I am afraid I don't exactly understand what people are asking. I assume it has something to do with "what does DrKK do for encryption". So let me answer that.
99.91% of my data, at least on a per-megabyte basis, is either not sensitive at all, or only mildly sensitive. Therefore, the whole setup it is protected by the usual, more-than-enough, nerd vigilance, in that my WAN gateway, my routers, any wireless ingress, etc., is all locked down to an extent that it will thwart any bot- or script-kiddie-driven hacking. I am a strong believer that the 0.0001% marginal gains that nerds do with their security posture actually DECREASE their security. I think standard measures:
- Minimizing the number of services forwarded through the WAN gateway
- Not running anything on standard ports
- Using a minimum of WPA2 with AES for any wireless
- Allowing only certificate-based SSH authentication, rejecting password authentication
- Regularly checking logs, manually
- Any services that must be opened to the WAN run in fascistly locked down jails (see also 2 above)
- Not letting anyone on my LAN that does not have at least my level of knowledge and understanding (I am less concerned about malicious LAN users, than I am about incompetent LAN users who bring malicious devices on to my LAN unknowingly due to incompetence).
more or less keep your home FreeNAS completely safe from "hackers" whatever that means (it usually means bots written to probe for vulnerabilities that morons leave wide open).
For the few things I have that must be fully resistant to data lossage to an adversary (tax returns, videos of me with cyberjock's mom, copies of passports, videos of Jordan with cyberjock's mom, etc), I simply create a TrueCrypt folder (not even Veracrypt), and store it in there. I assess that--generally speaking--TrueCrypt, with a strong password, is perfectly secure even against the most potent of adversaries, notwithstanding bullshit conspiracies. (Veracrypt is better than TrueCrypt only primarily in the sense that the way the hashing works, even a weaker, semi-guessable password will be prohibitively expensive to guess in most cases). But if your password is BallsShit1029NiShiShaGuaAnusAnusAnus0xDEADBEEFCyberj0ck'sm0/\/\ then you are in good hands with TrueCrypt 7.1a in my humble opinion.
And that's it. I would *NEVER* encrypt a whole device, or a whole filesystem. That's just foolish (I would of course allow the exception that an employer might be required by law or policy to encrypt the filesystem). First of all, as a percentage of bytes, very very very little of our data is worth even protecting, is it not? And even so, against whom would massive encryption protect me? Rajiv in the Western Digital RMA center in case I have to RMA a drive? What, Rajiv is going to:
- give a shit about my drive
- even know what ZFS is
- now, giving a shit, and knowing what ZFS is, is going to mount the filesystem somehow with one device?
- and given all of that, is going to find something he gives a shit about?
You see, for me, such a Rajiv probably doesn't exist. Such a person is doing much more interesting things in his life than fondling my drives upon RMA, no? And for the guy that breaks into my house and steals my NAS? If that guy even knew what a NAS was, he wouldn't be stealing shit. And if the guy he sells the stuff to has any interest at all in anything besides wiping and reselling the drives, I'd be surprised. So there's just no threat surface. And if a state-sponsored actor is after your data? Then you're screwed anyway. So....what's the point?
Thus, by encrypting an entire device at the filesystem level, I *substantially* increase my risk of data loss due to either accident or incompetence, and I do not necessarily reduce my risk of data spill in any meaningful way (since the threat surface is already thin). So there is a tremendous uptick in risk that you *create* by encrypting your pool, which is not matched by a corresponding increase in security, in my view. So that's why I don't do it.
But I of course see absolutely nothing wrong with a TrueCrypt encrypted "file container", and just storing that as-is on the NAS, for the presumably small amount of data that requires that kind of protection that each of us have.
That is, in fact, what I do. I have the following things in encrypted file containers:
- Firefox profile
- Thunderbird profile
- Pidgin profile
- Tax documents
- Passport scans
- and similar.
That's about it. The rest of my NAS is completely unencrypted, and I feel completely fine about that.