Talk:Full disk encryption secure boot: Difference between revisions
(Created page with "> Using luks2 (unsupported by GRUB at the moment): luks2 is now partially supported by GRUB. > cryptsetup -v -c aes-xts-plain64 -s 512 --hash sha512 --pbkdf pbkdf2 --iter-time 1000 --use-random luksFormat /dev/nvme0n1p2 The options are too many and confusing, and most of them have been made default in cryptsetup 2.4.0, according to https://wiki.archlinux.org/title/Dm-crypt/Device_encryption#Encryption_options_for_LUKS_mode.") |
m (Unsigned comment attribution.) |
||
Line 6: | Line 6: | ||
The options are too many and confusing, and most of them have been made default in cryptsetup 2.4.0, according to https://wiki.archlinux.org/title/Dm-crypt/Device_encryption#Encryption_options_for_LUKS_mode. | The options are too many and confusing, and most of them have been made default in cryptsetup 2.4.0, according to https://wiki.archlinux.org/title/Dm-crypt/Device_encryption#Encryption_options_for_LUKS_mode. | ||
<small><span class="autosigned">— Preceding [[Help:Signature|unsigned]] comment added by [[User:Vixalien|Vixalien]] ([[User talk:Vixalien|{{int:talkpagelinktext}}]] • [[Special:Contributions/Vixalien|{{int:contribslink}}]]) 17 February 2024</span></small> |
Revision as of 02:01, 18 February 2024
> Using luks2 (unsupported by GRUB at the moment):
luks2 is now partially supported by GRUB.
> cryptsetup -v -c aes-xts-plain64 -s 512 --hash sha512 --pbkdf pbkdf2 --iter-time 1000 --use-random luksFormat /dev/nvme0n1p2
The options are too many and confusing, and most of them have been made default in cryptsetup 2.4.0, according to https://wiki.archlinux.org/title/Dm-crypt/Device_encryption#Encryption_options_for_LUKS_mode.
— Preceding unsigned comment added by Vixalien (talk • contribs) 17 February 2024