On 10/13/2015 12:05 PM, Gustav Degreef wrote:
On 10/13/2015 03:18 PM, Anton Aylward wrote:
Having a laptop stolen is a perfectly reasonable risk scenario.
My question is this:
Why don't you just encrypt the drive or at the very least the data partition.
There are many perfectly good mechanisms for this.
I've thought about it, but I don't have the expertise to do it and have not had the time to look into it.
its not difficult. There are many good HOW-TO guides for this out there.
Alternatively, in the mobile setting, strip down the 'laptop' (or use a cheapie burner from Goodwill) and use a USB stick as your /home. Remove the USB stick when no using the laptop.
A month and a half back I bought a Samsung T1, 256 GB external USB SSD.
Wow. Good for you. Sounds delicious!
I activated it on a MS machine, then used gparted to repartition it (/,/home, swap, etc). I installed OS 13.2 and it runs reasonably fast on several laptops. I can boot directly into the system and I am playing with it for when I travel. Cost me about $100 and it runs much faster than a persistent live USB stick - with 13.1 on it.
I wonder why the SSD is faster than a similar (or even small) USB stick, given the underlying media technology? I can see that, if the host supports it, a USB3 drive is going to be faster than a USB2 stick. No argument there. If its still 'playable' , then you can/could reformat it as encrypted. Having a encrypted system/swap/home etc and an encrypted boot is straight forward. It's well documented out there :-) However I've found a couple of attempts to even encrypt the boot, if you are willing to experiment: http://www.pavelkogan.com/2014/05/23/luks-full-disk-encryption/ http://www.pavelkogan.com/2015/01/25/linux-mint-encryption/ It should be applicable to Suse. -- A: Yes. > Q: Are you sure? >> A: Because it reverses the logical flow of conversation. >>> Q: Why is top posting frowned upon? -- To unsubscribe, e-mail: opensuse+unsubscribe@opensuse.org To contact the owner, e-mail: opensuse+owner@opensuse.org