On Thu, Sep 23, 2010 at 11:50:26PM +0900, Osamu Aoki wrote:
> On Thu, Sep 23, 2010 at 03:13:06PM +0100, Simon McVittie wrote:
> ...
> > By policy, we use full-disk encryption at my workplace (where full-disk
> > really means "except the bootloader and /boot"). For a 2-year-old recipe for
> > it, which I believe still mostly works with grub2, see
> > http://smcv.pseudorandom.co.uk/2008/09/cryptroot/
> 
> Can we maintain suspend/resume type-features with such configuration?
> 
> Unless we use unencrypted swap, it seems we have to give up
> suspend/resume.  Then we a bit of loose security ....
> 
> How people cope with this on laptop ... I am curious.

You only need to give up *randomized* swap encryption. You can still
have an encrypted swap, you just can't use a random key.

Mike


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20100923151401.ga7...@glandium.org

Reply via email to