Some considerations when using confidential data on a Unix system. |
/dev/shm
exists on most systems and is type tmpfs.tmpfs
seems to be a better choice.find -mtime +1
./dev/shm
mount | grep /dev/shm
should show that tmpfs
is mounted on /dev/shm
.ls -ld /dev/shm
should show permissions drwxrwxrwt
. (Note sticky bit.)/dev/shm
for the user
mkdir /dev/shm/$LOGNAME
chmod 700 /dev/shm/$LOGNAME
/dev/sda5 swap swap loop=/dev/loop0,encryption=AES128
in your /etc/fstab
. Check out the specifics for your particular Linux distribution and remember this has implications for laptops that support suspend.
Using a volatile file system helps minimize a lot of risks associated with editing sensitive data. It also creates a new one: an area of your file system to search for sensitive data. |
.swp
files
.
filename.swp
-n
or noswapfile
nowritebackup
and nobackup
-c "set nowritebackup nobackup"
.viminfo
files
-i NONE
will disable use of the .viminfo
filebufhidden=wipe
.vim
with -i NONE -n -c "set nowritebackup nobackup"
.
:set all
during an editing session.
When the environment variable
Less can also be compiled to be permanently in "secure" mode. |
less
with LESSSECURE=1
in the environment.
less
.