Gentlepeople, After playing with it on a secondary machine, I'm looking to transition from my Arch-setup to Qubes.
I am traditionally choosing to encrypt my file systems using serpent (considered the strongest entry into the AES competition with slightly worse speed than the finally choosen Rijndael algorithm) and the following partitioning: - UEFI-required EFI System Partition, 512MB, EFI System - /boot partition (to be encrypted), 512MB, Linux filesystem - SWAP partition (to be encrypted using a random key), size of RAM (`free -m`) + 1 MiB, Linux filesystem - tmp partition (to be encrypted using a random key), 2GB, Linux filesystem All but the UEFI partition are being encrypted. '/boot' uses a keyfile resident in '/' (appropriate grub configuration) and thus PW-protectded through the encryption of '/'. Questions: 1) Does that make sense (for Qubes)? 2) Am I missing something necessary? 3) Is there documentation on custom disk encryption and if no: where in the installation process would I break out (how) to the CLI to get it done? Thanks for any hints. Sincerely, Joh -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/038dcac4b42e2852a4d3d7a0644fc8251ea1dc4c.camel%40graumannschaft.org. For more options, visit https://groups.google.com/d/optout.