Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Custom Commands: Nuking cryptsetup keyslots #76

Open
HulaHoopWhonix opened this issue Sep 1, 2016 · 2 comments
Open

Custom Commands: Nuking cryptsetup keyslots #76

HulaHoopWhonix opened this issue Sep 1, 2016 · 2 comments

Comments

@HulaHoopWhonix
Copy link

I don't know if custom commands are supported but nuking cryptsetup keyslots would be a good option.

cc/ @adrelanos

@HulaHoopWhonix
Copy link
Author

EDIT:

On SSDs this won't be of value because wear levelling prevents proper erasure. Might make the feature not worth it. Or needs a disclaimer

@ghost
Copy link

ghost commented Jun 29, 2023

You can add custom commands in the .ini file.

The commands are
cryptsetup erase [] or
cryptsetup luksErase []

Be aware that there is no sanity check for this command. This will render your entire partition to be unrecoverable. The key is used to decrypt a certain part of the LUKS header to make sure that it is the correct key. Without this, it is theoretically or practically impossible to recover the true plaintext.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant