From e72204dd0fd64cf0e5efd221d7cc51ea03ce9082 Mon Sep 17 00:00:00 2001 From: Purpleseaotter Date: Wed, 17 Dec 2025 10:33:27 +0100 Subject: [PATCH] Update content/posts/linux/Setting up DM-Integrity/index.md Co-authored-by: Ganwtrs Signed-off-by: Purpleseaotter --- content/posts/linux/Setting up DM-Integrity/index.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/content/posts/linux/Setting up DM-Integrity/index.md b/content/posts/linux/Setting up DM-Integrity/index.md index a288622..2584f0f 100644 --- a/content/posts/linux/Setting up DM-Integrity/index.md +++ b/content/posts/linux/Setting up DM-Integrity/index.md @@ -33,7 +33,7 @@ cryptsetup luksFormat --type luks2 /dev/sdX --integrity hmac-sha256 --sector-siz We are setting a sane default of using hmac-sha256 for the integrity checking. Alternatively, if you have very weak hardware that would struggle with hmac-sha256, you can also use crc32c. However, this is non cryptographic and likely significantly weaker. -When pacstrapping the system make sure you add in the cryptsetup package to install LUKS and by extension dm-integrity. The following command is a minimal base install example of what that would look like: +When pacstrapping the system, make sure you add in the cryptsetup package to install LUKS (and by extension, dm-integrity). The following command is a minimal base install example of what that would look like: ```bash pacstrap /mnt base linux linux-firmware sudo efibootmgr nano cryptsetup