Closed chri2 closed 2 years ago
Have a look at #414. You can force it without issue.
Yes, thanks, I already had read that and it worked this way.
But...
didn't bring up anything about attack vectors through swap-usage and explanations why using swap and which type of swap poses a risk to tomb.
I'm having a bad feeling using -f force without understanding what risk I might take and what other warnings/errors might get forced on the way.
Since the whole purpose of the software is about security understanding the risks is crucial to anybody using it.
I'd love to see some reference somewhere about these questions (or being pointed to the once I missed).
Applied these changes to not stumble over the missing --force
again and again.
Just stumbled over this after an os upgrade, again: pass is trying to open the tomb, but can't, because tomb doesn't like the cryptswap.
Release ;-) ?
Whoeps, my bad I have never made a stable release including this improvement. On it
I'm trying pass in combination with tomb on my Librem5:
I didn't dive deep into the subject and didn't find sufficient information about it: searching for about half an hour on tombs page and here on github didn't bring up anything about attack vectors through swap-usage and explanations why using swap and which type of swap poses a risk to tomb.
zramswap is an unencrypted swap living in ram memory. It can be used to use ram on devices with little memory more efficiently - in my case: the librem5 linux mobile smartphone with 3GB ram.
Thought it can also be configured to write to disk which would pose a different threat to a tomb I guess.
My expectation would be that there isn't any warning about zram configured to use ram only (no writeback) and tomb on its own and pass-tomb would work without warnings.