mirror of
https://github.com/netblue30/firejail.git
synced 2026-05-15 14:16:14 -06:00
[GH-ISSUE #6914] encrypted home #3419
Labels
No labels
LTS merge
LTS merge
bug
bug
converted-to-discussion
doc-todo
documentation
duplicate
enhancement
file-transfer
firecfg
firejail-in-firejail
firetools
graphics
help wanted
information_old
installation
invalid
modif
moved
needinfo
networking
notabug
notourbug
old-version
overlayfs
packaging
profile-request
pull-request
question
question_old
removal
runtime-permissions
sandbox-ipc
security
stale
wiki
wiki
wontfix
wordpress
workaround
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: github-starred/firejail#3419
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @vinniec2 on GitHub (Sep 29, 2025).
Original GitHub issue: https://github.com/netblue30/firejail/issues/6914
Question
I like to use firejail to also have separate program files with “--private=/dir”.
Lately, I've also been thinking about protecting these configurations by encrypting them.
I thought of Veracrypt, which seems to be able to hide volumes (I need to investigate further).
However, it would be a bit inconvenient to do this trough another software for every program and unsafe to do it for all program configurations together.
I thought that since I already have to launch firejail every time, it would be more convenient if it acted trabsparently as an interface for this feature.
Describe the solution you'd like
If there were a firejail parameter such as “--private-crypt=/dir” that then asks you for a password before starting the program, it would be very convenient.
Firejail should work as it already does, but it should use an encrypted volume for isolated software files.
Describe alternatives you've considered
Manually script the volume decryption to make it available to firejail before starting it. It would be a bit uncomfortable.
Additional context
I still need to investigate how encrypted hidden volumes work, so I don't know if it would be applicable, but it would be nice if the data couldn't even be seen.