this post was submitted on 01 Nov 2023
50 points (96.3% liked)

Privacy

31876 readers
434 users here now

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

Related communities

Chat rooms

much thanks to @gary_host_laptop for the logo design :)

founded 5 years ago
MODERATORS
 

Lately I started including what happens to my data in case I die unexpectedly in my threat model. As of now I'd like for everything to stay private. All my accounts have a strong password that I store on a keepass datbase that I store only on encrypted devices which themselves are protected only by PIN or Password with no biometrics (I use the pin only on my phone which is set up to get wiped after 20 failed unlock attempts to mitigate bruteforce attacks). As for what I post online, I keep it to a minimum and nothing really personal, preferring only viewing content through clients with no account when possible. I know some services allow to set up what happens after a certain period of inactivity but I was wondering if you guys can suggest anything else. Maybe some program that wipes the computer's drive after a period of inactivity? Some other tools or some tips I didn't consider?

you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 11 points 1 year ago (2 children)

If you want to make sure the data's never recoverable, just use a password in addition to your hardware keys to unlock your computers. So when you die it's completely gone forever. No one will ever decrypt it

If you want to make sure people can open your archives after your death, but only after your death, you could look at bit warden's emergency release functionality.

You could also implement Shamir's secret sharing, on some print out paper, so that two or more people would be required to collude to unlock your secrets. And if they're trusted people in different jurisdictions, you know they'll only do that after you're dead. Then they could use that to get to your digital legacy, your crypto wallets, your decryption keys etc. https://github.com/cyphar/paperback

[–] [email protected] 8 points 1 year ago (1 children)

Wow this paperback thing is a cool idea. I was looking to not share anything but I'm sure I can apply it to other cases.

[–] [email protected] 2 points 1 year ago

Yeah it's really neat. There's a couple other projects. But I think this is the most polished.

If you do use it, for long-term archival, make sure you get acid-free paper heavy stock. And use a nice quality printer. You might want a laminate it as well. Just to be safe I would print out two copies of everything, and only laminate one copy. And store them in separate folders wherever you're going to store them. That way if there's any issue if the lamination process the original data would just survive in the paper.

It's a great way to do your backups. You can store your encrypted data backed up in the cloud to multiple places. But you can store your keys offline with Shamir's secret sharing.