or a quad-core Core i5-700-series chip. Still, we recommend being careful with older hardware, particularly on single-core systems where real-time encryption may noticeably slow down performance.
I had my laptop stolen from my house last year (which was running full-disk encryption). On my (admittedly nice RAID SSD) system, I never noticed a performance cost, but for any performance hit, it’s a better use of your system resources than synthetic performance benchmarks ever will be.
If your system is using specific x86 processors, some of AES encryption instructions are hard-coded into the chip and give a significant speek boost. TrueCrypt v7 and later make use of this expanding x86 Intruction Set.
I’m so jealous, my Core i7 doesn’t have ‘em…
How does this complicate backups, and recovery, of data after a catastrophic failure?
I reversed it out on my laptop because I had to in order to resize the partitions. Haven’t bothered putting it back on since. I would if my laptop ever left my house, or if I had anything on it I cared about. Financial/health stuff is in a smaller, encrypted store on the NAS machine which is a very nondescript box sitting under a shelf in the basement where it never moves and is unlikely to be a theft target.
Michael, no complication to either my cloud or NAS backups.
Softwarewise? No. But on my SSD my disk i/o takes a TREMENDOUS hit when copying large files. I’m running Bitlocker on Windows Enterprise 64 bit.
Like Michael said the only real issue I see is with a catastrophic disk failure. Running any of the file encryption programs on a partition/whole disc level changes the partition type and configuration, most recovery programs are going to be useless.
Of course if you are going as far as whole disc encryption, one might assume you also are backing up things on a regular basis, so if the drive went belly up it wouldn’t be much of a data loss…
The whole-disk encryption on Mac OS X is, if I recall correctly, largely designed to be used with a single (primary/main) disk. So, use Truecrypt (to compliment the built-in stuff) – it’s easy.
BTW, if you’re not sure if it’s all worth it, just ask yourself if you would prefer to explain to the police/lawyers/judge/jury about how it was [an accident/not actually your stuff/you lost the license key or permission slip or whatever and that's why you used a code you got from some scuzzy site/thought that it was 'fair use'] …or whether you’d rather not because they don’t have anything because it’s encrypted. Think about whether or not anyone will ever trust you after that or how it will affect your work, personal life, ability to get a loan, relationships with friends, etc.
If you think it won’t or can’t happen to you or not in your freedom-loving country, think again. It can, it does, and given enough time it will.
Furthermore, it’s only actually FDE in Lion. Snow Leopard and earlier only encrypt the Home folder in an easily crackable manner.