On Tue, September 9, 2008 08:51, Oei, YC wrote:
> If I may ask one more question, slightly tangential, just to check if
> I get it now: when I'm setting up a new crypt-device manually, it
> should be ok to wipe the disk *after* setting up the crypt_device with
> the actual passphrase we will be usi
On Mon, Sep 8, 2008 at 1:03 AM, David Härdeman <[EMAIL PROTECTED]> wrote:
>
> crypto_wipe_device() will first setup a crypt-device using a random
> passphrase, then write data to the crypted device. After that is done, the
> crypt-device is unmounted and the key is effectively lost and
> forgotten.
On Sun, Sep 07, 2008 at 12:41:14PM +0100, Oei, YC wrote:
I was looking at the code that writes random data to disk as part of
setting up an encrypted partition. The main reason I was interested is
that it seems to be quite a lot faster than something like "dd
if=/dev/urandom of=/dev/sdx", and so
Dear all,
I was looking at the code that writes random data to disk as part of
setting up an encrypted partition. The main reason I was interested is
that it seems to be quite a lot faster than something like "dd
if=/dev/urandom of=/dev/sdx", and so I wanted to know how it works.
However, as far a
4 matches
Mail list logo