On Thu, Dec 12, 2013 at 15:58, Richard B. Tilley wrote:
> bioctl -c C -r number_of_rounds -l /dev/device softraid0
>
> I have one question. Is there any way for an attacker to know how many
> rounds I passed to bioctl from the volume itself? I mean forensically,
> could that be extracted from the
Hello misc,
I encrypt everything but / when I install OpenBSD systems. I use bioctl to do
this. I do it at install and it works fine and it's simple and easy to do. I
won't get into all of the details, but here is the command I use to encrypt:
bioctl -c C -r number_of_rounds -l /dev/device soft
2 matches
Mail list logo