Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
software:files [2018/01/10 18:22]
cyril [Data recovery]
software:files [2022/04/24 15:47] (current)
cyril [DigitalWill] creation
Line 10: Line 10:
   * do a full mirror backup of the data partition regularly (eg with rsync or a deduplicate software such as Attic) on an external hard drive or a network drive. Try to keep at least one copy somewhere else from your home (network drive, or one at home and one at work).   * do a full mirror backup of the data partition regularly (eg with rsync or a deduplicate software such as Attic) on an external hard drive or a network drive. Try to keep at least one copy somewhere else from your home (network drive, or one at home and one at work).
   * take precautions to put the odds on your side in case of problem: make copies of your disks MBR (output of command p of fdisk), of your encrypted partitions headers, etc.   * take precautions to put the odds on your side in case of problem: make copies of your disks MBR (output of command p of fdisk), of your encrypted partitions headers, etc.
 +
 +===== Digital Will =====
 +
 +The goal is threefold:
 +  * No one non-authorized can ever access to your data
 +  * The trusted persons can only access to your data in some conditions (deceased, coma, ...)
 +  * You are alerted when your data is accessed by the trusted persons (in case the access was not legitimate)
 +
 +Three approaches:
 +  * A service that gives your data to designated persons when they provide a death certificate for you (Wishbook, ...)
 +    * Cons: sending a fake document, does not work for coma, service needs to remain available
 +  * A service that regularly checks that you are alive by requesting a connection with your private credentials, and gives your data when you fail to do it.
 +    * Cons: there will be some delay between when you stop pinging and when your data becomes available, service needs to remain available (but it can be automatized, and you can host it yourself)
 +  * Split the secret between several people (cf [[https://en.wikipedia.org/wiki/Shamir%27s_Secret_Sharing|Shamir's secret]], implemented for instance in [[http://point-at-infinity.org/ssss/|ssss]] or [[https://github.com/jcushman/libgfshare|libgfshare]]), so that X out of Y need to agree to obtain your data.
 +    * Cons: people need to remain accessible (and not loose the information), compromise between robustness and risk of conspiracy
 +
 +What to transmit?
 +  * Passwords (master password of your password manager, computer, encrypted data partitions, phone, ...)
 +  * Instructions about what data you have
 +
 +
 +Notes:
 +  * Different levels of amount of information for your spouse, children, other family, friends?
 +  * How to transmit data (such as pictures) to a child? Probably has to go through a tutor.
 +
 +
 +
  
 ===== File Systems ===== ===== File Systems =====
software/files.txt ยท Last modified: 2022/04/24 15:47 by cyril
CC Attribution-Share Alike 4.0 International
Driven by DokuWiki Recent changes RSS feed Valid CSS Valid XHTML 1.0