LinuxQuestions.org
Share your knowledge at the LQ Wiki.
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 12-10-2008, 03:27 AM   #1
chromei386
Member
 
Registered: Dec 2008
Distribution: Fedora 13
Posts: 30

Rep: Reputation: 15
Keeping your activities private on Linux - command history, shred, thumbnail cache


Hi,

Let's assume for a second I'm really paranoid. Now I'm thinking the best option to keeping everything private is to encrypt the whole hard drive. But let's just say that wasn't an option for now.. I'm looking to see what traces I leave behind and want to clean that up, to avoid prying eyes from stumbling across some personal information (think shared computer).

I'll list a few of the things I know about now, and have a few questions about them:

Command history - history -c - is it really secure, or am I better to track down the file and shred -zu it?

Clipboard contents - where do I access and delete?

Recent documents list - can I shred -zu it? Is it .recently-used? how can I refresh GNOME so the update takes effect immediately? then do a > .recently_used to create a new file?

Where is the recent applications list stored?

Where is the thumbnail cache stored? .thumbnails?

And I've got Firefox do an auto-clean to clear all the private data.. but is that enough? Is there still remaining files in /tmp that I'll need to clear?

Also I use Truecrypt to keep my files secure. But what about the records from other programs that open up those files? Will they be cleared in the .recently-used?

Maybe I've missed something? Lot's of q's I know

I did track down a program called Sweeper that should take care of it? But I'd also like to understand also.

Maybe there's a better program. There was a program called CCleaner for Windows XP I used to use which was great...

Appreciate it
 
Old 12-10-2008, 05:36 AM   #2
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,417
Blog Entries: 55

Rep: Reputation: 3627Reputation: 3627Reputation: 3627Reputation: 3627Reputation: 3627Reputation: 3627Reputation: 3627Reputation: 3627Reputation: 3627Reputation: 3627Reputation: 3627
Quote:
Originally Posted by chromei386 View Post
Let's assume for a second I'm really paranoid. Now I'm thinking the best option to keeping everything private is to encrypt the whole hard drive. But let's just say that wasn't an option for now..
If the decision was made knowing the caveats then "not an option" should be the trade-off between "keeping things private" and usability tipping towards usability. But if you haven't researched and understood what it takes then "not an option" is founded in lack of information, not true paranoia.


Quote:
Originally Posted by chromei386 View Post
I'm looking to see what traces I leave behind and want to clean that up, to avoid prying eyes from stumbling across some personal information (think shared computer).
You might also want to read this recent thread because it gives you the means to find out file locations yourself.


Quote:
Originally Posted by chromei386 View Post
Command history - history -c - is it really secure
"Secure" how?


Quote:
Originally Posted by chromei386 View Post
I did track down a program called Sweeper that should take care of it? But I'd also like to understand also.
Post the URI?


Quote:
Originally Posted by chromei386 View Post
There was a program called CCleaner for Windows XP I used to use which was great...
"Great" as in it provided you with a soothing, easy interface or "great" because you actually checked things where irrecoverable?
 
Old 12-10-2008, 05:00 PM   #3
SlowCoder
Senior Member
 
Registered: Oct 2004
Location: Southeast, U.S.A.
Distribution: Debian based
Posts: 1,250

Rep: Reputation: 164Reputation: 164
Why can't you just create a separate account for the other user(s)?
 
Old 12-11-2008, 06:11 AM   #4
chromei386
Member
 
Registered: Dec 2008
Distribution: Fedora 13
Posts: 30

Original Poster
Rep: Reputation: 15
Ok, so by the response, and yes, I confess, I should have researched it more thoroughly before asking the questions, I should encrypt the whole filesystem as that will give me a much higher level of security (relatively speaking).

I was looking to find out what kind of traces I left, and then attempt to clear these before I logged out, but it appears that it can be extensive and better not to take that chance and just encrypt the whole filesystem.

With history -c "secure how" what I meant was, can someone just run a quick undelete program on .bash_history or similar and quickly gain access to it. Or does it actually overwrite with random data making it very hard to recover.

Sweeper is a tool that is KDE based and can be found here: http://utils.kde.org/projects/sweeper

I thought CCleaner was great because I could get it to overwrite the data 35 times, and I thought it was quite thorough to go through everything (maybe this is unfounded) It did have a nice easy interface, with a one button operation. I did like that, but part of switching to Linux is to understand a bit more about the system I'm using too. I guess I'm still in a transitional period right now.

I do appreciate your response. I'll read up more on it, and probably go with the "encrypt it all" option
 
Old 12-11-2008, 12:27 PM   #5
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,417
Blog Entries: 55

Rep: Reputation: 3627Reputation: 3627Reputation: 3627Reputation: 3627Reputation: 3627Reputation: 3627Reputation: 3627Reputation: 3627Reputation: 3627Reputation: 3627Reputation: 3627
Quote:
Originally Posted by chromei386 View Post
probably go with the "encrypt it all" option
What I mean is that encryption, while good, can only be a solution if it fits whatever you define as "keeping things private". For instance encrypting /home will not cover KDE/apps tempfiles in /tmp and /var. Encrypting the whole filesystem might exclude swap. Encrypting the whole filesystem including swap might exclude plaintext comms with the outside world, backups, removable media et cetera. As you widen your scope of what you define as "keeping things private" you'll want to talk about the traces you leave behind elsewhere, like what others know of you by you enabling Java, java/ecmascript, plugins, your browsing behaviour, using proxies, submitting personal and financial details, purchases, et cetera.

I'm not trying to spread FUD just trying to make you aware of some of the aspects that could help define "keeping things private".

Last edited by unSpawn; 12-11-2008 at 12:31 PM.
 
Old 12-11-2008, 12:58 PM   #6
rweaver
Senior Member
 
Registered: Dec 2008
Location: Louisville, OH
Distribution: Debian, CentOS, Slackware, RHEL, Gentoo
Posts: 1,833

Rep: Reputation: 167Reputation: 167
Quote:
Originally Posted by chromei386 View Post
Hi, Let's assume for a second ...<SNIP>...
Appreciate it
Link any of your history files to /dev/null (.bash_history, .viminfo, etc, etc, etc)... or turn off all history to begin with.

Deleted files are recoverable from any file system (including ext2, ext3, ntfs, cifs, hfs, etc) unless the entire file, its inodes, blocks, and the journal are zeroed completely (not just unlinked). There is typically a trail of breadcrumbs through the file system information you can follow to recreate the file entirely. It's just not something that is easy to automate in some cases... and even drives that have had their platters shattered, burned, and magnetically erased can have some data recovered from them if the interested party is willing to spend the money.

Even memory is a potential location that information can be pulled from.

Basically what I'm telling you is- All you can do is apply best practices in any given environment, if you are truly concerned about your security footprint, even whole disk encryption isn't necessarily enough.

DNS queries generate a trail.
Web queries generate a trail.
Every packet you send off the computer generates a trail.
Every byte of data on the computer generates a trail.

It is absolutely impossible to truly "hide" everything.

Computers weren't designed with security in mind quickly becomes obvious when you take a serious look at potential avenues for data retrieval... and doesn't even consider basic things like physical keystroke loggers, remote monitor display, full session recording, micro camera viewing your keyboard, etc, etc, etc... there's a never ending list.
 
Old 12-11-2008, 01:09 PM   #7
jailbait
LQ Guru
 
Registered: Feb 2003
Location: Virginia, USA
Distribution: Debian 12
Posts: 8,398

Rep: Reputation: 586Reputation: 586Reputation: 586Reputation: 586Reputation: 586Reputation: 586
Quote:
Originally Posted by chromei386 View Post

I'm looking to see what traces I leave behind and want to clean that up, to avoid prying eyes from stumbling across some personal information (think shared computer).
One of the things that you can do is to set permissions on the worrisome files to 600 or 700 so that only you can read the files.

--------------------------
Steve Stites
 
  


Reply


Thread Tools Search this Thread
Search this Thread:

Advanced Search

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Problem wiping a drive with shred command galapogos Linux - General 9 06-26-2015 02:06 PM
Keeping shared domains private mlewis Linux - General 10 10-27-2008 05:31 PM
Difference between the rm and shred in linux rayudu1983 Linux - Newbie 2 06-15-2008 11:28 AM
LXer: Keeping Command History across Multiple Sessions LXer Syndicated Linux News 1 11-07-2007 10:58 AM
Can anyone describe any command present in Red Hat Linux for clearing cache contents. simi_544 Linux - Software 1 03-16-2005 03:58 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 11:12 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration