Three years ago, I started using crypto containers for private data.
Basically, I used this for mounting them:
1 losetup /dev/loop0 "$IMG"
2 cryptsetup luksOpen /dev/loop0 tresor
3 mount /dev/mapper/tresor mount/
Unmounting is done in a similar way:
1 umount mount/
2 cryptsetup luksClose tresor
3 losetup -d /dev/loop0
If you speak german, there's more verbose notes on that at [1].
This works very well except for one thing: Your data is stored in an
encrypted file of fixed size. So, from time to time, I had to increase
that size from 50MB to 256MB to 1024MB...
How about EncFS[2]? Just tried it. It's simpler to use and doesn't
rely on files with fixed sizes. Looks good. I don't need "perfect"
security so I don't care about the fact that people can see the
directory structure or the number of files (they can't see file names,
of course).
Why am I using encryption in the first place? I want to protect my
data if my laptop gets stolen. That's it. Most probably, the average
thief is not able to crack an EncFS. I bet he'd simply sell the laptop
or wipe the hard drive so he can install Windows...
____________________
1.
gopher://uninformativ.de/0/txt/gnu-linux-notes/CryptSetup.txt
2.
https://wiki.archlinux.org/index.php/EncFS