I'm in the process of learning about the implementation of
My question is: would an attacker have an advantage if they also had the metadata backup file? I have read some interesting posts discussing the fact that the presence of the metadata file will unambiguously indicate that an encrypted provision exists, and that there is an interest in transparent mechanisms to obscure the presence of encrypted file systems (plausible deniability). But does having the metadata make cryptographic attacks any easier? My sense is "no", but I have very little concept of what the metadata actually contains, so I'm not confident in that impression.
Thanks!
geli
. I understand that it requires metadata, and I have the impression (possibly wrong) that if I totally lose the metadata that the encrypted data is also lost for good. I know that geli init
by default will create a metadata backup in /var/backups/, or that I can trigger a metadata backup anytime with geli backup
.My question is: would an attacker have an advantage if they also had the metadata backup file? I have read some interesting posts discussing the fact that the presence of the metadata file will unambiguously indicate that an encrypted provision exists, and that there is an interest in transparent mechanisms to obscure the presence of encrypted file systems (plausible deniability). But does having the metadata make cryptographic attacks any easier? My sense is "no", but I have very little concept of what the metadata actually contains, so I'm not confident in that impression.
Thanks!