Differences
This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision Next revision Both sides next revision | ||
software:files [2015/07/30 21:02] cyril |
software:files [2022/04/24 15:47] cyril [DigitalWill] creation |
||
---|---|---|---|
Line 10: | Line 10: | ||
* do a full mirror backup of the data partition regularly (eg with rsync or a deduplicate software such as Attic) on an external hard drive or a network drive. Try to keep at least one copy somewhere else from your home (network drive, or one at home and one at work). | * do a full mirror backup of the data partition regularly (eg with rsync or a deduplicate software such as Attic) on an external hard drive or a network drive. Try to keep at least one copy somewhere else from your home (network drive, or one at home and one at work). | ||
* take precautions to put the odds on your side in case of problem: make copies of your disks MBR (output of command p of fdisk), of your encrypted partitions headers, etc. | * take precautions to put the odds on your side in case of problem: make copies of your disks MBR (output of command p of fdisk), of your encrypted partitions headers, etc. | ||
+ | |||
+ | ===== Digital Will ===== | ||
+ | |||
+ | The goal is threefold: | ||
+ | * No one non-authorized can ever access to your data | ||
+ | * The trusted persons can only access to your data in some conditions (deceased, coma, ...) | ||
+ | * You are alerted when your data is accessed by the trusted persons (in case the access was not legitimate) | ||
+ | |||
+ | Three approaches: | ||
+ | * A service that gives your data to designated persons when they provide a death certificate for you (Wishbook, ...) | ||
+ | * Cons: sending a fake document, does not work for coma, service needs to remain available | ||
+ | * A service that regularly checks that you are alive by requesting a connection with your private credentials, | ||
+ | * Cons: there will be some delay between when you stop pinging and when your data becomes available, service needs to remain available (but it can be automatized, | ||
+ | * Split the secret between several people (cf [[https:// | ||
+ | * Cons: people need to remain accessible (and not loose the information), | ||
+ | |||
+ | What to transmit? | ||
+ | * Passwords (master password of your password manager, computer, encrypted data partitions, phone, ...) | ||
+ | * Instructions about what data you have | ||
+ | |||
+ | |||
+ | Notes: | ||
+ | * Different levels of amount of information for your spouse, children, other family, friends? | ||
+ | * How to transmit data (such as pictures) to a child? Probably has to go through a tutor. | ||
+ | |||
+ | |||
+ | |||
===== File Systems ===== | ===== File Systems ===== | ||
Line 49: | Line 76: | ||
ext3grep < | ext3grep < | ||
</ | </ | ||
+ | * '' | ||
* others: debugfs, foremost, [[http:// | * others: debugfs, foremost, [[http:// | ||