How secure is Tomb?
Death is the only sure thing in life. That said, Tomb is a pretty secure tool mainly because it is kept minimal, its source is always open to review (even when installed), and its code is easy to read with some shell script knowledge. Plus, no cloud or network connection is needed: Tomb works offline.
GNU/Linux distributions include all encryption tools we use in Tomb and therefore, they are regularly peer-reviewed: we don’t add anything else to them, just a layer of usability.
If needed, it is always possible to access the contents of a tomb without the tomb script, only using a few commands typed into any shell interpreter:
lo=$(losetup -f)
losetup -f secret.tomb
gpg -d secret.key | head -c -1 | cryptsetup --key-file - luksOpen $lo secret
mount /dev/mapper/secret /mnt
One can change the last argument /mnt
to where the Tomb has to be mounted and made accessible. To close the tomb, use:
umount /mnt
cryptsetup luksClose /dev/mapper/secret
Who needs Tomb?
Democracy requires privacy as much as Freedom of Expression. — Anonymous
The world is full of prevarication and political imprisonments, war rages in several places, and media is mainly used for propaganda by the powers in charge. Some of us face the dangers of being tracked by oppressors opposing our self-definition, independent thinking and resistance to homologation.
Our target community are GNU/Linux users with no time to click around, sometimes using old or borrowed computers, operating in places endangered by conflict where a leak of personal data can be a threat.
Even if one can’t own a laptop, Tomb makes it possible to go around with a USB stick and borrow computers, leaving no trace and keeping data safe during transport.
The distinction between public and private is becoming increasingly blurred with the increasing intrusiveness of the media and advances in electronic technology. While this distinction is always the outcome of continuous cultural negotiation, it continues to be critical, for where nothing is private, democracy becomes impossible.
The Internet offers plenty of free services; in most cases, corporate or state monopolies host all private information. Server-hosted services and web-integrated technologies gather all data into huge information pools made available to established economic and cultural regimes.
Tomb is ethical software that empowers everyone to protect their privacy.
The current situation in personal desktop encryption is far from optimal.
The encrypted home mechanism of most operating systems doesn’t make it easy to transport around, and they do not separate the keys from the storage: only the password is needed to open them, which is prone to brute-forcing attacks.
TrueCrypt
makes use of statically linked libraries with code is hard to audit. Furthermore, it is
not considered free
by operating system distributors because of its liability reasons. (see
Debian
,
Ubuntu
,
Suse
,
Gentoo
and
Fedora
).
Veracrypt
is a very portable rewrite of TrueCrypt (works also on Mac OSX) but it is very slow and has some interaction patterns that are not secure. Its way of encrypting is comparable to Tomb.
EncFS
doesn’t need root access. But it has drawbacks: it implements weaker encryption, doesn’t promote the separated storage of keys and exposes the size of each single file rather than hiding the structure of a folder.
Watch Tomb’s development history in this infographic based on git commits.
Compliancy
Tomb qualifies as sound for use with information rated as “top secret” when used on an underlying stack of carefully reviewed hardware (random number generator and other components) and software (Linux kernel build, crypto modules, device manager, compiler used to built, shell interpreter and packaged dependencies).
Tomb volumes are fully compliant with the FIPS 197 advanced encryption standard published by NIST and with the following industry standards:
- Information technology – Security techniques – Encryption algorithms
Tomb implementation is known to at least partially address issues raised in:
- Information technology – Security techniques – Key management
- ISO/IEC 27005:2011
Information technology – Security techniques – Information security risk management
- ISO/IEC 24759:2014
Information technology – Security techniques – Test requirements for cryptographic modules
Any help on further verification of compliance is very welcome, as our access to ISO/IEC documents is limited.
All I know is what the words know, and dead things, and that makes a handsome little sum, with a beginning and a middle and an end, as in the well-built phrase and the long sonata of the dead. — Samuel Beckett