fosstodon.org is one of the many independent Mastodon servers you can use to participate in the fediverse.
Fosstodon is an invite only Mastodon instance that is open to those who are interested in technology; particularly free & open source software. If you wish to join, contact us for an invite.

Administered by:

Server stats:

11K
active users

#luks

8 posts6 participants0 posts today
:catroll: :cowroll:<p><a href="https://mas.to/tags/Cifrar" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cifrar</span></a> archivos, como última opción: consejos para no perder <a href="https://mas.to/tags/informaci%C3%B3n" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>información</span></a> valiosa</p><p><a href="https://gatooscuro.xyz/cifrar-archivos-como-ultima-opcion-consejos-para-no-perder-informacion-valiosa/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">gatooscuro.xyz/cifrar-archivos</span><span class="invisible">-como-ultima-opcion-consejos-para-no-perder-informacion-valiosa/</span></a></p><p><a href="https://mas.to/tags/Cifrado" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cifrado</span></a> <a href="https://mas.to/tags/Seguridad" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Seguridad</span></a> <a href="https://mas.to/tags/Ciberseguridad" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ciberseguridad</span></a> <a href="https://mas.to/tags/SeguridadInform%C3%A1tica" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SeguridadInformática</span></a> <a href="https://mas.to/tags/Privacidad" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Privacidad</span></a> <a href="https://mas.to/tags/PrivacidadInform%C3%A1tica" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PrivacidadInformática</span></a> <a href="https://mas.to/tags/GNU" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GNU</span></a> <a href="https://mas.to/tags/GNULinux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GNULinux</span></a> <a href="https://mas.to/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a> <a href="https://mas.to/tags/Negaci%C3%B3nPausible" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NegaciónPausible</span></a> <a href="https://mas.to/tags/TrueCrypt" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TrueCrypt</span></a> <a href="https://mas.to/tags/VeraCrypt" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VeraCrypt</span></a> <a href="https://mas.to/tags/LUKS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LUKS</span></a> <a href="https://mas.to/tags/Backup" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Backup</span></a> <a href="https://mas.to/tags/Backups" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Backups</span></a> <a href="https://mas.to/tags/Resguardo" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Resguardo</span></a> <a href="https://mas.to/tags/Resguardos" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Resguardos</span></a> <a href="https://mas.to/tags/CopiaDeSeguridad" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CopiaDeSeguridad</span></a> <a href="https://mas.to/tags/CopiasDeSeguridad" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CopiasDeSeguridad</span></a> <a href="https://mas.to/tags/Kubuntu" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Kubuntu</span></a> <a href="https://mas.to/tags/CryFS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CryFS</span></a></p>
AskUbuntu<p>How to (un)mount an encrypted USB via GUI using a keyfile? <a href="https://ubuntu.social/tags/mount" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mount</span></a> <a href="https://ubuntu.social/tags/kubuntu" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>kubuntu</span></a> <a href="https://ubuntu.social/tags/kde" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>kde</span></a> <a href="https://ubuntu.social/tags/usbdrive" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>usbdrive</span></a> <a href="https://ubuntu.social/tags/luks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>luks</span></a></p><p><a href="https://askubuntu.com/q/1541875/612" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">askubuntu.com/q/1541875/612</span><span class="invisible"></span></a></p>
AskUbuntu<p>How to properly get KDE GUI to mount/unmount my USB LUKS drive with a keyfile from crypttab? <a href="https://ubuntu.social/tags/mount" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mount</span></a> <a href="https://ubuntu.social/tags/kubuntu" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>kubuntu</span></a> <a href="https://ubuntu.social/tags/kde" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>kde</span></a> <a href="https://ubuntu.social/tags/usbdrive" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>usbdrive</span></a> <a href="https://ubuntu.social/tags/luks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>luks</span></a></p><p><a href="https://askubuntu.com/q/1541875/612" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">askubuntu.com/q/1541875/612</span><span class="invisible"></span></a></p>
AskUbuntu<p>How to get GUI mount of external LUKS drive to use keyfile from crypttab? <a href="https://ubuntu.social/tags/mount" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mount</span></a> <a href="https://ubuntu.social/tags/kubuntu" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>kubuntu</span></a> <a href="https://ubuntu.social/tags/kde" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>kde</span></a> <a href="https://ubuntu.social/tags/usbdrive" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>usbdrive</span></a> <a href="https://ubuntu.social/tags/luks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>luks</span></a></p><p><a href="https://askubuntu.com/q/1541875/612" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">askubuntu.com/q/1541875/612</span><span class="invisible"></span></a></p>
AskUbuntu<p>How to get GUI mount of external LUKS drive to use keyfile from crypttab? <a href="https://ubuntu.social/tags/mount" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mount</span></a> <a href="https://ubuntu.social/tags/kubuntu" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>kubuntu</span></a> <a href="https://ubuntu.social/tags/kde" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>kde</span></a> <a href="https://ubuntu.social/tags/luks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>luks</span></a></p><p><a href="https://askubuntu.com/q/1541875/612" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">askubuntu.com/q/1541875/612</span><span class="invisible"></span></a></p>
AskUbuntu<p>crypttab not copied to initrd <a href="https://ubuntu.social/tags/boot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>boot</span></a> <a href="https://ubuntu.social/tags/systeminstallation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>systeminstallation</span></a> <a href="https://ubuntu.social/tags/encryption" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>encryption</span></a> <a href="https://ubuntu.social/tags/luks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>luks</span></a> <a href="https://ubuntu.social/tags/initramfs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>initramfs</span></a></p><p><a href="https://askubuntu.com/q/1541759/612" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">askubuntu.com/q/1541759/612</span><span class="invisible"></span></a></p>
kiwi46678<p>I just installed Arch manually, but now it fails to boot. It only asks to unlock nvme1n1p1, but not the root, leading to a "failed to find root" error.</p><p>fstab seems correct. I suspect the issue is in crypttab.<br>Does anyone know a good blog post or guide to set it up correctly? I feel like I’m close to solving this.</p><p><a href="https://social.tchncs.de/tags/ArchLinux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ArchLinux</span></a> <a href="https://social.tchncs.de/tags/Btrfs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Btrfs</span></a> <a href="https://social.tchncs.de/tags/LVM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LVM</span></a> <a href="https://social.tchncs.de/tags/LUKS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LUKS</span></a> <a href="https://social.tchncs.de/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a></p><p>1/2</p>
Jonathan Matthews<p><a href="https://fosstodon.org/tags/TIL" class="mention hashtag" rel="tag">#<span>TIL</span></a> that whilst having a too-long-running <a href="https://fosstodon.org/tags/Linux" class="mention hashtag" rel="tag">#<span>Linux</span></a> machine with <a href="https://fosstodon.org/tags/LUKS" class="mention hashtag" rel="tag">#<span>LUKS</span></a> <a href="https://fosstodon.org/tags/FDE" class="mention hashtag" rel="tag">#<span>FDE</span></a> already unlocked, but where I&#39;ve /maybe/ forgotten the passphrase (so won&#39;t be able to boot it successfully), it&#39;s possible to check if I&#39;ve remembered the passphrase correctly with:</p><p># cryptsetup open --verbose --test-passphrase DEV<br />Enter passphrase for DEV: <br />Key slot 0 unlocked.<br />Command successful.</p>
Milan<p>jetzt meldet sich noch ein anderer bekannter der <a href="https://social.tchncs.de/tags/solus" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>solus</span></a> updates gefahren hat und jetzt beim boot sein <a href="https://social.tchncs.de/tags/luks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>luks</span></a> nicht mehr entschlüsseln kann wtf.</p>
Liane M. Dubowy<p>Mein Backup der wichtigsten Sachen habe ich immer dabei – auf einem USB-Stick am Schlüsselbund. Der ist natürlich verschlüsselt, damit im schlimmsten Fall die Daten nicht in falsche Hände geraten. Hier mal ein sehr einfacher Weg, einen Stick oder eine externe SSD/Festplatte unter <a href="https://social.tchncs.de/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a> zu verschlüsseln:</p><p><a href="https://youtu.be/bsKOfxbVnjo" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">youtu.be/bsKOfxbVnjo</span><span class="invisible"></span></a></p><p><a href="https://social.tchncs.de/tags/linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linux</span></a> <a href="https://social.tchncs.de/tags/dm" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dm</span></a>-crypt <a href="https://social.tchncs.de/tags/luks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>luks</span></a></p>
AskUbuntu<p>Single password for disk encryption and login <a href="https://ubuntu.social/tags/encryption" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>encryption</span></a> <a href="https://ubuntu.social/tags/desktopenvironments" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>desktopenvironments</span></a> <a href="https://ubuntu.social/tags/luks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>luks</span></a></p><p><a href="https://askubuntu.com/q/1540943/612" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">askubuntu.com/q/1540943/612</span><span class="invisible"></span></a></p>
dei Muddr<p>Nach vielen Stunden habe ich endlich eine <a href="https://social.tchncs.de/tags/debian" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>debian</span></a> Installation mit <a href="https://social.tchncs.de/tags/btrfs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>btrfs</span></a> und <a href="https://social.tchncs.de/tags/luks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>luks</span></a> hinbekommen, nun ist das wlan deaktiviert und ich bekomme es nicht an. Was für eine shit show!<br>Eigentlich hatte ich auf eine <a href="https://social.tchncs.de/tags/hyprland" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hyprland</span></a> Installation gehofft, wo das plugin system funktioniert - im Gegensatz zu <a href="https://social.tchncs.de/tags/opensuse" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opensuse</span></a> ..</p><p><a href="https://social.tchncs.de/tags/linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linux</span></a></p>
Sebin Nyshkim<p>Okay, this is hella weird…</p><p>For quite some time now my Plymouth boot splash has not been showing text prompts when asking for my LUKS passphrase ("Please enter passphrase for device …"). Just the box to type it into.</p><p>I've been looking into this again and turns out apparently Plymouth doesn't know which font to choose for the prompt so it just shows… nothing?</p><p>I checked and sure enough, the font the Plymouth theme requests is in the initramfs with a generic file name. Logs show me that it's looking for <code>fc-match</code>, which isn't in the initramfs.</p><p>Checking with the <a href="https://gitlab.archlinux.org/archlinux/packaging/packages/plymouth/-/issues/2" rel="nofollow noopener noreferrer" target="_blank">downstream Arch issue tracker</a> and <a href="https://gitlab.freedesktop.org/plymouth/plymouth/-/merge_requests/302" rel="nofollow noopener noreferrer" target="_blank">upstream</a>, a bug was fixed that prevented display of messages because some assumptions about <code>fc-match</code> were false and the fallback should work again.</p><p>Except it doesn't for me and I can't figure out what the issue is.</p><p>So, checking <a href="https://wiki.archlinux.org/title/Plymouth#Password_prompt_does_not_update" rel="nofollow noopener noreferrer" target="_blank">Arch Wiki</a> again, it says that I can tell Plymouth to use SimpleDRM and… now the prompt is back?! Even if I include <code>fc-match</code> in the initramfs it won't work.</p><p>And the boot splash is now 5x as large.</p><p>I'm so confused…</p><p><a href="https://meow.social/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a> <a href="https://meow.social/tags/LUKS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LUKS</span></a> <a href="https://meow.social/tags/Arch" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Arch</span></a> <a href="https://meow.social/tags/ArchLinux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ArchLinux</span></a></p>
Juan Rafael Fernández<p>New post <a href="https://jrfern.codeberg.page/2025/02/02/luks_en_pmos.html" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">jrfern.codeberg.page/2025/02/0</span><span class="invisible">2/luks_en_pmos.html</span></a> (Encrypting a partition in postmarketOS with systemd) <a href="https://social.politicaconciencia.org/tags/postmarketos" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>postmarketos</span></a> <a href="https://social.politicaconciencia.org/tags/luks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>luks</span></a> <a href="https://social.politicaconciencia.org/tags/systemd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>systemd</span></a></p>
mkj<p><span class="h-card" translate="no"><a href="https://layer8.space/@platymew" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>platymew</span></a></span> An alternative is to use passphrase files or TPM key storage for LUKS autounlocking during boot, then give ZFS the mapped/opened LUKS devices as underlying pool storage. Depending on your use case, this may be perfectly sufficient. For example, it allows for easy rapid decommissioning of drives.</p><p>For the general question of whether ZFS can operate on top of LUKS, the simple answer IMO is an unqualified yes. The complexity shows up in secure unlocking.</p><p><span class="h-card" translate="no"><a href="https://infosec.exchange/@tomlawrence" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>tomlawrence</span></a></span> </p><p><a href="https://social.mkj.earth/tags/ZFS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ZFS</span></a> <a href="https://social.mkj.earth/tags/LUKS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LUKS</span></a></p>
Multi Purr Puss :verified:<p>In one of your recent stream VODs, <span class="h-card" translate="no"><a href="https://infosec.exchange/@tomlawrence" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>tomlawrence</span></a></span>, someone asked, whether they could run <a href="https://layer8.space/tags/ZFS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ZFS</span></a> on <a href="https://layer8.space/tags/LUKS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LUKS</span></a> - i can answer that; YES*, with an *asterisk.</p><p>I did this for quite some time, until i've decided that it's rather inconvenient to type in my password on every reboot. Now, i'm running LUKS on ZVOLs, in <a href="https://layer8.space/tags/Ubuntu" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ubuntu</span></a> / <a href="https://layer8.space/tags/qemu" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>qemu</span></a> / <a href="https://layer8.space/tags/libvirt" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>libvirt</span></a>.</p><p>It's a small home server, and i need a few "privacy insensitive" VMs to auto-start after power-fail.</p><p>All one needs is a block dev, zpool create, done! 😉 …technically</p>
Torsten :verified: :verified:<p>"What makes this attack particularly concerning is its practicality in real-world scenarios. Unlike previous attacks against full-disk encryption requiring precise file location knowledge, CrashXTS succeeds through controlled randomization of encrypted data."</p><p>Benutzt die <a href="https://norden.social/tags/Verschl%C3%BCsselung" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Verschlüsselung</span></a> unter <a href="https://norden.social/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a> nicht auch <a href="https://norden.social/tags/XTS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>XTS</span></a>?</p><p><a href="https://norden.social/tags/AES" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AES</span></a> <a href="https://norden.social/tags/LUKS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LUKS</span></a><br><a href="https://www.cyberkendra.com/2025/01/microsoft-patches-critical-bitlocker.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">cyberkendra.com/2025/01/micros</span><span class="invisible">oft-patches-critical-bitlocker.html</span></a></p>
Laurent R.<p>⚠️ <a href="https://mastodon.social/tags/Astuce" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Astuce</span></a> Solus + LUKS ⚠️ </p><p>Sous Solus, si vous saisissez votre mot de passe LUKS en AZERTY lors de l'installation, au premier démarrage, le clavier sera en QWERTY pour le déverrouillage ! ⌨️Préparez-vous à une petite gymnastique des doigts pour taper votre mot de passe. Cela n'arrive qu'au premier démarrage ! 😅 </p><p><a href="https://mastodon.social/tags/Solus" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Solus</span></a> <a href="https://mastodon.social/tags/getsol" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>getsol</span></a> <a href="https://mastodon.social/tags/LUKS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LUKS</span></a> <a href="https://mastodon.social/tags/Cybers%C3%A9curit%C3%A9" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersécurité</span></a> <a href="https://mastodon.social/tags/LinuxTips" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LinuxTips</span></a></p>
Laurent R.<p><span class="h-card" translate="no"><a href="https://infosec.exchange/@x_cli" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>x_cli</span></a></span> Si tu utilises LUKS avec Clevis (TPM2) sur FCOS et que tu dois effacer le volume, c'est probablement dû à l'option wipe_volume: true par défaut. Ça empêche de garder les données entre les installs. Pour éviter ça, configure LUKS manuellement sans cette directive et assure-toi que Clevis ajoute une nouvelle keyslot sans écraser l'existant. 🚀 <a href="https://mastodon.social/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a> <a href="https://mastodon.social/tags/LUKS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LUKS</span></a> <a href="https://mastodon.social/tags/FCOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FCOS</span></a></p>
AskUbuntu<p>How to replace a disk in a RAID5 which is also encrypted by LUKS? <a href="https://ubuntu.social/tags/encryption" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>encryption</span></a> <a href="https://ubuntu.social/tags/raid" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>raid</span></a> <a href="https://ubuntu.social/tags/luks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>luks</span></a> <a href="https://ubuntu.social/tags/mdadm" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mdadm</span></a></p><p><a href="https://askubuntu.com/q/1539149/612" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">askubuntu.com/q/1539149/612</span><span class="invisible"></span></a></p>