diff --git a/content/posts/linux/Setting up DM-Integrity/index.md b/content/posts/linux/Setting up DM-Integrity/index.md index a288622..2584f0f 100644 --- a/content/posts/linux/Setting up DM-Integrity/index.md +++ b/content/posts/linux/Setting up DM-Integrity/index.md @@ -33,7 +33,7 @@ cryptsetup luksFormat --type luks2 /dev/sdX --integrity hmac-sha256 --sector-siz We are setting a sane default of using hmac-sha256 for the integrity checking. Alternatively, if you have very weak hardware that would struggle with hmac-sha256, you can also use crc32c. However, this is non cryptographic and likely significantly weaker. -When pacstrapping the system make sure you add in the cryptsetup package to install LUKS and by extension dm-integrity. The following command is a minimal base install example of what that would look like: +When pacstrapping the system, make sure you add in the cryptsetup package to install LUKS (and by extension, dm-integrity). The following command is a minimal base install example of what that would look like: ```bash pacstrap /mnt base linux linux-firmware sudo efibootmgr nano cryptsetup