@Heracles
Before saying anything: I want to say that my point in all of this is the fact that it is
not implemented yet and that there is
no any option/power/control given to the USER/DATA-OWNER to decide if he wants to use it and if he responsible enough to implement it correctly. However the proper and responsible implementation can be aided by good, clear and concise HOWTOs plus it can be implemented into the workflow of the set-up function in the FreeNAS OS/software level to make sure initially all needed things are taken care of ie. maybe force the user to have 2 USB to save the ecnryption/decription key or the passphrase and give warning if that is skipped and show alert regularly until that is implemented - no matter what, the one who uses the Software should and always hold the responsibility to implement it properly and the FreeNAS or any other software can just aid the process and make sure there are proper alert and HOWTOs to implement it properly.
I have to disagree with you as WHAT I do not like and cannot agree with you and frankly never will, is that YOU IMPLY that data-at-rest is unnecessary whereas if you are looking in enterprise set-ups and all the technology out-there you can find just the opposite (I am thinking about
TPM2.0 chip/
LUKS/
SED(
Self
Encrypted
Disk)/
NBDE(
Network
Bound
Disk
Encryption – currently
RedHat implemented it already fully ;-) )./
etc. . . .), except that it is not IMPLEMENTED into a
great product such as
FreeNAS. Although, NOT THAT any other NAS product/OS like
Synology/
QNAP does that although QNAP has some good momevemnt into this direction, however it is not yet supported in any of these products/OSes. I do not know if other NAS software/OS implemented it as default, at least I did not see anything on it, but be my guess and prove me wrong on it if yes. Which is kind of sad as the Base OS what they use to derive their product supports it(
LUKS/
TPM2 chip/
NBDE), so I do not get what the matter to pull it into and implement it into the FreeNAS base.
If you use the
TPM2 chip with
SED HDDs, despite the key being on the same file system, you cannot extract it as it is already encrypted thus you see no file system except a bunch os gubleguk until you decrypt it. Moreover if you use SED, than the encryption/decryption is independent of the OS and as such waaaayyy more faster and it less hits your NAS's performance. If you use LUKS as well on top of that than you also gain more speed as encryption/decrytion is transparent i.e. OS level. If you do this above with the
TPM2+SED and would add an
NBDE set-up using
TANG server locally, than your disks are safe at rest so long they are inside locally and given that the tang server is available and all credentials are correct, ie the bootloader and the OS is not tampered with which is made sure by using the TPM2 chip properly.
In my point of view,
TPM2+LUKS should be the bare minimum for data at rest which gives you very good protection for data-at-rest.
Physical security is good (given that you can implement it properly), however that is not always the case in every
SMBs to the point which makes really sense, and for example just lock it into a safe for physical security which is kind of 'WHATTTT???' !!
Please do not be confuse and make one solution less important than the other, there is a reason they have been created, I am thinking here to not be confused about authorization(ACLs) and data-at-rest(f.ex. LUKS) they both are important to implement and serve totally different purpose and solves different aspect of protecting your data and its access.
What you describes using NextCloud is good, so long it is not on the same physical machine and that the Host OS is already implements LUKS at the minimum with strong enough passphrase, than I am sorry to say but, than you just have a false sense of security.