On Fri, Aug 17, 2012 at 1:42 PM, J. B <baksh...@gmail.com> wrote: > Though I'm little confused now. As per the tutorial /boot should be > un-encrypted. But I got some doc at net where /boot is also encrypted. > Can you please help me to solve the puzzle ? > I'm following http://kirriwa.net/john/doc/lvm+raid1.html#step3
you can encrypt /boot as long as grub is aware of the schema iirc. but, this begs the question - why? do you store your web cache in /boot, or a db of your cc numbers, or your porn pics, or your kid's birthday picture? or do you care that someone might recover that you stored your kernel image on the second partition of the first disk? i personally don't see the need for full disk encryption. i mean, if you live in the US, a court order will keep you in jail or force you to give up the password vs if you have smaller encrypted files that no one finds (obfuscated in databases of pictures of a small encrypted file or some such scheme) that someone might now find. or, if you surf the net in a vm (as you should anyway) and encrypt the vm image, your browser data is safe if someone steals your computer. fwiw -- To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/CAH_OBieNTipwVEwwOiGLYwZQit-UcO=6m-yb0u6nppc9igw...@mail.gmail.com