That device seem to just cost money and add power consumption and potential hassle, while letting the system encrypt is very well proven.
@smizzio77, could you tell more what you can and cant do with your laptop?
A full backup of /home, then a full reinstall and copying files back in /home may be the most straightforward and safe.
My favourite is to encrypt "everything", as i then do not need to worry about remnants in swap, or clues to system or my network in /; /etc, /var, /tmp...
I also always apply LVM for reasons you will see below:
LUKS encryption + LVM is easily set up in Mageia installer: choose custom partitioning and set up the following:
(this assumes you need no dual/multi-booting, but you can also have MSWindows partition(s) outside all this, only sharing the EFI partition if used)Only if you boot using (U)EFI: you need a EFI partition, mounted at /boot/EFI, some 300MB FAT32 is OK
You need a /boot partition, ext4, i use to set it 500MB - enough for a few kernels incl Nvidia driver
Then create the rest of disk as a LVM pv (look for Linux Logical Volume Manager (web search that) on the partition type list), and tick the encryption box, invent a key (and note it down!), let it create volume group vg-mga.
Technically this operation creates a disk partition on which it runs LUKS (web search that), that is then used as the only pv (Physical Volume) in your Volume Group "vg-mga";
After a couple seconds an new tab shows up in diskdrake/installer: the volume group in which you create partitions:
In there create / and /home as ext4, and a swap partition.
- Note, you can in LVM easily using diskdrake later extend the partitions - even on running system - so only make them a bit larger then needed, and save free space so you can later extend what then need be extended. You can (using command line) also make snapshots - that then also will be encrypted.
At boot the system will ask for encryption key for that large physical partition, after that everything works like before, transparently, and "everything" is encrypted.
As you have unencrypted data on the drive now, and the new install only overwrites it with encrypted data when it writes files, it is possible for someone getting access to the drive without the key to scan the drive and find old non-overwritten unencrypted data. The best way to prevent that is to overwrite the whole disk with random data after making your backup, and before creating the new partitions. i.e
- Code: Select all
dd if=/dev/random of=/dev/sdx bs=16k status=progress
I guess you can Alt-F2 to a terminal in the installer before the disk partitioning stage to perform it, but i generally use a prepared USB stick with
http://www.system-rescue-cd.org/ which is very good for a lot of system maintenance/change/repair work. There are several ways to delete securely:
http://www.system-rescue-cd.org/manual/ ... n_of_Data/Then there is also the possible occasion the drive (mechanical or SSD) have suffered some soft block sector and transparently substituted its adress with another physical block, so some old unencrypted data with slight error is hidden by the drive unless you go in low level however that is done... etc... The disk/SDD vendor may have tools available for full erase.
At home & work Mandriva since 2006, Mageia 2011. Thinkpad T40, T43, T60, T400, T510, Dell M4400, M6300, Acer Aspire 7. Workstation using LVM, LUKS, VirtualBox, BOINC