On 04/20/2017 06:44 AM, Anton Aylward wrote:
What you need to think about is whether the idea of an encryption system that works only when your machine is shut down is enough.
Exactly. And usually that means its only worth while for a laptop that travels and may get lost/stolen, or media that can "walk away". You are going to give up that encryption key like a blubbering school boy when they come with warrants and guns, so why pretend encryption protects anything on always-running spinning storage in your home or office server room? I've used encryption (LUKS) on 13.2 on my traveling laptop for years and it never caused me any problem. I abandoned it when I did a fresh 42.2 install on SSD. The old disk is in a caddy, and I've occasionally plugged it in to a couple different distros to retrieve data, and it pops up asking for the decryption password each time just like it always did. (To relate to the topic title, I didn't try whole disk encryption, nor did I encrypt /boot or /root on that laptop, just /home and /data where source code and money things live). -- After all is said and done, more is said than done. -- To unsubscribe, e-mail: opensuse+unsubscribe@opensuse.org To contact the owner, e-mail: opensuse+owner@opensuse.org