On Sat, Apr 02, 2016 at 08:31:17PM +0200, Kai Krakow wrote: > Am Sat, 2 Apr 2016 11:44:32 +0200 > schrieb Marc Haber <mh+linux-bt...@zugschlus.de>: > > > On Sat, Apr 02, 2016 at 11:03:53AM +0200, Kai Krakow wrote: > > > Am Fri, 1 Apr 2016 07:57:25 +0200 > > > schrieb Marc Haber <mh+linux-bt...@zugschlus.de>: > > > > On Thu, Mar 31, 2016 at 11:16:30PM +0200, Kai Krakow wrote: > > [...] > > [...] > > [...] > > > > > > > > I cryptsetup luksFormat'ted the partition before I mkfs.btrfs'ed > > > > it. That should do a much better job than wipefsing it, shouldnt > > > > it? > > > > > > Not sure how luksFormat works. If it encrypts what is already on the > > > device, it would also encrypt orphan superblocks. > > > > It overwrites the LUKS metadata including the symmetric key that was > > used to encrypt the existing data. Short of Shor's Algorithm and > > Quantum Computers, after that operation it is no longer possible to > > even guess what was on the disk before. > > If it was encrypted before... ;-)
First, it was. Second, cleartext found on the block device is quite unlikely to be readable from the unlocked crypto device. I would be very worried if that were the case. I must be missing something here. Greetings Marc -- ----------------------------------------------------------------------------- Marc Haber | "I don't trust Computers. They | Mailadresse im Header Leimen, Germany | lose things." Winona Ryder | Fon: *49 6224 1600402 Nordisch by Nature | How to make an American Quilt | Fax: *49 6224 1600421 -- To unsubscribe from this list: send the line "unsubscribe linux-btrfs" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html