About Tomb

Everything you need to know about Tomb but where too affraid to ask

How secure is Tomb?

Death is the only sure thing in life. That said, Tomb is a pretty secure tool mainly because it is kept minimal, its source is always open to review (even when installed), and its code is easy to read with some shell script knowledge. Plus, no cloud or network connection is needed: Tomb works offline.

GNU/Linux distributions include all encryption tools we use in Tomb and therefore, they are regularly peer-reviewed: we don’t add anything else to them, just a layer of usability.

If needed, it is always possible to access the contents of a tomb without the tomb script, only using a few commands typed into any shell interpreter:

lo=$(losetup -f)
losetup -f secret.tomb
gpg -d secret.key | head -c -1 | cryptsetup --key-file - luksOpen $lo secret
mount /dev/mapper/secret /mnt

One can change the last argument /mnt to where the Tomb has to be mounted and made accessible. To close the tomb, use:

umount /mnt
cryptsetup luksClose /dev/mapper/secret

Who needs Tomb?

Democracy requires privacy as much as Freedom of Expression. — Anonymous

The world is full of prevarication and political imprisonments, war rages in several places, and media is mainly used for propaganda by the powers in charge. Some of us face the dangers of being tracked by oppressors opposing our self-definition, independent thinking and resistance to homologation.

Our target community are GNU/Linux users with no time to click around, sometimes using old or borrowed computers, operating in places endangered by conflict where a leak of personal data can be a threat.

Even if one can’t own a laptop, Tomb makes it possible to go around with a USB stick and borrow computers, leaving no trace and keeping data safe during transport.

The distinction between public and private is becoming increasingly blurred with the increasing intrusiveness of the media and advances in electronic technology. While this distinction is always the outcome of continuous cultural negotiation, it continues to be critical, for where nothing is private, democracy becomes impossible.

The Internet offers plenty of free services; in most cases, corporate or state monopolies host all private information. Server-hosted services and web-integrated technologies gather all data into huge information pools made available to established economic and cultural regimes.

Tomb is ethical software that empowers everyone to protect their privacy.

Aren’t there enough encryption tools?

The current situation in personal desktop encryption is far from optimal.

The encrypted home mechanism of most operating systems doesn’t make it easy to transport around, and they do not separate the keys from the storage: only the password is needed to open them, which is prone to brute-forcing attacks.

TrueCrypt makes use of statically linked libraries with code is hard to audit. Furthermore, it is not considered free by operating system distributors because of its liability reasons. (see Debian , Ubuntu , Suse , Gentoo and Fedora ).

Veracrypt is a very portable rewrite of TrueCrypt (works also on Mac OSX) but it is very slow and has some interaction patterns that are not secure. Its way of encrypting is comparable to Tomb.

EncFS doesn’t need root access. But it has drawbacks: it implements weaker encryption, doesn’t promote the separated storage of keys and exposes the size of each single file rather than hiding the structure of a folder.

Watch Tomb’s development history in this infographic based on git commits.

Compliancy

Tomb qualifies as sound for use with information rated as “top secret” when used on an underlying stack of carefully reviewed hardware (random number generator and other components) and software (Linux kernel build, crypto modules, device manager, compiler used to built, shell interpreter and packaged dependencies).

Tomb volumes are fully compliant with the FIPS 197 advanced encryption standard published by NIST and with the following industry standards:

Tomb implementation is known to at least partially address issues raised in:

  • Information technology – Security techniques – Key management
  • ISO/IEC 27005:2011 Information technology – Security techniques – Information security risk management
  • ISO/IEC 24759:2014 Information technology – Security techniques – Test requirements for cryptographic modules

Any help on further verification of compliance is very welcome, as our access to ISO/IEC documents is limited.

All I know is what the words know, and dead things, and that makes a handsome little sum, with a beginning and a middle and an end, as in the well-built phrase and the long sonata of the dead. — Samuel Beckett

Development?

Tomb is on GitHub, where most of the community activity goes.

Developers can interact with us via a discussion area, issues, or pull requests. The README is also a brief introduction for developers willing to engage.

The short tomb tester howto provides a guide to troubleshooting problems. Anyone planning to write code in Tomb should first look at the short tomb developer howto .

To get in touch with us in person please plan to participate in one of the yearly italian hackmeeting , usually held during summer on the peninsula.

Get in touch