Yes, I went through this manually and it *is* ridiculously slow. However, it doesn't have to be. I googled around and came up with people complaining about the slowness of /dev/urandom in LKML. The reply was that urandom isn't really intended for this sort of usage, and the suggested workaround is to use it to initialize a PRNG and use that as a source of random data to wipe the disk.
If there's no tool that currently does this, it should be possible to write one easily enough. In any case, at the very least, a quick, non-cryptographic strength overwriting of the whole disk should be supported, to avoid the possibility of recovery of any pre-encryption data. -- Installer doesn't wipe the disk when installing on encrypted LVM https://bugs.launchpad.net/bugs/361025 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list [email protected] https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
