ecryptfs encrypts the contents of your ~/ directory, then on login mounts it so that it can be decrypted on the fly to allow you access. The encrypted files are the same as the unencrypted files in ~/, or should be. Therefore if you have all the "unencrypted" files from ~/ backed up it should be safe to delete .Private and the rest and uninstall ecryptfs. I've not done that, so I suppose it might leave you unable to decrypt and access the files in ~/, in which case simply copy them back over from your back up. If you want to maintain the ability to encrypt directories you could just create a new user account in System>Administration>Users and Groups, making sure not to select 'ecnrypt home folder', or whatever the option is. That might also stop any other programme which might be starting on log in and filling your hdd with crap, if it's not ecryptfs. on edit: I've just done a `sudo ls` on the ~/ of another user on my system, with an ecryptfsed ~/, this is what comes up:
Code:
grim@07:08:31:~/$ sudo ls /home/sysadminbk/ [sudo] password for grim: Access-Your-Private-Data.desktop README.txt grim@07:12:00:~/$ sudo cat /home/sysadminbk/README.txt THIS DIRECTORY HAS BEEN UNMOUNTED TO PROTECT YOUR DATA. From the graphical desktop, click on: Access Your Private Data or From the command line, run: ecryptfs-mount-private
That's what your ~/ would look like without ecryptfs, all the files which to you seem to be unencrypted in ~/ are in fact encrypted in ~/.Private and being decrypted by ecryptfs as you use them, therefore your backup ought to be unencrypted.
Bookmarks