← Back to HQ

The Digital Bunker: Command-Line Comfort

by Alien Investor

"Complexity is the enemy of security." But friction is the enemy of adoption.

If protecting your data feels like a chore — because you have to type out long paths like ~/Scripts/encrypt-folder.sh every single time — you'll skip it "just this once." And that's exactly the moment you become vulnerable.

In the previous parts of this series, we built robust encryption scripts. Now we integrate them so deeply into your system that they feel like native commands. No colorful icons, no GUIs needed. We use aliases.

The Concept: Your Command, Your Rules

An alias is nothing more than a user-defined nickname for a command on the command line. Instead of typing the full path to your script, you just type encrypt. The shell handles the rest.

This works the same on your Linux desktop as it does in Termux on GrapheneOS.

Step 1: Find Your Config File

Your terminal (the shell) has a config file that gets loaded every time you start a new session.

To find out which one you're using, type:

echo $SHELL

Step 2: Set the Alias

Open your config file with a text editor (e.g. nano).

On Termux or standard Ubuntu/Debian (Bash):

nano ~/.bashrc

Scroll all the way to the bottom and add the following lines (assuming you saved your scripts in the "Scripts" folder as recommended):

# --- Alien Investor Security Aliases ---
alias encrypt="~/Scripts/encrypt-folder.sh"
alias decrypt="~/Scripts/decrypt-folder.sh"

Note: The # at the start marks a comment, so you'll still know what these lines do later.

Make sure the scripts are also executable (if you haven't done that yet):

chmod +x ~/Scripts/encrypt-folder.sh ~/Scripts/decrypt-folder.sh

Save the file (CTRL+O, Enter) and exit the editor (CTRL+X).

Step 3: Activate

For the changes to take effect, you need to reload the config (or simply restart the terminal).

For Bash:

source ~/.bashrc

For Zsh:

source ~/.zshrc

The Result

Your workflow is now seamless.

Encrypt:

Open your terminal and simply type:

encrypt

The script starts immediately.

Decrypt:

Navigate to the relevant folder and type:

decrypt

By lowering the barrier to entry, security becomes muscle memory — not a chore.

The "Digital Bunker" Series

Complete your setup with the guides from the previous parts:

"Make your tools work for you. When the command line works on your behalf, you hold the control."

Tools for True Owners (Advertising/Affiliate)

Tools I use myself — for Bitcoin self-custody and digital sovereignty:

Note: Some of these links are affiliate links. If you use them, you support my work at no extra cost to you. Thanks!


Recharge (Donations)

Send fuel to the mothership

Thanks for your support — for free content, financial sovereignty, and the extraterrestrial resistance!