-
Notifications
You must be signed in to change notification settings - Fork 259
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Backup gocryptfs.conf? #100
Comments
Maybe you can find some info there: #50 |
Good link, yes! If you take a backup of your encrypted directory, I would recommend including gocryptfs.conf. This makes the backup self-contained and so much easier to restore. |
Thanks guys. The link was helpful. Since I use long password (more that 15 chars) I asume it is save to store it in backup. I think I will save the file in my local backup, but exclude it from an off-site backup. I will print out the master key as said when you mount the encrypted drive. |
@rfjakob, can you please elaborate on the security implications of uploading |
When you upload gocryptfs.conf to the cloud, the cloud provider could try to crack the password. This is not an issue if the password is strong ( see #50 (comment) for guidance ). Without gocryptfs.conf, there is no way to crack the password, so the password can be somewhat weaker. |
I'm sorry for creating an issue, but I didn't find the info anywhere else.
Is it save, recommended to store gocryptfs.conf in a backup?
The text was updated successfully, but these errors were encountered: