Waking up in the bag is a known problem with Windows’ new sleep mode but the rest ¯\_( ͡° ͜ʖ ͡°)_/¯
Waking up in the bag is a known problem with Windows’ new sleep mode but the rest ¯\_( ͡° ͜ʖ ͡°)_/¯
OpenMediaVault! It has a nice web UI and it’s Debian based. However the development cycle doesn’t always line up with Debian releases so sometimes it can take a few months to switch major versions.
Maybe Uyghurs?
Also Islam isn’t kill everyone but ISIS kinda is just look at their opponent list on Wikipedia
Yeah I upgraded my Odroid and ran into some issues with Armbian but I was able to work through it thanks to this post. I guess Armbian broke the repos a little and it prevented OMV from cleanly auto updating with the script.
Ah, good to know.
IIRC and I may be wrong here the drive stays encrypted in sleep. Decryption is done in real time via your CPU. However the encryption key is stored in unencrypted RAM. Which is why the other comment suggests encrypting swap and hibernating, this writes RAM to disk.
To be fair there are probably many different ways to solve the problem. I’m somewhat experienced with Linux and I’ve attempted seeing up TPM LUKS decryption on boot. It’s certainly not easy or at least wasn’t when I tried. For non experienced people it’s easier to just enter the password at boot and enable auto login. Then you get the security, software, ethics, or licensing debates that accompany most Linux discussions.
They do understand the point. The problem is that if you use TPM to unlock on boot it is slightly self defeating. Now the attacker has access to your display manager or TTY. They can guess passwords, try to bypass the biometric checks, or find an exploit. But that does indicate a higher tech level that your average thief.
The common way to do it with LUKS2 and TPM as detailed on the Arch wiki. Not sure if that’ll apply at all to ZFS and Zorin though
It is less secure though. What I do is set my computer to log in on start and I set up fingerprint auth. So I only need to login once on startup with the drive decryption.
Here’s a reddit post on using clevis, TPM, and ZFS to decrypt.
You should also know that if you’re mobo dies so does your data.
Ah I missed the partitions part
I use kopia, it’s more automated and deduplicates snapshot.
Fellow humans should I finish the bird muscle with a saccharine concoction, an overfermented grape extract concoction, or a ground plant concoction from the geographic region of Carolina? I know us fellow humans frequently debate the proper and just pairing of concoction and flesh.