🐧 luks encrypting a new hard drive prior to OS installation vs full drive encryption during OS install?
Nachrichtenbereich: 🐧 Linux Tipps
🔗 Quelle: reddit.com
This is not that important and likely just nit picking but, just on a technical level, is encrypting a new hard drive with luks and setting the desired LV and LVG prior to OS installation superior to installing the OS on the new unencrypted hard drive and during the install process letting it perform the full drive encryption for you? Fedora and Debian both will encrypt all of the partitions except boot and then installation proceeds to install files in those encrypted partitions, right? So the difference between the two methods may be minimal?
This question above is excluding discussion about /boot being unencrypted (there's a way in Fedora to supposedly include /boot as encrypted, only leaving some grub files unencrypted in order to pass the encryption password).
I have wondered if an OS like Windows 10 that uses bitlocker but encrypts the drive only after OS installation completes results in those unencrypted OS files saved to drive being recoverable by data recovery programs even after the drive is later bitlocker encrypted, for example. So was comparing drive encryption options in linux to determine whether luks encrypting a new hard drive prior to OS installation is most secure of all, since no unencrypted data ever hits the drive.
[link] [comments] ...