Tomb does require root privileges and the following terminal entries (as seen on their website) shows a typical example of how you can create a “ Tomb” in your Linux system. Given that it’s a script (with very few GUI components) meant to be used exclusively with the terminal, it comes to us as no surprise that it also bundles an extensive manpage documentation that will help guide you with the usage of the little program.įurthermore, Tomb does feature more than a few benefits that include varying use cases as well the ability to store your keyfiles in different locations including a different system, by means of steganography (hiding your gpg key in a jpg), your smartphone, on a remote server, as elaborated here.
The minimalistic software merely requires dependencies that are mostly bundled with the majority of Linux systems by default. When you add persistence, any changes you make are saved from session to session. This is the benefit of creating a Live USB.
Tomb is basically a shell script and it’s especially meant to be used in the Linux terminal. If you install Ubuntu to a USB device using the alternate cd, you do not have the luxury of using the pen drive on any machine. Which is basically stating a legit reason why you may want to switch from Truecrypt (or its immediate cousin which is Veracrypt) to their software.
What does it bring to the table?Īlso according to Dyne’s website, “ TrueCrypt makes use of statically linked libraries so that its code is hard to audit, plus is not considered free by operating system distributors because of liability reasons, see Debian, Ubuntu, Suse, Gentoo, and Fedora“. Veracrypt, however, is certainly not the only alternative to Truecrypt and there are a few others worth the try and Tomb is one such software that aims to replace former on your Linux system. The program has, however, been discontinued for a while now but one of its last released version which is 7.1a has been proven to be secure enough for everyday usage.īut that doesn’t guarantee it to be continually functional in years to come which is why the devs behind Veracrypt took it upon themselves to continue with the development of the software but under another project and it has seen major improvements over the years to the extent where it’s now become a standalone project that has matured very well with its three years of existence now. Truecrypt has proven itself as an extremely secure means of protecting your files offline with the varying options of military-grade encryption standards that it features. I know people will mention C-scope, I've tried it, but it really isn't the same.File encryption softwares are more of a necessity nowadays than just another luxury application on your Linux PC, given the importance of how safeguarding our most delicate documents have become and the risk of system theft and hack has grown exponentially over the years. I have it running on WINE, but there are little glitches that sometimes gets in the way.
You don't need to break the train of thought and think up shell commands just to find these things every time you ran into a new variable/structure/function from some other files. You can see all the referrer of a object or jump to a caller. Source Insight is a great application that stores all the symbols in a data base, so you can see a new function being called, click on it and see how the function is written. It is actually rather difficult reading other people's code, especially for bigger projects.
I am not a developer, but for my work I trace a lot of codes.