[go: up one dir, main page]

|
|
Log in / Subscribe / Register

Preventing information leaks from ext4 filesystems

Preventing information leaks from ext4 filesystems

Posted Apr 28, 2021 0:31 UTC (Wed) by comicfans (subscriber, #117233)
Parent article: Preventing information leaks from ext4 filesystems

Emm... what if user delete a file with important-information-as-filename by mistake and want to restore it ?


to post comments

Preventing information leaks from ext4 filesystems

Posted Apr 28, 2021 0:45 UTC (Wed) by tytso (subscriber, #9993) [Link] (1 responses)

See https://lwn.net/Articles/854689/ for the answer to your question.

Preventing information leaks from ext4 filesystems

Posted Apr 28, 2021 2:05 UTC (Wed) by comicfans (subscriber, #117233) [Link]

# "rm is forever" and the solution for accidental deletion of files is to refer to your backups.

I think if this is true, then clear filename is not solution for sensitive information leak prevention should be also true . takes cloud VM as example, no matter you trust provider or not , every memory bit is transparent. I can not see any advantage filename-clear over encryption (they both not work). If you're just afraid of sibling VM of others (hardware sidechannel attack maybe), this may reduce the attack window, but still not resolve problem. if such attach exists, they can read more than just filename.


Copyright © 2026, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds