Yes, I went through this manually and it *is* ridiculously slow.

However, it doesn't have to be. I googled around and came up with people
complaining about the slowness of /dev/urandom in LKML. The reply was
that urandom isn't really intended for this sort of usage, and the
suggested workaround is to use it to initialize a PRNG and use that as a
source of random data to wipe the disk.

If there's no tool that currently does this, it should be possible to
write one easily enough.

In any case, at the very least, a quick, non-cryptographic strength
overwriting of the whole disk should be supported, to avoid the
possibility of recovery of any pre-encryption data.

-- 
Installer doesn't wipe the disk when installing on encrypted LVM
https://bugs.launchpad.net/bugs/361025
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to