luks
Here are 80 public repositories matching this topic...
Before people start creating issues asking to support their favorite distribution, I think that mkosi should declare its policy regarding new distributions support.
The policy should state in which terms (if any) you will be willing to support a new distributions.
Encrypt a hetzner server from the "serverbörse" and unlock it remote via ssh
-
Updated
Dec 1, 2019
Official master repository of the LUKS in-place-conversion utility (luksipc)
-
Updated
Oct 19, 2019 - C
Lock encrypted LUKS volumes on suspend in Arch Linux
-
Updated
Dec 9, 2019 - Go
Add Debian guide
Write the Arch Linux guide for Debian. Not sure if it would be identical with the Ubuntu guide #1
A PAM module that protects sensitive data and provides a panic function for emergency situations. Authentication through passwords or removable media.
-
Updated
Oct 17, 2019 - C
A bash script to automate the most basic usage of LUKS volumes in Linux VPS
-
Updated
Dec 2, 2019 - Shell
Automated arch linux desktop environment
-
Updated
Dec 3, 2019 - Shell
Manage linux luks client devices and escrow recovery keys to crypt-server
-
Updated
Oct 15, 2019 - Go
A wrapper around "cryptsetup" to use a key from a Trezor device instead of a password
-
Updated
Nov 1, 2019 - Go
A disk encryption utility that helps setting up LUKS-based disk encryption using randomly generated keys, and keeps all keys on a dedicated key server.
-
Updated
Oct 28, 2019 - Go
Isolate secondary storage dm-crypt and LUKS header processing to Qubes DisposableVMs
-
Updated
Mar 17, 2019 - Shell
Open Secure-K OS is an operating system booting from a USB key in which you can safely create and store your personal and private data. It is a next generation live operating system following liveng patterns. Here you can find the live-build code for building the initial operating system image.
-
Updated
Aug 22, 2019 - Shell
Currently all scripts in /etc/initramfs-tools/ run upon update-initramfs -u command is issued. cleanup.sh is not a dangerous script but anyway, it should not run while updating initramfs.
Decrypt your LUKS partition using a FIDO2 compatible authenticator
-
Updated
Dec 5, 2019 - Rust
A tool to get root privileges on GNU/Linux, injecting malware early in the boot chain. It also works on systems with root encrypted partition. Useful to grab LUKS passwords.
-
Updated
Nov 1, 2019 - C
-
Updated
Nov 30, 2019 - Go
The raspberry pi is not so much a thing as it is a community for getting the world on computers. The PrivateKeyVault is not so much a thing as it is a community for getting the world on blockchains. Make Instructions: Airgapped raspberry pi computer for working with blockchains featuring LUKS full disk encryption and using qr-codes to pass encrypted files and offline transaction instructions across the airgap.
-
Updated
Nov 26, 2019
💾 Script to provision full partition encryption for Ubuntu (optionally including /boot) using lvm on luks, for use with multi-boot
-
Updated
Jun 24, 2019 - Shell
Scripts to automatically unlock LUKS encrypted partitions based on machine environment
-
Updated
Feb 26, 2019 - Shell
Improve this page
Add a description, image, and links to the luks topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the luks topic, visit your repo's landing page and select "manage topics."
By default, tomb open makes all files in the tomb user root, group root. In order for tomb open to leave user and group as they were, you need to add the -p option. I think -p should be the default because...
If you ever forget to use -p, your files are permanently owned and grouped root. You can't copy them out to another place: They're already root. If you close the tomb and reopen with -p,