Tomb
the Crypto Undertaker
...Under the hood it uses Linux dm-crypt with LUKS for strong, disk-level encryption, and separates the key material from the vault itself to improve security workflows. Keys can be protected with passphrases and even hidden via steganography inside innocuous files, giving you options for concealment and off-device storage. The interface is deliberately simple—dig a tomb, forge a key, lock it, and open it—yet provides hooks to bind directories or run scripts on open/close so you can tailor behavior to your workstation. Permissions and ownership hygiene are emphasized to avoid leaking metadata, and the tool favors auditable shell operations that experienced users can inspect. ...