Disk Encryption HOWTO
David Braun
Copyright © 2004 David Braun
2004-11-17
Revision History | ||
---|---|---|
Revision 1.5 | 2004-11-17 | Revised by: DB |
added warning about dm-crypt | ||
Revision 1.4 | 2004-08-17 | Revised by: DB |
bug fixes, hints toward plausible deniability and dm-crypt | ||
Revision 1.3 | 2003-12-18 | Revised by: DB |
added link to Diceware | ||
Revision 1.2 | 2003-10-09 | Revised by: DB |
added idle logout and Gentoo instructions | ||
Revision 1.1 | 2003-09-13 | Revised by: DB |
added step to zero out keychain | ||
Revision 1.0 | 2003-08-28 | Revised by: tmm |
Initial release, reviewed by LDP | ||
Revision 0.92 | 2003-08-27 | Revised by: DB |
first submission to LDP |
- Table of Contents
- 1. Introduction
- 1.1. Technical Summary
- 1.2. Copyright and License
- 1.3. Disclaimer
- 1.4. Acknowledgments
- 1.5. Feedback
- 1.6. Approaches
- 1.7. Threat Model
- 1.8. Caveats
- 1.9. Requirements
- 1.10. Looking to the Future
- 2. Procedure
- 2.1. Prepare the Keychain
- 2.2. Prepare the Asset
- 2.3. Scripts
- 2.4. Testing and Backup
- 2.5. Rescue Disk
- 2.6. Installing Linux
- 3. More Information
- Glossary
- A. GNU Free Documentation License
- A.1. PREAMBLE
- A.2. APPLICABILITY AND DEFINITIONS
- A.3. VERBATIM COPYING
- A.4. COPYING IN QUANTITY
- A.5. MODIFICATIONS
- A.6. COMBINING DOCUMENTS
- A.7. COLLECTIONS OF DOCUMENTS
- A.8. AGGREGATION WITH INDEPENDENT WORKS
- A.9. TRANSLATION
- A.10. TERMINATION
- A.11. FUTURE REVISIONS OF THIS LICENSE
- A.12. ADDENDUM: How to use this License for your documents
Next | ||
Introduction |